Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Discussion] PEP-8 compliance #43

Open
CRImier opened this issue Dec 20, 2017 · 8 comments
Open

[Discussion] PEP-8 compliance #43

CRImier opened this issue Dec 20, 2017 · 8 comments

Comments

@CRImier
Copy link
Member

CRImier commented Dec 20, 2017

Following #24 (and CRImier/pyLCI#1, it'd be great to have PEP-8 and PEP-257 compliance. My ideas about this:

  1. Bring the current code into compliance
  2. Add instructions for contributors so that they can automatically check their contributions
  3. Research (if available, add) automated hooks for checking (and/or enforcing) PEP-8 compliance
@j340m3
Copy link

j340m3 commented Sep 11, 2018

You could check flake8 for PEP-8 compliance. I integrated it also to my travis-ci build. It works flawlessly.

I've never checked for PEP-257 compliance, but there seems to be something that does the job.

@CRImier
Copy link
Member Author

CRImier commented Sep 12, 2018

Do you have a link to your .travis.yml file?

@j340m3
Copy link

j340m3 commented Sep 12, 2018

I used tox. So mine is way more complicated. But here you are: .travis.yml

@CRImier
Copy link
Member Author

CRImier commented Sep 12, 2018

I see, flake8 is covered by tox, then. BTW, in your .travis.yml, why is env->global->secure (which looks like something secure =D ) not in Travis env vars?

@j340m3
Copy link

j340m3 commented Sep 12, 2018

Yes, it is my encrypted pypi password, so that travis can upload on success to pypi without me having to type in the password.

I followed a manual, and they have put it there, and it works. I fear touching the configuration again for such minor things 🙈.

@CRImier
Copy link
Member Author

CRImier commented Sep 12, 2018

=D Got it! I sure hope nobody can use this secret to upload on your behalf, lest we get more PyPi malware - so if that's the case, consider regenerating it and sticking it into the envvars =D

@j340m3
Copy link

j340m3 commented Sep 12, 2018

If they are able to merge into main without my permission, they can upload, otherwise you need to fake the webhook of the push and you need to guess my private key stored in the github server. So it is possible but very unlikely.

Actually how I did it in my repo is how most projects with automated pypi upload handle it.

@CRImier
Copy link
Member Author

CRImier commented Sep 12, 2018

I see, makes sense. Let's be on the look out for any GH exploits, then =D

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants