Left: | ||
Right: |
OLD | NEW |
---|---|
(Empty) | |
1 # coding: utf-8 | |
2 | |
3 # This Source Code is subject to the terms of the Mozilla Public License | |
4 # version 2.0 (the "License"). You can obtain a copy of the License at | |
5 # http://mozilla.org/MPL/2.0/. | |
6 | |
7 import os, re, subprocess | |
8 from sitescripts.utils import get_config | |
9 | |
10 def hg(args): | |
11 return subprocess.Popen(["hg"] + args, stdout = subprocess.PIPE) | |
12 | |
13 def extract_urls(filter_list_dir): | |
14 os.chdir(filter_list_dir) | |
15 process = hg(["log", "--template", "{desc}\n"]) | |
16 urls = set([]) | |
17 | |
18 while True: | |
19 line = process.stdout.readline() | |
20 if line == "": | |
21 break | |
22 | |
23 matches = re.match(r"[A-Z]:.*(https?://.*)", line) | |
Wladimir Palant
2012/09/14 14:42:14
What if the URL is followed by some additional inf
| |
24 if not matches: | |
25 continue | |
26 | |
27 url = matches.group(1).strip() | |
28 urls.add(url) | |
29 | |
30 return urls | |
31 | |
32 def print_statements(urls): | |
33 for url in urls: | |
34 print "INSERT INTO crawler_sites (url) VALUES ('" + url + "');" | |
Wladimir Palant
2012/09/14 14:42:14
SQL injection? :-(
| |
35 | |
36 if __name__ == "__main__": | |
37 filter_list_dir = get_config().get("crawler", "filter_list_repository") | |
38 urls = extract_urls(filter_list_dir) | |
39 print_statements(urls) | |
OLD | NEW |