diff options
author | Martin Basti <mbasti@redhat.com> | 2016-10-04 20:02:32 +0200 |
---|---|---|
committer | Martin Basti <mbasti@redhat.com> | 2016-10-06 10:43:36 +0200 |
commit | 135047d03c1780d682998369aaa531585b39a069 (patch) | |
tree | 13dfe4637a7f264bcc911b7bc1f36a8662ee1762 | |
parent | d9375881460d63cdd696bb0705da0ac205db9870 (diff) | |
download | freeipa-135047d03c1780d682998369aaa531585b39a069.tar.gz freeipa-135047d03c1780d682998369aaa531585b39a069.tar.xz freeipa-135047d03c1780d682998369aaa531585b39a069.zip |
Pylint: remove unused variables in ipaserver package
Reviewed-By: Stanislav Laznicka <slaznick@redhat.com>
-rw-r--r-- | ipaserver/dcerpc.py | 43 | ||||
-rw-r--r-- | ipaserver/plugins/aci.py | 10 | ||||
-rw-r--r-- | ipaserver/plugins/baseldap.py | 12 | ||||
-rw-r--r-- | ipaserver/plugins/cert.py | 10 | ||||
-rw-r--r-- | ipaserver/plugins/dns.py | 17 | ||||
-rw-r--r-- | ipaserver/plugins/dogtag.py | 27 | ||||
-rw-r--r-- | ipaserver/plugins/idrange.py | 6 | ||||
-rw-r--r-- | ipaserver/plugins/idviews.py | 8 | ||||
-rw-r--r-- | ipaserver/plugins/migration.py | 9 | ||||
-rw-r--r-- | ipaserver/plugins/permission.py | 5 | ||||
-rw-r--r-- | ipaserver/plugins/stageuser.py | 10 | ||||
-rw-r--r-- | ipaserver/plugins/trust.py | 34 | ||||
-rw-r--r-- | ipaserver/plugins/user.py | 6 | ||||
-rw-r--r-- | ipaserver/rpcserver.py | 5 |
14 files changed, 78 insertions, 124 deletions
diff --git a/ipaserver/dcerpc.py b/ipaserver/dcerpc.py index fd4e6d350..bd1d8c1ca 100644 --- a/ipaserver/dcerpc.py +++ b/ipaserver/dcerpc.py @@ -63,8 +63,6 @@ from ipaplatform.paths import paths from ldap.filter import escape_filter_chars from time import sleep -# pylint: disable=unused-variable - if six.PY3: unicode = str long = int @@ -220,7 +218,7 @@ class DomainValidator(object): self.sid = entry_attrs[self.ATTR_SID][0] self.dn = entry_attrs.dn self.domain = self.api.env.domain - except errors.NotFound as e: + except errors.NotFound: return False return True @@ -236,7 +234,7 @@ class DomainValidator(object): search_kw = {'objectClass': 'ipaNTTrustedDomain'} filter = self.ldap.make_filter(search_kw, rules=self.ldap.MATCH_ALL) - (entries, truncated) = self.ldap.find_entries( + entries, _truncated = self.ldap.find_entries( filter=filter, base_dn=cn_trust, attrs_list=[self.ATTR_TRUSTED_SID, @@ -438,7 +436,7 @@ class DomainValidator(object): try: test_sid = security.dom_sid(sid) return unicode(test_sid) - except TypeError as e: + except TypeError: raise errors.ValidationError(name=_('trusted domain object'), error=_('Trusted domain did not ' 'return a valid SID for ' @@ -756,7 +754,7 @@ class DomainValidator(object): if self._admin_creds: (ccache_name, - principal) = self.kinit_as_administrator(info['dns_domain']) + _principal) = self.kinit_as_administrator(info['dns_domain']) if ccache_name: with ipautil.private_ccache(path=ccache_name): @@ -909,9 +907,9 @@ class TrustDomainInstance(object): self._pipe = self.__gen_lsa_connection(binding) if self._pipe and self._pipe.session_key: break - except errors.ACIError as e: + except errors.ACIError: attempts = attempts + 1 - except RuntimeError as e: + except RuntimeError: # When session key is not available, we just skip this binding session_attempts = session_attempts + 1 @@ -976,7 +974,7 @@ class TrustDomainInstance(object): conn.set_option(_ldap.OPT_SERVER_CONTROLS, [ExtendedDNControl()]) search_result = None try: - (objtype, res) = conn.search_s('', _ldap.SCOPE_BASE)[0] + _objtype, res = conn.search_s('', _ldap.SCOPE_BASE)[0] search_result = res['defaultNamingContext'][0] self.info['dns_hostname'] = res['dnsHostName'][0] except _ldap.LDAPError as e: @@ -1426,25 +1424,6 @@ class TrustDomainInstance(object): def fetch_domains(api, mydomain, trustdomain, creds=None, server=None): - trust_flags = dict( - NETR_TRUST_FLAG_IN_FOREST=0x00000001, - NETR_TRUST_FLAG_OUTBOUND=0x00000002, - NETR_TRUST_FLAG_TREEROOT=0x00000004, - NETR_TRUST_FLAG_PRIMARY=0x00000008, - NETR_TRUST_FLAG_NATIVE=0x00000010, - NETR_TRUST_FLAG_INBOUND=0x00000020, - NETR_TRUST_FLAG_MIT_KRB5=0x00000080, - NETR_TRUST_FLAG_AES=0x00000100) - - trust_attributes = dict( - NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE=0x00000001, - NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY=0x00000002, - NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN=0x00000004, - NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE=0x00000008, - NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION=0x00000010, - NETR_TRUST_ATTRIBUTE_WITHIN_FOREST=0x00000020, - NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL=0x00000040) - def communicate(td): td.init_lsa_pipe(td.info['dc']) netr_pipe = netlogon.netlogon(td.binding, td.parm, td.creds) @@ -1492,12 +1471,12 @@ def fetch_domains(api, mydomain, trustdomain, creds=None, server=None): # or as passed-in user in case of a one-way trust domval = DomainValidator(api) ccache_name = None - principal = None if creds: domval._admin_creds = creds - (ccache_name, principal) = domval.kinit_as_administrator(trustdomain) + ccache_name, _principal = domval.kinit_as_administrator( + trustdomain) else: - (ccache_name, principal) = domval.kinit_as_http(trustdomain) + ccache_name, _principal = domval.kinit_as_http(trustdomain) td.creds = credentials.Credentials() td.creds.set_kerberos_state(credentials.MUST_USE_KERBEROS) if ccache_name: @@ -1683,7 +1662,7 @@ class TrustDomainJoins(object): self.remote_domain.establish_trust(self.local_domain, trustdom_pass, trust_type, trust_external) - except TrustTopologyConflictSolved as e: + except TrustTopologyConflictSolved: # we solved topology conflict, retry again self.remote_domain.establish_trust(self.local_domain, trustdom_pass, diff --git a/ipaserver/plugins/aci.py b/ipaserver/plugins/aci.py index 840652bda..6d847078b 100644 --- a/ipaserver/plugins/aci.py +++ b/ipaserver/plugins/aci.py @@ -132,8 +132,6 @@ from .baseldap import gen_pkey_only_option, pkey_to_value from ipapython.ipa_log_manager import root_logger from ipapython.dn import DN -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -293,7 +291,7 @@ def _make_aci(ldap, current, aciname, kw): if kw['filter'] in ('', None, u''): raise errors.BadSearchFilter(info=_('empty filter')) try: - entries = ldap.find_entries(filter=kw['filter']) + ldap.find_entries(filter=kw['filter']) except errors.NotFound: pass a.set_target_filter(kw['filter']) @@ -334,7 +332,7 @@ def _aci_to_kw(ldap, a, test=False, pkey_only=False): if 'targetfilter' in a.target: target = a.target['targetfilter']['expression'] if target.startswith('(memberOf=') or target.startswith('memberOf='): - (junk, memberof) = target.split('memberOf=', 1) + _junk, memberof = target.split('memberOf=', 1) memberof = DN(memberof) kw['memberof'] = memberof['cn'] else: @@ -394,7 +392,7 @@ def _convert_strings_to_acis(acistrs): for a in acistrs: try: acis.append(ACI(a)) - except SyntaxError as e: + except SyntaxError: root_logger.warning("Failed to parse: %s" % a) return acis @@ -946,7 +944,7 @@ class aci_rename(crud.Update): aci = _find_aci_by_name(acis, kw['aciprefix'], aciname) for a in acis: - prefix, name = _parse_aci_name(a.name) + prefix, _name = _parse_aci_name(a.name) if _make_aci_name(prefix, kw['newname']) == a.name: raise errors.DuplicateEntry() diff --git a/ipaserver/plugins/baseldap.py b/ipaserver/plugins/baseldap.py index fe47cbe1b..5770641a0 100644 --- a/ipaserver/plugins/baseldap.py +++ b/ipaserver/plugins/baseldap.py @@ -39,8 +39,6 @@ from ipalib.messages import add_message, SearchResultTruncated from ipapython.dn import DN from ipapython.version import API_VERSION -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -745,7 +743,7 @@ class LDAPObject(Object): for (pwattr, attr) in self.password_attributes: search_filter = '(%s=*)' % pwattr try: - (entries, truncated) = ldap.find_entries( + ldap.find_entries( search_filter, [pwattr], dn, ldap.SCOPE_BASE ) entry_attrs[attr] = True @@ -800,10 +798,10 @@ class LDAPObject(Object): attrs = self.api.Backend.ldap2.schema.attribute_types(objectclasses) attrlist = [] # Go through the MUST first - for (oid, attr) in attrs[0].items(): + for attr in attrs[0].values(): attrlist.append(attr.names[0].lower()) # And now the MAY - for (oid, attr) in attrs[1].items(): + for attr in attrs[1].values(): attrlist.append(attr.names[0].lower()) json_dict['aciattrs'] = attrlist attrlist.sort() @@ -846,7 +844,7 @@ def _check_limit_object_class(attributes, attrs, allow_only): return limitattrs = deepcopy(attrs) # Go through the MUST first - for (oid, attr) in attributes[0].items(): + for attr in attributes[0].values(): if attr.names[0].lower() in limitattrs: if not allow_only: raise errors.ObjectclassViolation( @@ -854,7 +852,7 @@ def _check_limit_object_class(attributes, attrs, allow_only): attribute=attr.names[0].lower())) limitattrs.remove(attr.names[0].lower()) # And now the MAY - for (oid, attr) in attributes[1].items(): + for attr in attributes[1].values(): if attr.names[0].lower() in limitattrs: if not allow_only: raise errors.ObjectclassViolation( diff --git a/ipaserver/plugins/cert.py b/ipaserver/plugins/cert.py index f9c5d73cc..e65cf1f06 100644 --- a/ipaserver/plugins/cert.py +++ b/ipaserver/plugins/cert.py @@ -53,8 +53,6 @@ from ipapython.dn import DN from ipapython.ipa_log_manager import root_logger from ipaserver.plugins.service import normalize_principal, validate_realm -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -175,7 +173,7 @@ def validate_csr(ugettext, csr): if csr and os.path.exists(csr): return try: - request = pkcs10.load_certificate_request(csr) + pkcs10.load_certificate_request(csr) except (TypeError, binascii.Error) as e: raise errors.Base64DecodeError(reason=str(e)) except Exception as e: @@ -415,11 +413,11 @@ class BaseCertObject(Object): except KeyError: general_names = [] - for name_type, desc, name, der_name in general_names: + for name_type, _desc, name, der_name in general_names: try: self._add_san_attribute( obj, full, name_type, name, der_name) - except Exception as e: + except Exception: # Invalid GeneralName (i.e. not a valid X.509 cert); # don't fail but log something about it root_logger.warning( @@ -687,7 +685,7 @@ class cert_request(Create, BaseCertMethod, VirtualCommand): "to the 'userCertificate' attribute of entry '%s'.") % dn) # Validate the subject alt name, if any - for name_type, desc, name, der_name in subjectaltname: + for name_type, desc, name, _der_name in subjectaltname: if name_type == nss.certDNSName: name = unicode(name) alt_principal = None diff --git a/ipaserver/plugins/dns.py b/ipaserver/plugins/dns.py index e1c4e249d..02fdbdf7b 100644 --- a/ipaserver/plugins/dns.py +++ b/ipaserver/plugins/dns.py @@ -85,8 +85,6 @@ from ipaserver.dns_data_management import ( IPADomainIsNotManagedByIPAError, ) -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -392,7 +390,7 @@ def _validate_ip6addr(ugettext, ipaddr): def _validate_ipnet(ugettext, ipnet): try: - net = netaddr.IPNetwork(ipnet) + netaddr.IPNetwork(ipnet) except (netaddr.AddrFormatError, ValueError, UnboundLocalError): return _('invalid IP network format') return None @@ -1911,8 +1909,9 @@ def _add_warning_fw_zone_is_not_effective(api, result, fwzone, version): """ Adds warning message to result, if required """ - authoritative_zone, truncated = \ - _get_zone_which_makes_fw_zone_ineffective(api, fwzone) + ( + authoritative_zone, _truncated + ) = _get_zone_which_makes_fw_zone_ineffective(api, fwzone) if authoritative_zone: # forward zone is not effective and forwarding will not work messages.add_message( @@ -2639,7 +2638,7 @@ class dnszone(DNSZoneBase): not effective """ zone = keys[-1] - affected_fw_zones, truncated = _find_subtree_forward_zones_ldap( + affected_fw_zones, _truncated = _find_subtree_forward_zones_ldap( self.api, zone, child_zones_only=True) if not affected_fw_zones: return @@ -2863,8 +2862,8 @@ class dnszone_find(DNSZoneBase_find): def pre_callback(self, ldap, filter, attrs_list, base_dn, scope, *args, **options): assert isinstance(base_dn, DN) - filter, base, dn = super(dnszone_find, self).pre_callback(ldap, filter, - attrs_list, base_dn, scope, *args, **options) + filter, _base, _scope = super(dnszone_find, self).pre_callback( + ldap, filter, attrs_list, base_dn, scope, *args, **options) if options.get('forward_only', False): search_kw = {} @@ -3446,7 +3445,7 @@ class dnsrecord(LDAPObject): if not record_name_absolute.is_absolute(): record_name_absolute = record_name_absolute.derelativize(zone) - affected_fw_zones, truncated = _find_subtree_forward_zones_ldap( + affected_fw_zones, _truncated = _find_subtree_forward_zones_ldap( self.api, record_name_absolute) if not affected_fw_zones: return diff --git a/ipaserver/plugins/dogtag.py b/ipaserver/plugins/dogtag.py index d7f86736a..0bdb4daf2 100644 --- a/ipaserver/plugins/dogtag.py +++ b/ipaserver/plugins/dogtag.py @@ -259,8 +259,6 @@ if api.env.in_server: import pki.crypto as cryptoutil from pki.kra import KRAClient -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -1162,7 +1160,7 @@ def host_has_service(host, ldap2, service='CA'): } query_filter = ldap2.make_filter(filter_attrs, rules='&') try: - ent, trunc = ldap2.find_entries(filter=query_filter, base_dn=base_dn) + ent, _trunc = ldap2.find_entries(filter=query_filter, base_dn=base_dn) if len(ent): return True except Exception: @@ -1186,7 +1184,7 @@ def select_any_master(ldap2, service='CA'): 'ipaConfigString': 'enabledService',} query_filter = ldap2.make_filter(filter_attrs, rules='&') try: - ent, trunc = ldap2.find_entries(filter=query_filter, base_dn=base_dn) + ent, _trunc = ldap2.find_entries(filter=query_filter, base_dn=base_dn) if len(ent): entry = random.choice(ent) return entry.dn[1].value @@ -1285,7 +1283,7 @@ class RestClient(Backend): """Log into the REST API""" if self.cookie is not None: return - status, resp_headers, resp_body = dogtag.https_request( + status, resp_headers, _resp_body = dogtag.https_request( self.ca_host, self.override_port or self.env.ca_agent_port, '/ca/rest/account/login', self.sec_dir, self.password, self.ipa_certificate_nickname, @@ -1485,11 +1483,12 @@ class ra(rabase.rabase, RestClient): self.debug('%s.check_request_status()', type(self).__name__) # Call CMS - http_status, http_headers, http_body = \ + http_status, _http_headers, http_body = ( self._request('/ca/ee/ca/checkRequest', self.env.ca_port, requestId=request_id, xml='true') + ) # Parse and handle errors if http_status != 200: @@ -1570,11 +1569,12 @@ class ra(rabase.rabase, RestClient): serial_number = int(serial_number, 0) # Call CMS - http_status, http_headers, http_body = \ + http_status, _http_headers, http_body = ( self._sslget('/ca/agent/ca/displayBySerial', self.env.ca_agent_port, serialNumber=str(serial_number), xml='true') + ) # Parse and handle errors @@ -1654,7 +1654,7 @@ class ra(rabase.rabase, RestClient): if ca_id: path += '?issuer-id={}'.format(ca_id) - http_status, http_headers, http_body = self._ssldo( + _http_status, _http_headers, http_body = self._ssldo( 'POST', path, headers={ 'Content-Type': 'application/xml', @@ -1728,7 +1728,7 @@ class ra(rabase.rabase, RestClient): serial_number = int(serial_number, 0) # Call CMS - http_status, http_headers, http_body = \ + http_status, _http_headers, http_body = \ self._sslget('/ca/agent/ca/doRevoke', self.env.ca_agent_port, op='revoke', @@ -1788,11 +1788,12 @@ class ra(rabase.rabase, RestClient): serial_number = int(serial_number, 0) # Call CMS - http_status, http_headers, http_body = \ + http_status, _http_headers, http_body = ( self._sslget('/ca/agent/ca/doUnrevoke', self.env.ca_agent_port, serialNumber=str(serial_number), xml='true') + ) # Parse and handle errors if http_status != 200: @@ -2050,7 +2051,7 @@ class ra_certprofile(RestClient): """ Read the profile configuration from Dogtag """ - status, resp_headers, resp_body = self._ssldo( + _status, _resp_headers, resp_body = self._ssldo( 'GET', profile_id + '/raw') return resp_body @@ -2103,7 +2104,7 @@ class ra_lightweight_ca(RestClient): """ assert isinstance(dn, DN) - status, resp_headers, resp_body = self._ssldo( + _status, _resp_headers, resp_body = self._ssldo( 'POST', None, headers={ 'Content-type': 'application/json', @@ -2117,7 +2118,7 @@ class ra_lightweight_ca(RestClient): raise errors.RemoteRetrieveError(reason=_("Response from CA was not valid JSON")) def read_ca(self, ca_id): - status, resp_headers, resp_body = self._ssldo( + _status, _resp_headers, resp_body = self._ssldo( 'GET', ca_id, headers={'Accept': 'application/json'}) try: return json.loads(resp_body) diff --git a/ipaserver/plugins/idrange.py b/ipaserver/plugins/idrange.py index ba0a677b0..c94e6775e 100644 --- a/ipaserver/plugins/idrange.py +++ b/ipaserver/plugins/idrange.py @@ -26,8 +26,6 @@ from ipalib import api, Int, Str, StrEnum, _, ngettext from ipalib import errors from ipapython.dn import DN -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -312,7 +310,7 @@ class idrange(LDAPObject): "&") try: - (objects, truncated) = ldap.find_entries(filter=id_filter, + ldap.find_entries(filter=id_filter, attrs_list=['uid', 'cn'], base_dn=DN(api.env.container_accounts, api.env.basedn)) except errors.NotFound: @@ -555,7 +553,7 @@ class idrange_del(LDAPDelete): '(ipanttrusteddomainsid=%s))' % range_sid) try: - (trust_domains, truncated) = ldap.find_entries( + trust_domains, _truncated = ldap.find_entries( base_dn=DN(api.env.container_trusts, api.env.basedn), filter=domain_filter) except errors.NotFound: diff --git a/ipaserver/plugins/idviews.py b/ipaserver/plugins/idviews.py index 36499e3ff..3ee2be4a9 100644 --- a/ipaserver/plugins/idviews.py +++ b/ipaserver/plugins/idviews.py @@ -40,8 +40,6 @@ from ipalib.util import (normalize_sshpubkey, validate_sshpubkey, from ipapython.dn import DN -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -201,7 +199,7 @@ class idview_show(LDAPRetrieve): attr_name = obj_type + 'overrides' try: - (overrides, truncated) = ldap.find_entries( + overrides, _truncated = ldap.find_entries( filter="objectclass=%s" % objectclass, attrs_list=['ipaanchoruuid'], base_dn=dn, @@ -236,7 +234,7 @@ class idview_show(LDAPRetrieve): } try: - (hosts, truncated) = ldap.find_entries( + hosts, _truncated = ldap.find_entries( filter=ldap.make_filter(filter_params, rules=ldap.MATCH_ALL), attrs_list=['cn'], base_dn=api.env.container_host + api.env.basedn, @@ -626,7 +624,7 @@ def remove_ipaobject_overrides(ldap, api, dn): override_filter = '(ipaanchoruuid=:IPA:{0}:{1})'.format(api.env.domain, object_uuid) try: - entries, truncated = ldap.find_entries( + entries, _truncated = ldap.find_entries( override_filter, base_dn=DN(api.env.container_views, api.env.basedn), paged_search=True diff --git a/ipaserver/plugins/migration.py b/ipaserver/plugins/migration.py index b1fcdea1a..b61ef96d6 100644 --- a/ipaserver/plugins/migration.py +++ b/ipaserver/plugins/migration.py @@ -40,8 +40,6 @@ from ipapython.kerberos import Principal import datetime from ipaplatform.paths import paths -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -186,7 +184,6 @@ def _pre_migrate_user(ldap, pkey, dn, entry_attrs, failed, config, ctx, **kwargs attr_blacklist = ['krbprincipalkey','memberofindirect','memberindirect'] attr_blacklist.extend(kwargs.get('attr_blacklist', [])) ds_ldap = ctx['ds_ldap'] - has_upg = ctx['has_upg'] search_bases = kwargs.get('search_bases', None) valid_gids = kwargs['valid_gids'] invalid_gids = kwargs['invalid_gids'] @@ -318,8 +315,8 @@ def _update_default_group(ldap, ctx, force): s = datetime.datetime.now() searchfilter = "(&(objectclass=posixAccount)(!(memberof=%s)))" % group_dn try: - (result, truncated) = ldap.find_entries(searchfilter, - [''], DN(api.env.container_user, api.env.basedn), + result, _truncated = ldap.find_entries( + searchfilter, [''], DN(api.env.container_user, api.env.basedn), scope=ldap.SCOPE_SUBTREE, time_limit=-1, size_limit=-1) except errors.NotFound: api.log.debug('All users have default group set') @@ -915,7 +912,7 @@ migration process might be incomplete\n''') if not ds_base_dn: # retrieve base DN from remote LDAP server - entries, truncated = ds_ldap.find_entries( + entries, _truncated = ds_ldap.find_entries( '', ['namingcontexts', 'defaultnamingcontext'], DN(''), ds_ldap.SCOPE_BASE, size_limit=-1, time_limit=0, ) diff --git a/ipaserver/plugins/permission.py b/ipaserver/plugins/permission.py index 593198be4..130c99c29 100644 --- a/ipaserver/plugins/permission.py +++ b/ipaserver/plugins/permission.py @@ -33,8 +33,6 @@ from ipalib.aci import ACI from ipapython.dn import DN from ipalib.request import context -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -490,7 +488,7 @@ class permission(baseldap.LDAPObject): if options.get('raw'): # Retreive the ACI from LDAP to ensure we get the real thing try: - acientry, acistring = self._get_aci_entry_and_string(entry) + _acientry, acistring = self._get_aci_entry_and_string(entry) except errors.NotFound: if list(entry.get('ipapermissiontype')) == ['SYSTEM']: # SYSTEM permissions don't have normal ACIs @@ -1317,7 +1315,6 @@ class permission_find(baseldap.LDAPSearch): root_entry = ldap.get_entry(DN(api.env.basedn), ['aci']) except errors.NotFound: legacy_entries = () - cached_root_entry = None self.log.debug('potential legacy entries: %s', len(legacy_entries)) nonlegacy_names = {e.single_value['cn'] for e in entries} for entry in legacy_entries: diff --git a/ipaserver/plugins/stageuser.py b/ipaserver/plugins/stageuser.py index 5fbd313a9..1da43ecb6 100644 --- a/ipaserver/plugins/stageuser.py +++ b/ipaserver/plugins/stageuser.py @@ -50,8 +50,6 @@ from ipaplatform.paths import paths from ipapython.ipautil import ipa_generate_password, GEN_TMP_PWD_LEN from ipalib.capabilities import client_has_capability -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -385,7 +383,6 @@ class stageuser_add(baseuser_add): def post_callback(self, ldap, dn, entry_attrs, *keys, **options): assert isinstance(dn, DN) - config = ldap.get_ipa_config() # Fetch the entry again to update memberof, mep data, etc updated # at the end of the transaction. @@ -639,7 +636,9 @@ class stageuser_activate(LDAPQuery): # Check that this value is a Active user try: - entry_attrs = self._exc_wrapper(args, options, ldap.get_entry)(value, ['dn']) + self._exc_wrapper(args, options, ldap.get_entry)( + value, ['dn'] + ) return value except errors.NotFound: return u'' @@ -667,10 +666,9 @@ class stageuser_activate(LDAPQuery): # Check it does not exist an active entry with the same RDN active_dn = DN(staging_dn[0], api.env.container_user, api.env.basedn) try: - test_entry_attrs = self._exc_wrapper(args, options, ldap.get_entry)( + self._exc_wrapper(args, options, ldap.get_entry)( active_dn, ['dn'] ) - assert isinstance(staging_dn, DN) raise errors.DuplicateEntry( message=_('active user with name "%(user)s" already exists') % dict(user=args[-1])) diff --git a/ipaserver/plugins/trust.py b/ipaserver/plugins/trust.py index 4ea19d918..c3f0cda2d 100644 --- a/ipaserver/plugins/trust.py +++ b/ipaserver/plugins/trust.py @@ -45,8 +45,6 @@ from ipalib import output from ldap import SCOPE_SUBTREE from time import sleep -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -228,7 +226,7 @@ def find_adtrust_masters(ldap, api): """ try: - entries, truncated = ldap.find_entries( + entries, _truncated = ldap.find_entries( "cn=ADTRUST", base_dn=api.env.container_masters + api.env.basedn ) @@ -374,7 +372,7 @@ def add_range(myapi, trustinstance, range_name, dom_sid, *keys, **options): domain_validator._admin_creds = creds # KDC might not get refreshed data at the first time, # retry several times - for retry in range(10): + for _retry in range(10): info_list = domain_validator.search_in_dc(domain, info_filter, None, @@ -619,7 +617,7 @@ class trust(LDAPObject): ldap = self.api.Backend.ldap2 try: - entries, truncated = ldap.find_entries( + entries, _truncated = ldap.find_entries( base_dn=DN(self.api.env.container_adtrusts, self.api.env.basedn), scope=ldap.SCOPE_ONELEVEL, @@ -744,18 +742,17 @@ sides. # Store the created range type, since for POSIX trusts no # ranges for the subdomains should be added, POSIX attributes # provide a global mapping across all subdomains - (created_range_type, _, _) = add_range(self.api, self.trustinstance, - range_name, dom_sid, - *keys, **options) - else: - created_range_type = old_range['result']['iparangetype'][0] + add_range( + self.api, self.trustinstance, range_name, dom_sid, + *keys, **options + ) attrs_list = self.obj.default_attributes if options.get('all', False): attrs_list.append('*') trust_filter = "cn=%s" % result['value'] - (trusts, truncated) = ldap.find_entries( + trusts, _truncated = ldap.find_entries( base_dn=DN(self.api.env.container_trusts, self.api.env.basedn), filter=trust_filter, attrs_list=attrs_list) @@ -773,8 +770,9 @@ sides. # run the call under original user's credentials res = fetch_domains_from_trust(self.api, self.trustinstance, **options) - domains = add_new_domains_from_trust(self.api, self.trustinstance, - result['result'], res, **options) + add_new_domains_from_trust( + self.api, self.trustinstance, result['result'], res, + **options) else: # One-way trust is more complex. We don't have cross-realm TGT # and cannot use IPA principals to authenticate against AD. @@ -999,7 +997,7 @@ sides. if ('idnsforwardpolicy' in dns_zone) and dns_zone['idnsforwardpolicy'][0] == u'only': instructions.append(_("Forward policy is defined for it in IPA DNS, " "perhaps forwarder points to incorrect host?")) - except (errors.NotFound, KeyError) as e: + except (errors.NotFound, KeyError): instructions.append(_("IPA manages DNS, please verify " "your DNS configuration and " "make sure that service records " @@ -1383,7 +1381,7 @@ class trust_resolve(Command): entry['name'] = [unicode(xlate[sid][pysss_nss_idmap.NAME_KEY])] entry['type'] = [idmap_type_string(xlate[sid][pysss_nss_idmap.TYPE_KEY])] result.append(entry) - except ValueError as e: + except ValueError: pass return dict(result=result) @@ -1624,7 +1622,7 @@ class trustdomain_del(LDAPDelete): error=_("cannot delete root domain of the trust, " "use trust-del to delete the trust itself")) try: - res = self.api.Command.trustdomain_enable(keys[0], domain) + self.api.Command.trustdomain_enable(keys[0], domain) except errors.AlreadyActive: pass @@ -1814,7 +1812,7 @@ class trustdomain_enable(LDAPQuery): ldap.update_entry(trust_entry) # Force MS-PAC cache re-initialization on KDC side domval = ipaserver.dcerpc.DomainValidator(self.api) - (ccache_name, principal) = domval.kinit_as_http(keys[0]) + domval.kinit_as_http(keys[0]) else: raise errors.AlreadyActive() except errors.NotFound: @@ -1855,7 +1853,7 @@ class trustdomain_disable(LDAPQuery): ldap.update_entry(trust_entry) # Force MS-PAC cache re-initialization on KDC side domval = ipaserver.dcerpc.DomainValidator(self.api) - (ccache_name, principal) = domval.kinit_as_http(keys[0]) + domval.kinit_as_http(keys[0]) else: raise errors.AlreadyInactive() except errors.NotFound: diff --git a/ipaserver/plugins/user.py b/ipaserver/plugins/user.py index 239838db9..529609314 100644 --- a/ipaserver/plugins/user.py +++ b/ipaserver/plugins/user.py @@ -69,8 +69,6 @@ from ipalib.capabilities import client_has_capability if api.env.in_server: from ipaserver.plugins.ldap2 import ldap2 -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -858,7 +856,7 @@ class user_undel(LDAPQuery): # First check that the user exists and is a delete one delete_dn = self.obj.get_either_dn(*keys, **options) try: - entry_attrs = self._exc_wrapper(keys, options, ldap.get_entry)(delete_dn) + self._exc_wrapper(keys, options, ldap.get_entry)(delete_dn) except errors.NotFound: self.obj.handle_not_found(*keys) if delete_dn.endswith(DN(self.obj.active_container_dn, @@ -1087,7 +1085,7 @@ class user_status(LDAPQuery): masters = [] # Get list of masters try: - (masters, truncated) = ldap.find_entries( + masters, _truncated = ldap.find_entries( None, ['*'], DN(('cn', 'masters'), ('cn', 'ipa'), ('cn', 'etc'), api.env.basedn), ldap.SCOPE_ONELEVEL ) diff --git a/ipaserver/rpcserver.py b/ipaserver/rpcserver.py index 83b54c3e9..c4f724af7 100644 --- a/ipaserver/rpcserver.py +++ b/ipaserver/rpcserver.py @@ -64,8 +64,6 @@ from ipaplatform.paths import paths from ipapython.version import VERSION from ipalib.text import _ -# pylint: disable=unused-variable - if six.PY3: unicode = str @@ -423,7 +421,7 @@ class WSGIExecutioner(Executioner): status = HTTP_STATUS_SUCCESS response = self.wsgi_execute(environ) headers = [('Content-Type', self.content_type + '; charset=utf-8')] - except Exception as e: + except Exception: self.exception('WSGI %s.__call__():', self.name) status = HTTP_STATUS_SERVER_ERROR response = status @@ -654,7 +652,6 @@ class KerberosWSGIExecutioner(WSGIExecutioner, HTTP_Status, KerberosSession): if user_ccache is None: status = HTTP_STATUS_SERVER_ERROR - response_headers = [('Content-Type', 'text/html; charset=utf-8')] self.log.error( '%s: %s', status, |