summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChristian Heimes <cheimes@redhat.com>2016-02-25 12:46:35 +0100
committerChristian Heimes <cheimes@redhat.com>2016-02-26 17:40:10 +0100
commit1f2d7dbab0e6a7b26f7aa12b8a58fb4c3a6da825 (patch)
tree9b403961cc55a87dd70ab26271580e804343101f
parent263dc2152640a95c8ca9b2829e74cce3a877f077 (diff)
downloadpki-1f2d7dbab0e6a7b26f7aa12b8a58fb4c3a6da825.tar.gz
pki-1f2d7dbab0e6a7b26f7aa12b8a58fb4c3a6da825.tar.xz
pki-1f2d7dbab0e6a7b26f7aa12b8a58fb4c3a6da825.zip
Silence pylint 1.5 false positives
Pylint 1.5 complains about additional issues. All issues are false positives. https://fedorahosted.org/pki/attachment/ticket/2223
-rw-r--r--base/common/python/pki/cert.py10
-rw-r--r--base/common/python/pki/systemcert.py1
2 files changed, 5 insertions, 6 deletions
diff --git a/base/common/python/pki/cert.py b/base/common/python/pki/cert.py
index c03bf6007..05db87c73 100644
--- a/base/common/python/pki/cert.py
+++ b/base/common/python/pki/cert.py
@@ -603,12 +603,10 @@ class CertReviewResponse(CertEnrollmentRequest):
profile_policy_sets = attr_list['ProfilePolicySet']
if not isinstance(profile_policy_sets, list):
- review_response.policy_sets.append(
- profile.ProfilePolicySet.from_json(profile_policy_sets))
- else:
- for policy_set in profile_policy_sets:
- review_response.policy_sets.append(
- profile.ProfilePolicySet.from_json(policy_set))
+ profile_policy_sets = [profile_policy_sets]
+ for policy_set in profile_policy_sets:
+ review_response.policy_sets.append( # pylint: disable=E1101
+ profile.ProfilePolicySet.from_json(policy_set))
return review_response
diff --git a/base/common/python/pki/systemcert.py b/base/common/python/pki/systemcert.py
index a7d4e1c71..ed41be96c 100644
--- a/base/common/python/pki/systemcert.py
+++ b/base/common/python/pki/systemcert.py
@@ -54,6 +54,7 @@ class SystemCertClient(object):
cert_data = CertData.from_json(response.json())
pem = cert_data.encoded
+ # pylint: disable=E0012,E1136
b64 = pem[len(pki.CERT_HEADER):len(pem) - len(pki.CERT_FOOTER)]
cert_data.binary = decode_cert(b64)