Completed
Push — master ( a3fa4c...3969ce )
by John
01:56
created

ptcrb_cleaner_multios()   A

Complexity

Conditions 2

Size

Total Lines 12

Duplication

Lines 0
Ratio 0 %

Code Coverage

Tests 6
CRAP Score 2

Importance

Changes 0
Metric Value
cc 2
dl 0
loc 12
ccs 6
cts 6
cp 1
crap 2
rs 9.4285
c 0
b 0
f 0
1
#!/usr/bin/env python3
2 5
"""This module is used for network connections; APIs, downloading, etc."""
3
4 5
import os  # filesystem read
5 5
try:
6 5
    from defusedxml import ElementTree  # safer XML parsing
7 1
except (ImportError, AttributeError):
8 1
    from xml.etree import ElementTree  # XML parsing
9 5
import re  # regexes
10 5
import concurrent.futures  # multiprocessing/threading
11 5
import glob  # pem file lookup
12 5
import hashlib  # salt
13 5
import time  # salt
14 5
import random  # salt
15 5
import base64  # encoding
16 5
import binascii  # encoding
17 5
import zlib  # encoding
18 5
import requests  # downloading
19 5
from bs4 import BeautifulSoup  # scraping
20 5
from bbarchivist import utilities  # parse filesize
21 5
from bbarchivist.bbconstants import SERVERS  # lookup servers
22
23 5
__author__ = "Thurask"
24 5
__license__ = "WTFPL v2"
25 5
__copyright__ = "2015-2017 Thurask"
26
27
28 5
def grab_pem():
29
    """
30
    Work with either local cacerts or system cacerts.
31
    """
32 5
    try:
33 5
        pemfile = glob.glob(os.path.join(os.getcwd(), "cacert.pem"))[0]
34 5
    except IndexError:
35 5
        return requests.certs.where()  # no local cacerts
36
    else:
37 5
        return os.path.abspath(pemfile)  # local cacerts
38
39
40 5
def pem_wrapper(method):
41
    """
42
    Decorator to set REQUESTS_CA_BUNDLE.
43
44
    :param method: Method to use.
45
    :type method: function
46
    """
47 5
    def wrapper(*args, **kwargs):
48
        """
49
        Set REQUESTS_CA_BUNDLE before doing function.
50
        """
51 5
        os.environ["REQUESTS_CA_BUNDLE"] = grab_pem()
52 5
        return method(*args, **kwargs)
53 5
    return wrapper
54
55
56 5
def generic_session(session=None):
57
    """
58
    Create a Requests session object on the fly, if need be.
59
60
    :param session: Requests session object, created if this is None.
61
    :type session: requests.Session()
62
    """
63 5
    sess = requests.Session() if session is None else session
64 5
    return sess
65
66
67 5
def generic_soup_parser(url, session=None):
68
    """
69
    Get a BeautifulSoup HTML parser for some URL.
70
71
    :param url: The URL to check.
72
    :type url: str
73
74
    :param session: Requests session object, default is created on the fly.
75
    :type session: requests.Session()
76
    """
77 5
    session = generic_session(session)
78 5
    req = session.get(url)
79 5
    soup = BeautifulSoup(req.content, "html.parser")
80 5
    return soup
81
82
83 5
@pem_wrapper
84 5
def get_length(url, session=None):
85
    """
86
    Get content-length header from some URL.
87
88
    :param url: The URL to check.
89
    :type url: str
90
91
    :param session: Requests session object, default is created on the fly.
92
    :type session: requests.Session()
93
    """
94 5
    session = generic_session(session)
95 5
    if url is None:
96 5
        return 0
97 5
    try:
98 5
        heads = session.head(url)
99 5
        fsize = heads.headers['content-length']
100 5
        return int(fsize)
101 5
    except requests.ConnectionError:
102 5
        return 0
103
104
105 5
@pem_wrapper
106 5
def download(url, output_directory=None, session=None):
107
    """
108
    Download file from given URL.
109
110
    :param url: URL to download from.
111
    :type url: str
112
113
    :param output_directory: Download folder. Default is local.
114
    :type output_directory: str
115
116
    :param session: Requests session object, default is created on the fly.
117
    :type session: requests.Session()
118
    """
119 5
    session = generic_session(session)
120 5
    output_directory = utilities.dirhandler(output_directory, os.getcwd())
121 5
    lfname = url.split('/')[-1]
122 5
    sname = utilities.stripper(lfname)
123 5
    fname = os.path.join(output_directory, lfname)
124 5
    download_writer(url, fname, lfname, sname, session)
125 5
    remove_empty_download(fname)
126
127
128 5
def remove_empty_download(fname):
129
    """
130
    Remove file if it's empty.
131
132
    :param fname: File path.
133
    :type fname: str
134
    """
135 5
    if os.stat(fname).st_size == 0:
136 5
        os.remove(fname)
137
138
139 5
def download_writer(url, fname, lfname, sname, session=None):
140
    """
141
    Download file and write to disk.
142
143
    :param url: URL to download from.
144
    :type url: str
145
146
    :param fname: File path.
147
    :type fname: str
148
149
    :param lfname: Long filename.
150
    :type lfname: str
151
152
    :param sname: Short name, for printing to screen.
153
    :type sname: str
154
155
    :param session: Requests session object, default is created on the fly.
156
    :type session: requests.Session()
157
    """
158 5
    with open(fname, "wb") as file:
159 5
        req = session.get(url, stream=True)
160 5
        clength = req.headers['content-length']
161 5
        fsize = utilities.fsizer(clength)
162 5
        if req.status_code == 200:  # 200 OK
163 5
            print("DOWNLOADING {0} [{1}]".format(sname, fsize))
164 5
            for chunk in req.iter_content(chunk_size=1024):
165 5
                file.write(chunk)
166
        else:
167 5
            print("ERROR: HTTP {0} IN {1}".format(req.status_code, lfname))
168
169
170 5
def download_bootstrap(urls, outdir=None, workers=5, session=None):
171
    """
172
    Run downloaders for each file in given URL iterable.
173
174
    :param urls: URLs to download.
175
    :type urls: list
176
177
    :param outdir: Download folder. Default is handled in :func:`download`.
178
    :type outdir: str
179
180
    :param workers: Number of worker processes. Default is 5.
181
    :type workers: int
182
183
    :param session: Requests session object, default is created on the fly.
184
    :type session: requests.Session()
185
    """
186 5
    workers = len(urls) if len(urls) < workers else workers
187 5
    spinman = utilities.SpinManager()
188 5
    with concurrent.futures.ThreadPoolExecutor(max_workers=workers) as xec:
189 5
        try:
190 5
            spinman.start()
191 5
            for url in urls:
192 5
                xec.submit(download, url, outdir, session)
193 5
        except (KeyboardInterrupt, SystemExit):
194 5
            xec.shutdown()
195 5
            spinman.stop()
196 5
    spinman.stop()
197 5
    utilities.spinner_clear()
198 5
    utilities.line_begin()
199
200
201 5
def download_android_tools(downloaddir=None):
202
    """
203
    Download Android SDK platform tools.
204
205
    :param downloaddir: Directory name, default is "plattools".
206
    :type downloaddir: str
207
    """
208 5
    if downloaddir is None:
209 5
        downloaddir = "plattools"
210 5
    if os.path.exists(downloaddir):
211 5
        os.removedirs(downloaddir)
212 5
    os.mkdir(downloaddir)
213 5
    platforms = ("windows", "linux", "darwin")
214 5
    dlurls = ["https://dl.google.com/android/repository/platform-tools-latest-{0}.zip".format(plat) for plat in platforms]
215 5
    sess = generic_session()
216 5
    download_bootstrap(dlurls, outdir="plattools", session=sess)
217
218
219 5
@pem_wrapper
220 5
def getcode(url, session=None):
221
    """
222
    Return status code of given URL.
223
224
    :param url: URL to check.
225
    :type url: str
226
227
    :param session: Requests session object, default is created on the fly.
228
    :type session: requests.Session()
229
    """
230 5
    session = generic_session(session)
231 5
    try:
232 5
        shead = session.head(url)
233 5
        status = int(shead.status_code)
234 5
        return status
235 5
    except requests.ConnectionError:
236 5
        return 404
237
238
239 5
@pem_wrapper
240 5
def availability(url, session=None):
241
    """
242
    Check HTTP status code of given URL.
243
    200 or 301-308 is OK, else is not.
244
245
    :param url: URL to check.
246
    :type url: str
247
248
    :param session: Requests session object, default is created on the fly.
249
    :type session: requests.Session()
250
    """
251 5
    status = getcode(url, session)
252 5
    return status == 200 or 300 < status <= 308
253
254
255 5
def clean_availability(results, server):
256
    """
257
    Clean availability for autolookup script.
258
259
    :param results: Result dict.
260
    :type results: dict(str: str)
261
262
    :param server: Server, key for result dict.
263
    :type server: str
264
    """
265 5
    marker = "PD" if server == "p" else server.upper()
266 5
    rel = results[server.lower()]
267 5
    avail = marker if rel != "SR not in system" and rel is not None else "  "
268 5
    return rel, avail
269
270
271 5
def check_prep(curef, mode=4, fvver="AAA000"):
272
    """
273
    Prepare variables for TCL update check.
274
275
    :param curef: PRD of the phone variant to check.
276
    :type curef: str
277
278
    :param mode: 4 if downloading autoloaders, 2 if downloading OTA deltas.
279
    :type mode: int
280
281
    :param fvver: Initial software version, must be specific if downloading OTA deltas.
282
    :type fvver: str
283
    """
284 5
    geturl = "http://g2master-us-east.tctmobile.com/check.php"
285 5
    params = {"id": "543212345000000", "curef": curef, "fv": fvver, "mode": mode, "type": "Firmware", "cltp": 2010, "cktp": 2, "rtd": 1, "chnl": 2}
286 5
    return geturl, params
287
288
289 5
@pem_wrapper
290 5
def tcl_check(curef, session=None, mode=4, fvver="AAA000"):
291
    """
292
    Check TCL server for updates.
293
294
    :param curef: PRD of the phone variant to check.
295
    :type curef: str
296
297
    :param session: Requests session object, default is created on the fly.
298
    :type session: requests.Session()
299
300
    :param mode: 4 if downloading autoloaders, 2 if downloading OTA deltas.
301
    :type mode: int
302
303
    :param fvver: Initial software version, must be specific if downloading OTA deltas.
304
    :type fvver: str
305
    """
306 5
    sess = generic_session(session)
307 5
    geturl, params = check_prep(curef, mode, fvver)
308 5
    req = sess.get(geturl, params=params)
309 5
    if req.status_code == 200:
310 5
        return req.text
311
    else:
312 5
        return None
313
314
315 5
def parse_tcl_check(data):
316
    """
317
    Extract version and file info from TCL update server response.
318
319
    :param data: The data to parse.
320
    :type data: str
321
    """
322 5
    root = ElementTree.fromstring(data)
323 5
    tvver = root.find("VERSION").find("TV").text
324 5
    fwid = root.find("FIRMWARE").find("FW_ID").text
325 5
    fileinfo = root.find("FIRMWARE").find("FILESET").find("FILE")
326 5
    filename = fileinfo.find("FILENAME").text
327 5
    filesize = fileinfo.find("SIZE").text
328 5
    filehash = fileinfo.find("CHECKSUM").text
329 5
    return tvver, fwid, filename, filesize, filehash
330
331
332 5
def tcl_salt():
333
    """
334
    Generate salt value for TCL server tools.
335
    """
336 5
    millis = round(time.time() * 1000)
337 5
    tail = "{0:06d}".format(random.randint(0, 999999))
338 5
    return "{0}{1}".format(str(millis), tail)
339
340
341 5
def unpack_vdkey():
342
    """
343
    Draw the curtain back.
344
    """
345 5
    vdkey = b"eJwdjwEOwDAIAr8kKFr//7HhmqXp8AIIDrYAgg8byiUXrwRJRXja+d6iNxu0AhUooDCN9rd6rDLxmGIakUVWo3IGCTRWqCAt6X4jGEIUAxgN0eYWnp+LkpHQAg/PsO90ELsy0Npm/n2HbtPndFgGEV31R9OmT4O4nrddjc3Qt6nWscx7e+WRHq5UnOudtjw5skuV09pFhvmqnOEIs4ljPeel1wfLYUF4\n"
346 5
    vdk = zlib.decompress(binascii.a2b_base64(vdkey))
347 5
    return vdk.decode("utf-8")
348
349
350 5
def vkhash(curef, tvver, fwid, salt, mode=4, fvver="AAA000"):
351
    """
352
    Generate hash from TCL update server variables.
353
354
    :param curef: PRD of the phone variant to check.
355
    :type curef: str
356
357
    :param tvver: Target software version.
358
    :type tvver: str
359
360
    :param fwid: Firmware ID for desired download file.
361
    :type fwid: str
362
363
    :param salt: Salt hash.
364
    :type salt: str
365
366
    :param mode: 4 if downloading autoloaders, 2 if downloading OTA deltas.
367
    :type mode: int
368
369
    :param fvver: Initial software version, must be specific if downloading OTA deltas.
370
    :type fvver: str
371
    """
372 5
    vdk = unpack_vdkey()
373 5
    query = "id={0}&salt={1}&curef={2}&fv={3}&tv={4}&type={5}&fw_id={6}&mode={7}&cltp={8}{9}".format("543212345000000", salt, curef, fvver, tvver, "Firmware", fwid, mode, 2010, vdk)
374 5
    engine = hashlib.sha1()
375 5
    engine.update(bytes(query, "utf-8"))
376 5
    return engine.hexdigest()
377
378
379 5
def download_request_prep(curef, tvver, fwid, salt, vkh, mode=4, fvver="AAA000"):
380
    """
381
    Prepare variables for download server check.
382
383
    :param curef: PRD of the phone variant to check.
384
    :type curef: str
385
386
    :param tvver: Target software version.
387
    :type tvver: str
388
389
    :param fwid: Firmware ID for desired download file.
390
    :type fwid: str
391
392
    :param salt: Salt hash.
393
    :type salt: str
394
395
    :param vkh: VDKey-based hash.
396
    :type vkh: str
397
398
    :param mode: 4 if downloading autoloaders, 2 if downloading OTA deltas.
399
    :type mode: int
400
401
    :param fvver: Initial software version, must be specific if downloading OTA deltas.
402
    :type fvver: str
403
    """
404 5
    posturl = "http://g2master-us-east.tctmobile.com/download_request.php"
405 5
    params = {"id": "543212345000000", "curef": curef, "fv": fvver, "mode": mode, "type": "Firmware", "tv": tvver, "fw_id": fwid, "salt": salt, "vk": vkh, "cltp": 2010}
406 5
    if mode == 4:
407 5
        params["foot"] = 1
408 5
    return posturl, params
409
410
411 5
@pem_wrapper
412 5
def tcl_download_request(curef, tvver, fwid, salt, vkh, session=None, mode=4, fvver="AAA000"):
413
    """
414
    Check TCL server for download URLs.
415
416
    :param curef: PRD of the phone variant to check.
417
    :type curef: str
418
419
    :param tvver: Target software version.
420
    :type tvver: str
421
422
    :param fwid: Firmware ID for desired download file.
423
    :type fwid: str
424
425
    :param salt: Salt hash.
426
    :type salt: str
427
428
    :param vkh: VDKey-based hash.
429
    :type vkh: str
430
431
    :param session: Requests session object, default is created on the fly.
432
    :type session: requests.Session()
433
434
    :param mode: 4 if downloading autoloaders, 2 if downloading OTA deltas.
435
    :type mode: int
436
437
    :param fvver: Initial software version, must be specific if downloading OTA deltas.
438
    :type fvver: str
439
    """
440 5
    sess = generic_session(session)
441 5
    posturl, params = download_request_prep(curef, tvver, fwid, salt, vkh, mode, fvver)
442 5
    req = sess.post(posturl, data=params)
443 5
    if req.status_code == 200:
444 5
        return req.text
445
    else:
446 5
        return None
447
448
449 5
def parse_tcl_download_request(body, mode=4):
450
    """
451
    Extract file URL and encrypt slave URL from TCL update server response.
452
453
    :param data: The data to parse.
454
    :type data: str
455
456
    :param mode: 4 if downloading autoloaders, 2 if downloading OTA deltas.
457
    :type mode: int
458
    """
459 5
    root = ElementTree.fromstring(body)
460 5
    slavelist = root.find("SLAVE_LIST").findall("SLAVE")
461 5
    slave = random.choice(slavelist).text
462 5
    dlurl = root.find("FILE_LIST").find("FILE").find("DOWNLOAD_URL").text
463 5
    eslave = root.find("SLAVE_LIST").findall("ENCRYPT_SLAVE")
464 5
    encslave = None if mode == 2 or not eslave else random.choice(eslave).text
465 5
    return "http://{0}{1}".format(slave, dlurl), encslave
466
467
468 5
def encrypt_header_prep(address, encslave):
469
    """
470
    Prepare variables for encrypted header check.
471
472
    :param address: File URL minus host.
473
    :type address: str
474
475
    :param encslave: Server hosting header script.
476
    :type encslave: str
477
    """
478 5
    encs = {b"YWNjb3VudA==" : b"emhlbmdodWEuZ2Fv", b"cGFzc3dvcmQ=": b"cWFydUQ0b2s="}
479 5
    params = {base64.b64decode(key): base64.b64decode(val) for key, val in encs.items()}
480 5
    params[b"address"] = bytes(address, "utf-8")
481 5
    posturl = "http://{0}/encrypt_header.php".format(encslave)
482 5
    return posturl, params
483
484
485 5
@pem_wrapper
486 5
def encrypt_header(address, encslave, session=None):
487
    """
488
    Check encrypted header.
489
490
    :param address: File URL minus host.
491
    :type address: str
492
493
    :param encslave: Server hosting header script.
494
    :type encslave: str
495
496
    :param session: Requests session object, default is created on the fly.
497
    :type session: requests.Session()
498
    """
499 5
    sess = generic_session(session)
500 5
    posturl, params = encrypt_header_prep(address, encslave)
501 5
    req = sess.post(posturl, data=params)
502 5
    if req.status_code == 206:  # partial
503 5
        contentlength = int(req.headers["Content-Length"])
504 5
        sentinel = "HEADER FOUND" if contentlength == 4194320 else "NO HEADER FOUND"
505 5
        return sentinel
506
    else:
507 5
        return None
508
509
510 5
def cchecker_get_tags(root):
511
    """
512
    Get country and carrier from XML.
513
514
    :param root: ElementTree we're barking up.
515
    :type root: xml.etree.ElementTree.ElementTree
516
    """
517 5
    for child in root:
518 5
        if child.tag == "country":
519 5
            country = child.get("name")
520 5
        if child.tag == "carrier":
521 5
            carrier = child.get("name")
522 5
    return country, carrier
523
524
525 5
@pem_wrapper
526 5
def carrier_checker(mcc, mnc, session=None):
527
    """
528
    Query BlackBerry World to map a MCC and a MNC to a country and carrier.
529
530
    :param mcc: Country code.
531
    :type mcc: int
532
533
    :param mnc: Network code.
534
    :type mnc: int
535
536
    :param session: Requests session object, default is created on the fly.
537
    :type session: requests.Session()
538
    """
539 5
    session = generic_session(session)
540 5
    url = "http://appworld.blackberry.com/ClientAPI/checkcarrier?homemcc={0}&homemnc={1}&devicevendorid=-1&pin=0".format(mcc, mnc)
541 5
    user_agent = {'User-agent': 'AppWorld/5.1.0.60'}
542 5
    req = session.get(url, headers=user_agent)
543 5
    root = ElementTree.fromstring(req.text)
544 5
    country, carrier = cchecker_get_tags(root)
545 5
    return country, carrier
546
547
548 5
def return_npc(mcc, mnc):
549
    """
550
    Format MCC and MNC into a NPC.
551
552
    :param mcc: Country code.
553
    :type mcc: int
554
555
    :param mnc: Network code.
556
    :type mnc: int
557
    """
558 5
    return "{0}{1}30".format(str(mcc).zfill(3), str(mnc).zfill(3))
559
560
561 5
@pem_wrapper
562 5
def carrier_query(npc, device, upgrade=False, blitz=False, forced=None, session=None):
563
    """
564
    Query BlackBerry servers, check which update is out for a carrier.
565
566
    :param npc: MCC + MNC (see `func:return_npc`)
567
    :type npc: int
568
569
    :param device: Hexadecimal hardware ID.
570
    :type device: str
571
572
    :param upgrade: Whether to use upgrade files. False by default.
573
    :type upgrade: bool
574
575
    :param blitz: Whether or not to create a blitz package. False by default.
576
    :type blitz: bool
577
578
    :param forced: Force a software release.
579
    :type forced: str
580
581
    :param session: Requests session object, default is created on the fly.
582
    :type session: requests.Session()
583
    """
584 5
    session = generic_session(session)
585 5
    upg = "upgrade" if upgrade else "repair"
586 5
    forced = "latest" if forced is None else forced
587 5
    url = "https://cs.sl.blackberry.com/cse/updateDetails/2.2/"
588 5
    query = '<?xml version="1.0" encoding="UTF-8"?>'
589 5
    query += '<updateDetailRequest version="2.2.1" authEchoTS="1366644680359">'
590 5
    query += "<clientProperties>"
591 5
    query += "<hardware>"
592 5
    query += "<pin>0x2FFFFFB3</pin><bsn>1128121361</bsn>"
593 5
    query += "<imei>004401139269240</imei>"
594 5
    query += "<id>0x{0}</id>".format(device)
595 5
    query += "</hardware>"
596 5
    query += "<network>"
597 5
    query += "<homeNPC>0x{0}</homeNPC>".format(npc)
598 5
    query += "<iccid>89014104255505565333</iccid>"
599 5
    query += "</network>"
600 5
    query += "<software>"
601 5
    query += "<currentLocale>en_US</currentLocale>"
602 5
    query += "<legalLocale>en_US</legalLocale>"
603 5
    query += "</software>"
604 5
    query += "</clientProperties>"
605 5
    query += "<updateDirectives>"
606 5
    query += '<allowPatching type="REDBEND">true</allowPatching>'
607 5
    query += "<upgradeMode>{0}</upgradeMode>".format(upg)
608 5
    query += "<provideDescriptions>false</provideDescriptions>"
609 5
    query += "<provideFiles>true</provideFiles>"
610 5
    query += "<queryType>NOTIFICATION_CHECK</queryType>"
611 5
    query += "</updateDirectives>"
612 5
    query += "<pollType>manual</pollType>"
613 5
    query += "<resultPackageSetCriteria>"
614 5
    query += '<softwareRelease softwareReleaseVersion="{0}" />'.format(forced)
615 5
    query += "<releaseIndependent>"
616 5
    query += '<packageType operation="include">application</packageType>'
617 5
    query += "</releaseIndependent>"
618 5
    query += "</resultPackageSetCriteria>"
619 5
    query += "</updateDetailRequest>"
620 5
    header = {"Content-Type": "text/xml;charset=UTF-8"}
621 5
    req = session.post(url, headers=header, data=query)
622 5
    return parse_carrier_xml(req.text, blitz)
623
624
625 5
def carrier_swver_get(root):
626
    """
627
    Get software release from carrier XML.
628
629
    :param root: ElementTree we're barking up.
630
    :type root: xml.etree.ElementTree.ElementTree
631
    """
632 5
    for child in root.iter("softwareReleaseMetadata"):
633 5
        swver = child.get("softwareReleaseVersion")
634 5
    return swver
635
636
637 5
def carrier_child_fileappend(child, files, baseurl, blitz=False):
638
    """
639
    Append bar file links to a list from a child element.
640
641
    :param child: Child element in use.
642
    :type child: xml.etree.ElementTree.Element
643
644
    :param files: Filelist.
645
    :type files: list(str)
646
647
    :param baseurl: Base URL, URL minus the filename.
648
    :type baseurl: str
649
650
    :param blitz: Whether or not to create a blitz package. False by default.
651
    :type blitz: bool
652
    """
653 5
    if not blitz:
654 5
        files.append(baseurl + child.get("path"))
655
    else:
656 5
        if child.get("type") not in ["system:radio", "system:desktop", "system:os"]:
657 5
            files.append(baseurl + child.get("path"))
658 5
    return files
659
660
661 5
def carrier_child_finder(root, files, baseurl, blitz=False):
662
    """
663
    Extract filenames, radio and OS from child elements.
664
665
    :param root: ElementTree we're barking up.
666
    :type root: xml.etree.ElementTree.ElementTree
667
668
    :param files: Filelist.
669
    :type files: list(str)
670
671
    :param baseurl: Base URL, URL minus the filename.
672
    :type baseurl: str
673
674
    :param blitz: Whether or not to create a blitz package. False by default.
675
    :type blitz: bool
676
    """
677 5
    osver = radver = ""
678 5
    for child in root.iter("package"):
679 5
        files = carrier_child_fileappend(child, files, baseurl, blitz)
680 5
        if child.get("type") == "system:radio":
681 5
            radver = child.get("version")
682 5
        elif child.get("type") == "system:desktop":
683 5
            osver = child.get("version")
684 5
        elif child.get("type") == "system:os":
685 5
            osver = child.get("version")
686 5
    return osver, radver, files
687
688
689 5
def parse_carrier_xml(data, blitz=False):
690
    """
691
    Parse the response to a carrier update request and return the juicy bits.
692
693
    :param data: The data to parse.
694
    :type data: xml
695
696
    :param blitz: Whether or not to create a blitz package. False by default.
697
    :type blitz: bool
698
    """
699 5
    root = ElementTree.fromstring(data)
700 5
    sw_exists = root.find('./data/content/softwareReleaseMetadata')
701 5
    swver = "N/A" if sw_exists is None else ""
702 5
    if sw_exists is not None:
703 5
        swver = carrier_swver_get(root)
704 5
    files = []
705 5
    package_exists = root.find('./data/content/fileSets/fileSet')
706 5
    osver = radver = ""
707 5
    if package_exists is not None:
708 5
        baseurl = "{0}/".format(package_exists.get("url"))
709 5
        osver, radver, files = carrier_child_finder(root, files, baseurl, blitz)
710 5
    return(swver, osver, radver, files)
711
712
713 5
@pem_wrapper
714 5
def sr_lookup(osver, server, session=None):
715
    """
716
    Software release lookup, with choice of server.
717
    :data:`bbarchivist.bbconstants.SERVERLIST` for server list.
718
719
    :param osver: OS version to lookup, 10.x.y.zzzz.
720
    :type osver: str
721
722
    :param server: Server to use.
723
    :type server: str
724
725
    :param session: Requests session object, default is created on the fly.
726
    :type session: requests.Session()
727
    """
728 5
    query = '<?xml version="1.0" encoding="UTF-8"?>'
729 5
    query += '<srVersionLookupRequest version="2.0.0"'
730 5
    query += ' authEchoTS="1366644680359">'
731 5
    query += '<clientProperties><hardware>'
732 5
    query += '<pin>0x2FFFFFB3</pin><bsn>1140011878</bsn>'
733 5
    query += '<imei>004402242176786</imei><id>0x8D00240A</id>'
734 5
    query += '<isBootROMSecure>true</isBootROMSecure>'
735 5
    query += '</hardware>'
736 5
    query += '<network>'
737 5
    query += '<vendorId>0x0</vendorId><homeNPC>0x60</homeNPC>'
738 5
    query += '<currentNPC>0x60</currentNPC><ecid>0x1</ecid>'
739 5
    query += '</network>'
740 5
    query += '<software><currentLocale>en_US</currentLocale>'
741 5
    query += '<legalLocale>en_US</legalLocale>'
742 5
    query += '<osVersion>{0}</osVersion>'.format(osver)
743 5
    query += '<omadmEnabled>false</omadmEnabled>'
744 5
    query += '</software></clientProperties>'
745 5
    query += '</srVersionLookupRequest>'
746 5
    reqtext = sr_lookup_poster(query, server, session)
747 5
    packtext = sr_lookup_xmlparser(reqtext)
748 5
    return packtext
749
750
751 5
def sr_lookup_poster(query, server, session=None):
752
    """
753
    Post the XML payload for a software release lookup.
754
755
    :param query: XML payload.
756
    :type query: str
757
758
    :param server: Server to use.
759
    :type server: str
760
761
    :param session: Requests session object, default is created on the fly.
762
    :type session: requests.Session()
763
    """
764 5
    session = generic_session(session)
765 5
    header = {"Content-Type": "text/xml;charset=UTF-8"}
766 5
    try:
767 5
        req = session.post(server, headers=header, data=query, timeout=1)
768 5
    except (requests.exceptions.Timeout, requests.exceptions.ConnectionError):
769 5
        reqtext = "SR not in system"
770
    else:
771 5
        reqtext = req.text
772 5
    return reqtext
773
774
775 5
def sr_lookup_xmlparser(reqtext):
776
    """
777
    Take the text of a software lookup request response and parse it as XML.
778
779
    :param reqtext: Response text, hopefully XML formatted.
780
    :type reqtext: str
781
    """
782 5
    try:
783 5
        root = ElementTree.fromstring(reqtext)
784 5
    except ElementTree.ParseError:
785 5
        packtext = "SR not in system"
786
    else:
787 5
        packtext = sr_lookup_extractor(root)
788 5
    return packtext
789
790
791 5
def sr_lookup_extractor(root):
792
    """
793
    Take an ElementTree and extract a software release from it.
794
795
    :param root: ElementTree we're barking up.
796
    :type root: xml.etree.ElementTree.ElementTree
797
    """
798 5
    reg = re.compile(r"(\d{1,4}\.)(\d{1,4}\.)(\d{1,4}\.)(\d{1,4})")
799 5
    packages = root.findall('./data/content/')
800 5
    for package in packages:
801 5
        if package.text is not None:
802 5
            match = reg.match(package.text)
803 5
            packtext = package.text if match else "SR not in system"
804 5
            return packtext
805
806
807 5
def sr_lookup_bootstrap(osv, session=None, no2=False):
808
    """
809
    Run lookups for each server for given OS.
810
811
    :param osv: OS to check.
812
    :type osv: str
813
814
    :param session: Requests session object, default is created on the fly.
815
    :type session: requests.Session()
816
817
    :param no2: Whether to skip Alpha2/Beta2 servers. Default is false.
818
    :type no2: bool
819
    """
820 5
    with concurrent.futures.ThreadPoolExecutor(max_workers=5) as xec:
821 5
        try:
822 5
            results = {
823
                "p": None,
824
                "a1": None,
825
                "a2": None,
826
                "b1": None,
827
                "b2": None
828
            }
829 5
            if no2:
830 5
                del results["a2"]
831 5
                del results["b2"]
832 5
            for key in results:
833 5
                results[key] = xec.submit(sr_lookup, osv, SERVERS[key], session).result()
834 5
            return results
835 5
        except KeyboardInterrupt:
836 5
            xec.shutdown(wait=False)
837
838
839 5
@pem_wrapper
840 5
def available_bundle_lookup(mcc, mnc, device, session=None):
841
    """
842
    Check which software releases were ever released for a carrier.
843
844
    :param mcc: Country code.
845
    :type mcc: int
846
847
    :param mnc: Network code.
848
    :type mnc: int
849
850
    :param device: Hexadecimal hardware ID.
851
    :type device: str
852
853
    :param session: Requests session object, default is created on the fly.
854
    :type session: requests.Session()
855
    """
856 5
    session = generic_session(session)
857 5
    server = "https://cs.sl.blackberry.com/cse/availableBundles/1.0.0/"
858 5
    npc = return_npc(mcc, mnc)
859 5
    query = '<?xml version="1.0" encoding="UTF-8"?>'
860 5
    query += '<availableBundlesRequest version="1.0.0" '
861 5
    query += 'authEchoTS="1366644680359">'
862 5
    query += '<deviceId><pin>0x2FFFFFB3</pin></deviceId>'
863 5
    query += '<clientProperties><hardware><id>0x{0}</id>'.format(device)
864 5
    query += '<isBootROMSecure>true</isBootROMSecure></hardware>'
865 5
    query += '<network><vendorId>0x0</vendorId><homeNPC>0x{0}</homeNPC>'.format(npc)
866 5
    query += '<currentNPC>0x{0}</currentNPC></network><software>'.format(npc)
867 5
    query += '<currentLocale>en_US</currentLocale>'
868 5
    query += '<legalLocale>en_US</legalLocale>'
869 5
    query += '<osVersion>10.0.0.0</osVersion>'
870 5
    query += '<radioVersion>10.0.0.0</radioVersion></software>'
871 5
    query += '</clientProperties><updateDirectives><bundleVersionFilter>'
872 5
    query += '</bundleVersionFilter></updateDirectives>'
873 5
    query += '</availableBundlesRequest>'
874 5
    header = {"Content-Type": "text/xml;charset=UTF-8"}
875 5
    req = session.post(server, headers=header, data=query)
876 5
    root = ElementTree.fromstring(req.text)
877 5
    package = root.find('./data/content')
878 5
    bundlelist = [child.attrib["version"] for child in package]
879 5
    return bundlelist
880
881
882 5
@pem_wrapper
883 5
def ptcrb_scraper(ptcrbid, session=None):
884
    """
885
    Get the PTCRB results for a given device.
886
887
    :param ptcrbid: Numerical ID from PTCRB (end of URL).
888
    :type ptcrbid: str
889
890
    :param session: Requests session object, default is created on the fly.
891
    :type session: requests.Session()
892
    """
893 5
    baseurl = "https://www.ptcrb.com/certified-devices/device-details/?model={0}".format(ptcrbid)
894 5
    sess = generic_session(session)
895 5
    sess.headers.update({"User-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.79 Safari/537.36"})
896 5
    soup = generic_soup_parser(baseurl, sess)
897 5
    certtable = soup.find_all("table")[1]
898 5
    tds = certtable.find_all("td")[1::2]  # every other
899 5
    prelimlist = [tdx.text for tdx in tds]
900 5
    cleanlist = [ptcrb_item_cleaner(item.strip()) for item in prelimlist]
901 5
    return cleanlist
902
903
904 5
def space_pad(instring, minlength):
905
    """
906
    Pad a string with spaces until it's the minimum length.
907
908
    :param instring: String to pad.
909
    :type instring: str
910
911
    :param minlength: Pad while len(instring) < minlength.
912
    :type minlength: int
913
    """
914 5
    while len(instring) < minlength:
915 5
        instring += " "
916 5
    return instring
917
918
919 5
def ptcrb_cleaner_multios(item):
920
    """
921
    Discard multiple entries for "OS".
922
923
    :param item: The item to clean.
924
    :type item: str
925
    """
926 5
    if item.count("OS") > 1:
927 5
        templist = item.split("OS")
928 5
        templist[0] = "OS"
929 5
        item = "".join([templist[0], templist[1]])
930 5
    return item
931
932
933 5
def ptcrb_cleaner_spaces(item):
934
    """
935
    Pad item with spaces to the right length.
936
937
    :param item: The item to clean.
938
    :type item: str
939
    """
940 5
    spaclist = item.split(" ")
941 5
    if len(spaclist) > 1:
942 5
        spaclist[1] = space_pad(spaclist[1], 11)
943 5
    if len(spaclist) > 3:
944 5
        spaclist[3] = space_pad(spaclist[3], 11)
945 5
    item = " ".join(spaclist)
946 5
    return item
947
948
949 5
def ptcrb_item_cleaner(item):
950
    """
951
    Cleanup poorly formatted PTCRB entries written by an intern.
952
953
    :param item: The item to clean.
954
    :type item: str
955
    """
956 5
    item = item.replace("<td>", "")
957 5
    item = item.replace("</td>", "")
958 5
    item = item.replace("\n", "")
959 5
    item = item.replace("SW: OS", "OS")
960 5
    item = item.replace("Software Version: OS", "OS")
961 5
    item = item.replace(" (SR", ", SR")
962 5
    item = re.sub(r"\s?\((.*)$", "", item)
963 5
    item = re.sub(r"\sSV.*$", "", item)
964 5
    item = item.replace(")", "")
965 5
    item = item.replace(". ", ".")
966 5
    item = item.replace(";", "")
967 5
    item = item.replace("version", "Version")
968 5
    item = item.replace("Verison", "Version")
969 5
    item = ptcrb_cleaner_multios(item)
970 5
    item = item.replace("SR10", "SR 10")
971 5
    item = item.replace("SR", "SW Release")
972 5
    item = item.replace(" Version:", ":")
973 5
    item = item.replace("Version ", " ")
974 5
    item = item.replace(":1", ": 1")
975 5
    item = item.replace(", ", " ")
976 5
    item = item.replace(",", " ")
977 5
    item = item.replace("Software", "SW")
978 5
    item = item.replace("  ", " ")
979 5
    item = item.replace("OS ", "OS: ")
980 5
    item = item.replace("Radio ", "Radio: ")
981 5
    item = item.replace("Release ", "Release: ")
982 5
    item = ptcrb_cleaner_spaces(item)
983 5
    item = item.strip()
984 5
    item = item.replace("\r", "")
985 5
    if item.startswith("10"):
986 5
        item = "OS: {0}".format(item)
987 5
    item = item.replace(":    ", ": ")
988 5
    item = item.replace(":   ", ": ")
989 5
    return item
990
991
992 5
@pem_wrapper
993 5
def kernel_scraper(utils=False, session=None):
994
    """
995
    Scrape BlackBerry's GitHub kernel repo for available branches.
996
997
    :param utils: Check android-utils repo instead of android-linux-kernel. Default is False.
998
    :type utils: bool
999
1000
    :param session: Requests session object, default is created on the fly.
1001
    :type session: requests.Session()
1002
    """
1003 5
    repo = "android-utils" if utils else "android-linux-kernel"
1004 5
    kernlist = []
1005 5
    sess = generic_session(session)
1006 5
    for page in range(1, 10):
1007 5
        url = "https://github.com/blackberry/{0}/branches/all?page={1}".format(repo, page)
1008 5
        soup = generic_soup_parser(url, sess)
1009 5
        if soup.find("div", {"class": "no-results-message"}):
1010 5
            break
1011
        else:
1012 5
            text = soup.get_text()
1013 5
            kernlist.extend(re.findall(r"msm[0-9]{4}\/[A-Z0-9]{6}", text, re.IGNORECASE))
1014 5
    return kernlist
1015
1016
1017 5
def root_generator(folder, build, variant="common"):
1018
    """
1019
    Generate roots for the SHAxxx hash lookup URLs.
1020
1021
    :param folder: Dictionary of variant: loader name pairs.
1022
    :type folder: dict(str: str)
1023
1024
    :param build: Build to check, 3 letters + 3 numbers.
1025
    :type build: str
1026
1027
    :param variant: Autoloader variant. Default is "common".
1028
    :type variant: str
1029
    """
1030
    #Priv specific
1031 5
    privx = "bbfoundation/hashfiles_priv/{0}".format(folder[variant])
1032
    #DTEK50 specific
1033 5
    dtek50x = "bbSupport/DTEK50" if build[:3] == "AAF" else "bbfoundation/hashfiles_priv/dtek50"
1034
    #DTEK60 specific
1035 5
    dtek60x = dtek50x  # still uses dtek50 folder, for some reason
1036
    #Pack it up
1037 5
    roots = {"Priv": privx, "DTEK50": dtek50x, "DTEK60": dtek60x}
1038 5
    return roots
1039
1040
1041 5
def make_droid_skeleton_bbm(method, build, device, variant="common"):
1042
    """
1043
    Make an Android autoloader/hash URL, on the BB Mobile site.
1044
1045
    :param method: None for regular OS links, "sha256/512" for SHA256 or 512 hash.
1046
    :type method: str
1047
1048
    :param build: Build to check, 3 letters + 3 numbers.
1049
    :type build: str
1050
1051
    :param device: Device to check.
1052
    :type device: str
1053
1054
    :param variant: Autoloader variant. Default is "common".
1055
    :type variant: str
1056
    """
1057 5
    devices = {"KEYone": "qc8953"}
1058 5
    base = "bbry_{2}_autoloader_user-{0}-{1}".format(variant, build.upper(), devices[device])
1059 5
    if method is None:
1060 5
        skel = "http://54.247.87.13/softwareupgrade/BBM/{0}.zip".format(base)
1061
    else:
1062 5
        skel = "http://54.247.87.13/softwareupgrade/BBM/{0}.{1}sum".format(base, method.lower())
1063 5
    return skel
1064
1065
1066 5
def make_droid_skeleton_og(method, build, device, variant="common"):
1067
    """
1068
    Make an Android autoloader/hash URL, on the original site.
1069
1070
    :param method: None for regular OS links, "sha256/512" for SHA256 or 512 hash.
1071
    :type method: str
1072
1073
    :param build: Build to check, 3 letters + 3 numbers.
1074
    :type build: str
1075
1076
    :param device: Device to check.
1077
    :type device: str
1078
1079
    :param variant: Autoloader variant. Default is "common".
1080
    :type variant: str
1081
    """
1082 5
    folder = {"vzw-vzw": "verizon", "na-att": "att", "na-tmo": "tmo", "common": "default"}
1083 5
    devices = {"Priv": "qc8992", "DTEK50": "qc8952_64_sfi", "DTEK60": "qc8996"}
1084 5
    roots = root_generator(folder, build, variant)
1085 5
    base = "bbry_{2}_autoloader_user-{0}-{1}".format(variant, build.upper(), devices[device])
1086 5
    if method is None:
1087 5
        skel = "https://bbapps.download.blackberry.com/Priv/{0}.zip".format(base)
1088
    else:
1089 5
        skel = "https://ca.blackberry.com/content/dam/{1}/{0}.{2}sum".format(base, roots[device], method.lower())
1090 5
    return skel
1091
1092
1093 5
def make_droid_skeleton(method, build, device, variant="common"):
1094
    """
1095
    Make an Android autoloader/hash URL.
1096
1097
    :param method: None for regular OS links, "sha256/512" for SHA256 or 512 hash.
1098
    :type method: str
1099
1100
    :param build: Build to check, 3 letters + 3 numbers.
1101
    :type build: str
1102
1103
    :param device: Device to check.
1104
    :type device: str
1105
1106
    :param variant: Autoloader variant. Default is "common".
1107
    :type variant: str
1108
    """
1109
    # No Aurora
1110 5
    oglist = ("Priv", "DTEK50", "DTEK60")  # BlackBerry
1111 5
    bbmlist = ("KEYone")   # BB Mobile
1112 5
    if device in oglist:
1113 5
        skel = make_droid_skeleton_og(method, build, device, variant)
1114 5
    elif device in bbmlist:
1115 5
        skel = make_droid_skeleton_bbm(method, build, device, variant)
1116 5
    return skel
1117
1118
1119 5
def bulk_droid_skeletons(devs, build, method=None):
1120
    """
1121
    Prepare list of Android autoloader/hash URLs.
1122
1123
    :param devs: List of devices.
1124
    :type devs: list(str)
1125
1126
    :param build: Build to check, 3 letters + 3 numbers.
1127
    :type build: str
1128
1129
    :param method: None for regular OS links, "sha256/512" for SHA256 or 512 hash.
1130
    :type method: str
1131
    """
1132 5
    carrier_variants = {
1133
        "Priv": ("common", "vzw-vzw", "na-tmo", "na-att"),
1134
        "KEYone": ("common", "usa-vzw", "usa-sprint", "global-att")  # verify this
1135
    }
1136 5
    common_variants = ("common", )  # for single-variant devices
1137 5
    carrier_devices = ("Priv", )  # add KEYone when verified
1138 5
    skels = []
1139 5
    for dev in devs:
1140 5
        varlist = carrier_variants[dev] if dev in carrier_devices else common_variants
1141 5
        for var in varlist:
1142 5
            skel = make_droid_skeleton(method, build, dev, var)
1143 5
            skels.append(skel)
1144 5
    return skels
1145
1146
1147 5
def prepare_droid_list(device):
1148
    """
1149
    Convert single devices to a list, if necessary.
1150
1151
    :param device: Device to check.
1152
    :type device: str
1153
    """
1154 5
    if isinstance(device, list):
1155 5
        devs = device
1156
    else:
1157 5
        devs = [device]
1158 5
    return devs
1159
1160
1161 5
def droid_scanner(build, device, method=None, session=None):
1162
    """
1163
    Check for Android autoloaders on BlackBerry's site.
1164
1165
    :param build: Build to check, 3 letters + 3 numbers.
1166
    :type build: str
1167
1168
    :param device: Device to check.
1169
    :type device: str
1170
1171
    :param method: None for regular OS links, "sha256/512" for SHA256 or 512 hash.
1172
    :type method: str
1173
1174
    :param session: Requests session object, default is created on the fly.
1175
    :type session: requests.Session()
1176
    """
1177 5
    devs = prepare_droid_list(device)
1178 5
    skels = bulk_droid_skeletons(devs, build, method)
1179 5
    with concurrent.futures.ThreadPoolExecutor(max_workers=len(skels)) as xec:
1180 5
        results = droid_scanner_worker(xec, skels, session)
1181 5
    return results if results else None
1182
1183
1184 5
def droid_scanner_worker(xec, skels, session=None):
1185
    """
1186
    Worker to check for Android autoloaders.
1187
1188
    :param xec: ThreadPoolExecutor instance.
1189
    :type xec: concurrent.futures.ThreadPoolExecutor
1190
1191
    :param skels: List of skeleton formats.
1192
    :type skels: list(str)
1193
1194
    :param session: Requests session object, default is created on the fly.
1195
    :type session: requests.Session()
1196
    """
1197 5
    results = []
1198 5
    for skel in skels:
1199 5
        avail = xec.submit(availability, skel, session)
1200 5
        if avail.result():
1201 5
            results.append(skel)
1202 5
    return results
1203
1204
1205 5
def chunker(iterable, inc):
1206
    """
1207
    Convert an iterable into a list of inc sized lists.
1208
1209
    :param iterable: Iterable to chunk.
1210
    :type iterable: list/tuple/string
1211
1212
    :param inc: Increment; how big each chunk is.
1213
    :type inc: int
1214
    """
1215 5
    chunks = [iterable[x:x+inc] for x in range(0, len(iterable), inc)]
1216 5
    return chunks
1217
1218
1219 5
def unicode_filter(intext):
1220
    """
1221
    Remove Unicode crap.
1222
1223
    :param intext: Text to filter.
1224
    :type intext: str
1225
    """
1226 5
    return intext.replace("\u2013", "").strip()
1227
1228
1229 5
def table_header_filter(ptag):
1230
    """
1231
    Validate p tag, to see if it's relevant.
1232
1233
    :param ptag: P tag.
1234
    :type ptag: bs4.element.Tag
1235
    """
1236 5
    valid = ptag.find("b") and "BlackBerry" in ptag.text and not "experts" in ptag.text
1237 5
    return valid
1238
1239
1240 5
def table_headers(pees):
1241
    """
1242
    Generate table headers from list of p tags.
1243
1244
    :param pees: List of p tags.
1245
    :type pees: list(bs4.element.Tag)
1246
    """
1247 5
    bolds = [x.text for x in pees if table_header_filter(x)]
1248 5
    return bolds
1249
1250
1251 5
@pem_wrapper
1252 5
def loader_page_scraper(session=None):
1253
    """
1254
    Return scraped autoloader pages.
1255
1256
    :param session: Requests session object, default is created on the fly.
1257
    :type session: requests.Session()
1258
    """
1259 5
    session = generic_session(session)
1260 5
    loader_page_scraper_og(session)
1261 5
    loader_page_scraper_bbm(session)
1262
1263
1264 5
def loader_page_scraper_og(session=None):
1265
    """
1266
    Return scraped autoloader page, original site.
1267
1268
    :param session: Requests session object, default is created on the fly.
1269
    :type session: requests.Session()
1270
    """
1271 5
    url = "https://ca.blackberry.com/support/smartphones/Android-OS-Reload.html"
1272 5
    soup = generic_soup_parser(url, session)
1273 5
    tables = soup.find_all("table")
1274 5
    headers = table_headers(soup.find_all("p"))
1275 5
    for idx, table in enumerate(tables):
1276 5
        loader_page_chunker_og(idx, table, headers)
1277
1278
1279 5
def loader_page_scraper_bbm(session=None):
1280
    """
1281
    Return scraped autoloader page, new site.
1282
1283
    :param session: Requests session object, default is created on the fly.
1284
    :type session: requests.Session()
1285
    """
1286 5
    url = "https://www.blackberrymobile.com/support/reload-software/"
1287 5
    soup = generic_soup_parser(url, session)
1288 5
    ulls = soup.find_all("ul", {"class": re.compile("list-two special-.")})[1:]
1289 5
    print("~~~BlackBerry KEYone~~~")
1290 5
    for ull in ulls:
1291 5
        loader_page_chunker_bbm(ull)
1292
1293
1294 5
def loader_page_chunker_og(idx, table, headers):
1295
    """
1296
    Given a loader page table, chunk it into lists of table cells.
1297
1298
    :param idx: Index of enumerating tables.
1299
    :type idx: int
1300
1301
    :param table: HTML table tag.
1302
    :type table: bs4.element.Tag
1303
1304
    :param headers: List of table headers.
1305
    :type headers: list(str)
1306
    """
1307 5
    print("~~~{0}~~~".format(headers[idx]))
1308 5
    chunks = chunker(table.find_all("td"), 4)
1309 5
    for chunk in chunks:
1310 5
        loader_page_printer(chunk)
1311 5
    print(" ")
1312
1313
1314 5
def loader_page_chunker_bbm(ull):
1315
    """
1316
    Given a loader page list, chunk it into lists of list items.
1317
1318
    :param ull: HTML unordered list tag.
1319
    :type ull: bs4.element.Tag
1320
    """
1321 5
    chunks = chunker(ull.find_all("li"), 3)
1322 5
    for chunk in chunks:
1323 5
        loader_page_printer(chunk)
1324
1325
1326 5
def loader_page_printer(chunk):
1327
    """
1328
    Print individual cell texts given a list of table cells.
1329
1330
    :param chunk: List of td tags.
1331
    :type chunk: list(bs4.element.Tag)
1332
    """
1333 5
    key = unicode_filter(chunk[0].text)
1334 5
    ver = unicode_filter(chunk[1].text)
1335 5
    link = unicode_filter(chunk[2].find("a")["href"])
1336 5
    print("{0}\n    {1}: {2}".format(key, ver, link))
1337
1338
1339 5
@pem_wrapper
1340 5
def base_metadata(url, session=None):
1341
    """
1342
    Get BBNDK metadata, base function.
1343
1344
    :param url: URL to check.
1345
    :type url: str
1346
1347
    :param session: Requests session object, default is created on the fly.
1348
    :type session: requests.Session()
1349
    """
1350 5
    session = generic_session(session)
1351 5
    req = session.get(url)
1352 5
    data = req.content
1353 5
    entries = data.split(b"\n")
1354 5
    metadata = [entry.split(b",")[1].decode("utf-8") for entry in entries if entry]
1355 5
    return metadata
1356
1357
1358 5
def ndk_metadata(session=None):
1359
    """
1360
    Get BBNDK target metadata.
1361
1362
    :param session: Requests session object, default is created on the fly.
1363
    :type session: requests.Session()
1364
    """
1365 5
    data = base_metadata("http://downloads.blackberry.com/upr/developers/update/bbndk/metadata", session)
1366 5
    metadata = [entry for entry in data if entry.startswith(("10.0", "10.1", "10.2"))]
1367 5
    return metadata
1368
1369
1370 5
def sim_metadata(session=None):
1371
    """
1372
    Get BBNDK simulator metadata.
1373
1374
    :param session: Requests session object, default is created on the fly.
1375
    :type session: requests.Session()
1376
    """
1377 5
    metadata = base_metadata("http://downloads.blackberry.com/upr/developers/update/bbndk/simulator/simulator_metadata", session)
1378 5
    return metadata
1379
1380
1381 5
def runtime_metadata(session=None):
1382
    """
1383
    Get BBNDK runtime metadata.
1384
1385
    :param session: Requests session object, default is created on the fly.
1386
    :type session: requests.Session()
1387
    """
1388 5
    metadata = base_metadata("http://downloads.blackberry.com/upr/developers/update/bbndk/runtime/runtime_metadata", session)
1389 5
    return metadata
1390
1391
1392 5
def series_generator(osversion):
1393
    """
1394
    Generate series/branch name from OS version.
1395
1396
    :param osversion: OS version.
1397
    :type osversion: str
1398
    """
1399 5
    splits = osversion.split(".")
1400 5
    return "BB{0}_{1}_{2}".format(*splits[0:3])
1401
1402
1403 5
@pem_wrapper
1404 5
def devalpha_urls(osversion, skel, session=None):
1405
    """
1406
    Check individual Dev Alpha autoloader URLs.
1407
1408
    :param osversion: OS version.
1409
    :type osversion: str
1410
1411
    :param skel: Individual skeleton format to try.
1412
    :type skel: str
1413
1414
    :param session: Requests session object, default is created on the fly.
1415
    :type session: requests.Session()
1416
    """
1417 5
    session = generic_session(session)
1418 5
    url = "http://downloads.blackberry.com/upr/developers/downloads/{0}{1}.exe".format(skel, osversion)
1419 5
    req = session.head(url)
1420 5
    if req.status_code == 200:
1421 5
        finals = (url, req.headers["content-length"])
1422
    else:
1423 5
        finals = ()
1424 5
    return finals
1425
1426
1427 5
def devalpha_urls_serieshandler(osversion, skeletons):
1428
    """
1429
    Process list of candidate Dev Alpha autoloader URLs.
1430
1431
    :param osversion: OS version.
1432
    :type osversion: str
1433
1434
    :param skeletons: List of skeleton formats to try.
1435
    :type skeletons: list
1436
    """
1437 5
    skels = skeletons
1438 5
    for idx, skel in enumerate(skeletons):
1439 5
        if "<SERIES>" in skel:
1440 5
            skels[idx] = skel.replace("<SERIES>", series_generator(osversion))
1441 5
    return skels
1442
1443
1444 5
def devalpha_urls_bulk(osversion, skeletons, xec, session=None):
1445
    """
1446
    Construct list of valid Dev Alpha autoloader URLs.
1447
1448
    :param osversion: OS version.
1449
    :type osversion: str
1450
1451
    :param skeletons: List of skeleton formats to try.
1452
    :type skeletons: list
1453
1454
    :param xec: ThreadPoolExecutor instance.
1455
    :type xec: concurrent.futures.ThreadPoolExecutor
1456
1457
    :param session: Requests session object, default is created on the fly.
1458
    :type session: requests.Session()
1459
    """
1460 5
    finals = {}
1461 5
    skels = devalpha_urls_serieshandler(osversion, skeletons)
1462 5
    for skel in skels:
1463 5
        final = xec.submit(devalpha_urls, osversion, skel, session).result()
1464 5
        if final:
1465 5
            finals[final[0]] = final[1]
1466 5
    return finals
1467
1468
1469 5
def devalpha_urls_bootstrap(osversion, skeletons, session=None):
1470
    """
1471
    Get list of valid Dev Alpha autoloader URLs.
1472
1473
    :param osversion: OS version.
1474
    :type osversion: str
1475
1476
    :param skeletons: List of skeleton formats to try.
1477
    :type skeletons: list
1478
1479
    :param session: Requests session object, default is created on the fly.
1480
    :type session: requests.Session()
1481
    """
1482 5
    with concurrent.futures.ThreadPoolExecutor(max_workers=5) as xec:
1483 5
        try:
1484 5
            return devalpha_urls_bulk(osversion, skeletons, xec, session)
1485 5
        except KeyboardInterrupt:
1486 5
            xec.shutdown(wait=False)
1487
1488
1489 5
def dev_dupe_dicter(finals):
1490
    """
1491
    Prepare dictionary to clean duplicate autoloaders.
1492
1493
    :param finals: Dict of URL:content-length pairs.
1494
    :type finals: dict(str: str)
1495
    """
1496 5
    revo = {}
1497 5
    for key, val in finals.items():
1498 5
        revo.setdefault(val, set()).add(key)
1499 5
    return revo
1500
1501
1502 5
def dev_dupe_remover(finals, dupelist):
1503
    """
1504
    Filter dictionary of autoloader entries.
1505
1506
    :param finals: Dict of URL:content-length pairs.
1507
    :type finals: dict(str: str)
1508
1509
    :param dupelist: List of duplicate URLs.
1510
    :type duplist: list(str)
1511
    """
1512 5
    for dupe in dupelist:
1513 5
        for entry in dupe:
1514 5
            if "DevAlpha" in entry:
1515 5
                del finals[entry]
1516 5
    return finals
1517
1518
1519 5
def dev_dupe_cleaner(finals):
1520
    """
1521
    Clean duplicate autoloader entries.
1522
1523
    :param finals: Dict of URL:content-length pairs.
1524
    :type finals: dict(str: str)
1525
    """
1526 5
    revo = dev_dupe_dicter(finals)
1527 5
    dupelist = [val for key, val in revo.items() if len(val) > 1]
1528 5
    finals = dev_dupe_remover(finals, dupelist)
1529
    return finals
1530