Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit d00e4a4

Browse files
committed
Code cleanup
1 parent 72f3674 commit d00e4a4

10 files changed

Lines changed: 19 additions & 18 deletions

File tree

lib/controller/controller.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,7 @@ def start():
174174

175175
if __paramDict:
176176
conf.paramDict["Cookie"] = __paramDict
177+
# TODO: consider the following line in __setRequestParams()
177178
__testableParameters = True
178179

179180
if not kb.injPlace or not kb.injParameter or not kb.injType:

lib/controller/handler.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,12 +68,12 @@ def setHandler():
6868

6969
continue
7070

71-
dbmsHandler = dbmsEntry()
71+
handler = dbmsEntry()
7272

73-
if dbmsHandler.checkDbms():
73+
if handler.checkDbms():
7474
if not conf.dbms or conf.dbms in dbmsAliases:
7575
kb.dbmsDetected = True
7676

77-
return dbmsHandler
77+
return handler
7878

7979
return None

lib/core/common.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -736,15 +736,15 @@ def getDelayQuery(andCond=False):
736736

737737
else:
738738
query = queries[kb.dbms].timedelay2 % conf.timeSec
739-
elif kb.dbms is "Firebird":
739+
elif kb.dbms == "Firebird":
740740
query = queries[kb.dbms].timedelay
741741
else:
742742
query = queries[kb.dbms].timedelay % conf.timeSec
743743

744744
if andCond:
745745
if kb.dbms in ( "MySQL", "SQLite" ):
746746
query = query.replace("SELECT ", "")
747-
elif kb.dbms is "Firebird":
747+
elif kb.dbms == "Firebird":
748748
query = "(%s)>0" % query
749749

750750
return query
@@ -914,19 +914,23 @@ def sanitizeAsciiString(string):
914914

915915
def decloakToNamedTemporaryFile(filepath, name=None):
916916
retVal = NamedTemporaryFile()
917+
917918
def __del__():
918919
try:
919920
if hasattr(retVal, 'old_name'):
920921
retVal.name = old_name
921922
retVal.close()
922923
except OSError:
923924
pass
925+
924926
retVal.__del__ = __del__
925927
retVal.write(decloak(filepath))
926928
retVal.seek(0)
929+
927930
if name:
928931
retVal.old_name = retVal.name
929932
retVal.name = name
933+
930934
return retVal
931935

932936
def decloakToMkstemp(filepath, **kwargs):

lib/core/dump.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ def userSettings(self, header, userSettings, subHeader):
125125
print
126126

127127
def dbColumns(self, dbColumns, colConsider, dbs):
128-
for column, dbTables in dbColumns.items():
128+
for column in dbColumns.keys():
129129
if colConsider == "1":
130130
colConsiderStr = "s like '" + column + "' were"
131131
else:

lib/core/option.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -632,9 +632,9 @@ def __setHTTPAuthentication():
632632
key_file = os.path.expanduser(aCertRegExp.group(1))
633633
cert_file = os.path.expanduser(aCertRegExp.group(2))
634634

635-
for file in (key_file, cert_file):
636-
if not os.path.exists(file):
637-
errMsg = "File '%s' doesn't exist" % file
635+
for ifile in (key_file, cert_file):
636+
if not os.path.exists(ifile):
637+
errMsg = "File '%s' does not exist" % ifile
638638
raise sqlmapSyntaxException, errMsg
639639

640640
authHandler = HTTPSCertAuthHandler(key_file, cert_file)

lib/core/update.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,6 @@
4747
from lib.core.exception import sqlmapConnectionException
4848
from lib.core.exception import sqlmapFilePathException
4949
from lib.core.settings import MSSQL_VERSIONS_URL
50-
from lib.core.settings import VERSION
5150
from lib.request.connect import Connect as Request
5251

5352
def __updateMSSQLXML():

lib/takeover/metasploit.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@
3232
from subprocess import PIPE
3333
from subprocess import Popen as execute
3434

35-
from lib.core.agent import agent
3635
from lib.core.common import dataToStdout
3736
from lib.core.common import getLocalIP
3837
from lib.core.common import getRemoteIP

lib/takeover/registry.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@
2626

2727
from lib.core.common import randomStr
2828
from lib.core.data import conf
29-
from lib.core.data import kb
3029
from lib.core.data import logger
3130

3231
class Registry:

lib/takeover/udf.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ def udfSetLocalPaths(self):
139139
errMsg = "udfSetLocalPaths() method must be defined within the plugin"
140140
raise sqlmapUnsupportedFeatureException(errMsg)
141141

142-
def udfCreateFromSharedLib(self):
142+
def udfCreateFromSharedLib(self, udf=None, inpRet=None):
143143
errMsg = "udfCreateFromSharedLib() method must be defined within the plugin"
144144
raise sqlmapUnsupportedFeatureException(errMsg)
145145

@@ -182,7 +182,7 @@ def udfInjectCustom(self):
182182

183183
self.checkDbmsOs()
184184

185-
if self.isDba() == False:
185+
if not self.isDba():
186186
warnMsg = "the functionality requested might not work because "
187187
warnMsg += "the session user is not a database administrator"
188188
logger.warn(warnMsg)
@@ -317,7 +317,7 @@ def udfInjectCustom(self):
317317
udfList = []
318318
msg = "which UDF do you want to call?"
319319

320-
for udf, inpRet in self.udfs.items():
320+
for udf in self.udfs.keys():
321321
udfList.append(udf)
322322
msg += "\n[%d] %s" % (len(udfList), udf)
323323

lib/utils/google.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,10 @@ class Google:
3939
line option '-g <google dork>'
4040
"""
4141

42-
def __init__(self, proxyHandler):
43-
self.__googleCookie = None
42+
def __init__(self, proxy):
4443
self.__matches = []
4544
self.__cj = cookielib.LWPCookieJar()
46-
self.opener = urllib2.build_opener(proxyHandler, urllib2.HTTPCookieProcessor(self.__cj))
45+
self.opener = urllib2.build_opener(proxy, urllib2.HTTPCookieProcessor(self.__cj))
4746
self.opener.addheaders = conf.httpHeaders
4847

4948
def __parsePage(self, page):

0 commit comments

Comments
 (0)