diff --git a/examples/save_and_load_private_key_file.py b/examples/save_and_load_private_key_file.py index 35844159807ab7dca91ccfa0268bd6e4fc7a3232..19fe369845af564d6cea712043b5583d4fa94b21 100644 --- a/examples/save_and_load_private_key_file.py +++ b/examples/save_and_load_private_key_file.py @@ -1,6 +1,7 @@ from duniterpy.key import SigningKey import getpass import os +import sys if "XDG_CONFIG_HOME" in os.environ: home_path = os.environ["XDG_CONFIG_HOME"] @@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password) # check public key if signer.pubkey != pubkey: print("Bad credentials!") - exit(1) + sys.exit(1) # save private keys in a file (json format) signer.save_private_key(PRIVATE_KEYS_FILE_PATH) @@ -49,4 +50,4 @@ loaded_signer = SigningKey.from_private_key(PRIVATE_KEYS_FILE_PATH) # type: Sig # check public key from file print("Public key %s loaded from file %s" % (pubkey, PRIVATE_KEYS_FILE_PATH)) -exit(0) +sys.exit(0) diff --git a/examples/save_and_load_private_key_file_ewif.py b/examples/save_and_load_private_key_file_ewif.py index 563bd1ce8976f60ac38b4fb742107eb436e61e09..55307829818125ad02483765468110f5a393483e 100644 --- a/examples/save_and_load_private_key_file_ewif.py +++ b/examples/save_and_load_private_key_file_ewif.py @@ -1,6 +1,7 @@ from duniterpy.key import SigningKey import getpass import os +import sys if "XDG_CONFIG_HOME" in os.environ: home_path = os.environ["XDG_CONFIG_HOME"] @@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password) # check public key if signer.pubkey != pubkey: print("Bad credentials!") - exit(1) + sys.exit(1) # prompt hidden user entry ewif_password = getpass.getpass("Enter an encryption password: ") @@ -62,7 +63,7 @@ try: except IOError as error: print(error) - exit(1) + sys.exit(1) -exit(0) +sys.exit(0) diff --git a/examples/save_and_load_private_key_file_pubsec.py b/examples/save_and_load_private_key_file_pubsec.py index b63998d1340cd9cc401bc8a9e9a945c6bf5e5d2a..082f491a5263cfcb972bdca7890dbd85f0a3110c 100644 --- a/examples/save_and_load_private_key_file_pubsec.py +++ b/examples/save_and_load_private_key_file_pubsec.py @@ -1,6 +1,7 @@ from duniterpy.key import SigningKey import getpass import os +import sys if "XDG_CONFIG_HOME" in os.environ: home_path = os.environ["XDG_CONFIG_HOME"] @@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password) # check public key if signer.pubkey != pubkey: print("Bad credentials!") - exit(1) + sys.exit(1) # save private key in a file (PubSec v1 format) signer.save_pubsec_file(PRIVATE_KEY_FILE_PATH) @@ -57,7 +58,7 @@ try: except IOError as error: print(error) - exit(1) + sys.exit(1) -exit(0) +sys.exit(0) diff --git a/examples/save_and_load_private_key_file_wif.py b/examples/save_and_load_private_key_file_wif.py index afc627b234158e731f18a3222de98473ba2a60e9..6f069398db8fc00c66754a95a3698f467a61de8b 100644 --- a/examples/save_and_load_private_key_file_wif.py +++ b/examples/save_and_load_private_key_file_wif.py @@ -1,6 +1,7 @@ from duniterpy.key import SigningKey import getpass import os +import sys if "XDG_CONFIG_HOME" in os.environ: home_path = os.environ["XDG_CONFIG_HOME"] @@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password) # check public key if signer.pubkey != pubkey: print("Bad credentials!") - exit(1) + sys.exit(1) # save private key in a file (WIF v1 format) signer.save_wif_file(PRIVATE_KEY_FILE_PATH) @@ -57,7 +58,7 @@ try: except IOError as error: print(error) - exit(1) + sys.exit(1) -exit(0) +sys.exit(0) diff --git a/examples/save_revoke_document.py b/examples/save_revoke_document.py index 2406da7561a705f3c01d73483544f62aafb3c0e2..ffac355d5d84e269539e49113fbe29cce13ad5a9 100644 --- a/examples/save_revoke_document.py +++ b/examples/save_revoke_document.py @@ -1,6 +1,7 @@ import asyncio import getpass import os +import sys from typing import Optional import duniterpy.api.bma as bma @@ -123,7 +124,7 @@ async def main(): # check public key if signer.pubkey != pubkey: print("Bad credentials!") - exit(0) + sys.exit(0) # capture current block to get currency name current_block = await client(bma.blockchain.current) @@ -134,7 +135,7 @@ async def main(): print("Identity not found for pubkey {0}".format(pubkey)) # Close client aiohttp session await client.close() - exit(1) + sys.exit(1) # get the revoke document revocation_signed_raw_document = get_signed_raw_revocation_document( diff --git a/examples/send_certification.py b/examples/send_certification.py index a8af221d434dc97056e8962ab130ec997e202c65..1b103c47d7e4146c34b400dfee83c2aec3a71c95 100644 --- a/examples/send_certification.py +++ b/examples/send_certification.py @@ -1,3 +1,4 @@ +import sys import asyncio import getpass from typing import Optional @@ -114,7 +115,7 @@ async def main(): print("Identity not found for pubkey {0}".format(pubkey_to)) # Close client aiohttp session await client.close() - exit(1) + sys.exit(1) # send the Certification document to the node certification = get_certification_document(current_block, identity, pubkey_from) diff --git a/examples/send_transaction.py b/examples/send_transaction.py index f52309f3d0de7e3b4d805cdafc824bf32686d705..fc34e869cd55a5604e527182e2881df8b3b638c5 100644 --- a/examples/send_transaction.py +++ b/examples/send_transaction.py @@ -1,3 +1,4 @@ +import sys import asyncio import getpass @@ -120,7 +121,7 @@ async def main(): if len(response["sources"]) == 0: print("no sources found for account %s" % pubkey_to) - exit(1) + sys.exit(1) # get the first source source = response["sources"][0]