summaryrefslogtreecommitdiffstats
path: root/ipaserver/plugins
diff options
context:
space:
mode:
Diffstat (limited to 'ipaserver/plugins')
-rw-r--r--ipaserver/plugins/config.py4
-rw-r--r--ipaserver/plugins/domainlevel.py2
-rw-r--r--ipaserver/plugins/group.py2
-rw-r--r--ipaserver/plugins/hbactest.py3
-rw-r--r--ipaserver/plugins/host.py2
-rw-r--r--ipaserver/plugins/privilege.py2
-rw-r--r--ipaserver/plugins/selinuxusermap.py2
-rw-r--r--ipaserver/plugins/server.py2
-rw-r--r--ipaserver/plugins/service.py2
-rw-r--r--ipaserver/plugins/sudocmd.py2
10 files changed, 12 insertions, 11 deletions
diff --git a/ipaserver/plugins/config.py b/ipaserver/plugins/config.py
index 95bbb49cc..6407fcc3b 100644
--- a/ipaserver/plugins/config.py
+++ b/ipaserver/plugins/config.py
@@ -293,7 +293,7 @@ class config_mod(LDAPUpdate):
for field in entry_attrs[k].split(',')]
# test if all base types (without sub-types) are allowed
for a in attributes:
- a, tomato, olive = a.partition(';')
+ a, _dummy, _dummy = a.partition(';')
if a not in allowed_attrs:
raise errors.ValidationError(
name=k, error=_('attribute "%s" not allowed') % a
@@ -325,7 +325,7 @@ class config_mod(LDAPUpdate):
if self.api.Object[obj].uuid_attribute:
checked_attrs = checked_attrs + [self.api.Object[obj].uuid_attribute]
for obj_attr in checked_attrs:
- obj_attr, tomato, olive = obj_attr.partition(';')
+ obj_attr, _dummy, _dummy = obj_attr.partition(';')
if obj_attr in OPERATIONAL_ATTRIBUTES:
continue
if obj_attr in self.api.Object[obj].params and \
diff --git a/ipaserver/plugins/domainlevel.py b/ipaserver/plugins/domainlevel.py
index 23fa2a1b2..42603d71a 100644
--- a/ipaserver/plugins/domainlevel.py
+++ b/ipaserver/plugins/domainlevel.py
@@ -60,7 +60,7 @@ def get_master_entries(ldap, api):
api.env.basedn
)
- masters, _ = ldap.find_entries(
+ masters, _dummy = ldap.find_entries(
filter="(cn=*)",
base_dn=container_masters,
scope=ldap.SCOPE_ONELEVEL,
diff --git a/ipaserver/plugins/group.py b/ipaserver/plugins/group.py
index 115db9d16..f48a985cf 100644
--- a/ipaserver/plugins/group.py
+++ b/ipaserver/plugins/group.py
@@ -329,7 +329,7 @@ class group_del(LDAPDelete):
assert isinstance(dn, DN)
config = ldap.get_ipa_config()
def_primary_group = config.get('ipadefaultprimarygroup', '')
- def_primary_group_dn = group_dn = self.obj.get_dn(def_primary_group)
+ def_primary_group_dn = self.obj.get_dn(def_primary_group)
if dn == def_primary_group_dn:
raise errors.DefaultGroupError()
group_attrs = self.obj.methods.show(
diff --git a/ipaserver/plugins/hbactest.py b/ipaserver/plugins/hbactest.py
index 90f3b561a..626e89424 100644
--- a/ipaserver/plugins/hbactest.py
+++ b/ipaserver/plugins/hbactest.py
@@ -411,7 +411,8 @@ class hbactest(Command):
ldap = self.api.Backend.ldap2
group_container = DN(api.env.container_group, api.env.basedn)
try:
- entries, truncated = ldap.find_entries(filter_sids, ['memberof'], group_container)
+ entries, _truncated = ldap.find_entries(
+ filter_sids, ['memberof'], group_container)
except errors.NotFound:
request.user.groups = []
else:
diff --git a/ipaserver/plugins/host.py b/ipaserver/plugins/host.py
index 6da1afb42..957a1edcf 100644
--- a/ipaserver/plugins/host.py
+++ b/ipaserver/plugins/host.py
@@ -601,7 +601,7 @@ class host(LDAPObject):
managed_hosts = []
try:
- (hosts, truncated) = ldap.find_entries(
+ (hosts, _truncated) = ldap.find_entries(
base_dn=DN(self.container_dn, api.env.basedn),
filter=host_filter, attrs_list=host_attrs)
diff --git a/ipaserver/plugins/privilege.py b/ipaserver/plugins/privilege.py
index b46807c3f..b3afbd289 100644
--- a/ipaserver/plugins/privilege.py
+++ b/ipaserver/plugins/privilege.py
@@ -64,7 +64,7 @@ def validate_permission_to_privilege(api, permission):
'(objectClass=ipaPermissionV2)', '(!(ipaPermBindRuleType=permission))',
ldap.make_filter_from_attr('cn', permission, rules='|')])
try:
- entries, truncated = ldap.find_entries(
+ entries, _truncated = ldap.find_entries(
filter=ldapfilter,
attrs_list=['cn', 'ipapermbindruletype'],
base_dn=DN(api.env.container_permission, api.env.basedn),
diff --git a/ipaserver/plugins/selinuxusermap.py b/ipaserver/plugins/selinuxusermap.py
index 8f660d089..bb48a5af3 100644
--- a/ipaserver/plugins/selinuxusermap.py
+++ b/ipaserver/plugins/selinuxusermap.py
@@ -109,7 +109,7 @@ def validate_selinuxuser(ugettext, user):
# If we add in ::: we don't have to check to see if some values are
# empty
- (name, mls, mcs, ignore) = (user + ':::').split(':', 3)
+ (name, mls, mcs, _ignore) = (user + ':::').split(':', 3)
if not regex_name.match(name):
return _('Invalid SELinux user name, only a-Z and _ are allowed')
diff --git a/ipaserver/plugins/server.py b/ipaserver/plugins/server.py
index a3d69a017..ec71dbcc3 100644
--- a/ipaserver/plugins/server.py
+++ b/ipaserver/plugins/server.py
@@ -889,7 +889,7 @@ class server_conncheck(crud.PKQuery):
follow_name_owner_changes=True)
server = dbus.Interface(obj, 'org.freeipa.server')
- ret, stdout, stderr = server.conncheck(keys[-1])
+ ret, stdout, _stderr = server.conncheck(keys[-1])
result = dict(
result=(ret == 0),
diff --git a/ipaserver/plugins/service.py b/ipaserver/plugins/service.py
index c05907324..e57ca523a 100644
--- a/ipaserver/plugins/service.py
+++ b/ipaserver/plugins/service.py
@@ -284,7 +284,7 @@ def check_required_principal(ldap, principal):
"""
try:
host_is_master(ldap, principal.hostname)
- except errors.ValidationError as e:
+ except errors.ValidationError:
service_types = ['HTTP', 'ldap', 'DNS', 'dogtagldap']
if principal.service_name in service_types:
raise errors.ValidationError(name='principal', error=_('This principal is required by the IPA master'))
diff --git a/ipaserver/plugins/sudocmd.py b/ipaserver/plugins/sudocmd.py
index e3ae33a84..b198c5829 100644
--- a/ipaserver/plugins/sudocmd.py
+++ b/ipaserver/plugins/sudocmd.py
@@ -164,7 +164,7 @@ class sudocmd_del(LDAPDelete):
ldap.MATCH_ALL)
dependent_sudorules = []
try:
- entries, truncated = ldap.find_entries(
+ entries, _truncated = ldap.find_entries(
filter, ['cn'],
base_dn=DN(api.env.container_sudorule, api.env.basedn))
except errors.NotFound: