mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
pylint: supress false positive no-member errors
pylint 1.5 prints many false positive no-member errors which are supressed by this commit. https://fedorahosted.org/freeipa/ticket/5615 Reviewed-By: David Kupka <dkupka@redhat.com>
This commit is contained in:
parent
c68e9510d0
commit
72d5499c5a
@ -290,7 +290,7 @@ def ipa_start(options):
|
||||
|
||||
if isinstance(e, IpactlError):
|
||||
# do not display any other error message
|
||||
raise IpactlError(rval=e.rval)
|
||||
raise IpactlError(rval=e.rval) # pylint: disable=no-member
|
||||
else:
|
||||
raise IpactlError()
|
||||
|
||||
@ -387,7 +387,7 @@ def ipa_restart(options):
|
||||
pass
|
||||
if isinstance(e, IpactlError):
|
||||
# do not display any other error message
|
||||
raise IpactlError(rval=e.rval)
|
||||
raise IpactlError(rval=e.rval) # pylint: disable=no-member
|
||||
else:
|
||||
raise IpactlError()
|
||||
|
||||
|
@ -160,7 +160,7 @@ def get_credentials(name=None, ccache_name=None):
|
||||
try:
|
||||
return gssapi.Credentials(usage='initiate', name=name, store=store)
|
||||
except gssapi.exceptions.GSSError as e:
|
||||
if e.min_code == KRB5_FCC_NOFILE:
|
||||
if e.min_code == KRB5_FCC_NOFILE: # pylint: disable=no-member
|
||||
raise ValueError('"%s", ccache="%s"' % (e.message, ccache_name))
|
||||
raise
|
||||
|
||||
|
@ -114,11 +114,16 @@ class batch(Command):
|
||||
if isinstance(e, errors.RequirementError) or \
|
||||
isinstance(e, errors.CommandError):
|
||||
self.info(
|
||||
'%s: batch: %s', context.principal, e.__class__.__name__
|
||||
'%s: batch: %s',
|
||||
context.principal, # pylint: disable=no-member
|
||||
e.__class__.__name__
|
||||
)
|
||||
else:
|
||||
self.info(
|
||||
'%s: batch: %s(%s): %s', context.principal, name, ', '.join(api.Command[name]._repr_iter(**params)), e.__class__.__name__
|
||||
'%s: batch: %s(%s): %s',
|
||||
context.principal, name, # pylint: disable=no-member
|
||||
', '.join(api.Command[name]._repr_iter(**params)),
|
||||
e.__class__.__name__
|
||||
)
|
||||
if isinstance(e, errors.PublicError):
|
||||
reported_error = e
|
||||
|
@ -228,8 +228,9 @@ class server_conncheck(crud.PKQuery):
|
||||
privilege = u'Replication Administrators'
|
||||
privilege_dn = self.api.Object.privilege.get_dn(privilege)
|
||||
ldap = self.obj.backend
|
||||
filter = ldap.make_filter(
|
||||
{'krbprincipalname': context.principal, 'memberof': privilege_dn},
|
||||
filter = ldap.make_filter({
|
||||
'krbprincipalname': context.principal, # pylint: disable=no-member
|
||||
'memberof': privilege_dn},
|
||||
rules=ldap.MATCH_ALL)
|
||||
try:
|
||||
ldap.find_entries(base_dn=self.api.env.basedn, filter=filter)
|
||||
|
@ -208,7 +208,7 @@ class LDAPEntry(collections.MutableMapping):
|
||||
|
||||
Keyword arguments can be used to override values of specific attributes.
|
||||
"""
|
||||
super(LDAPEntry, self).__init__()
|
||||
super(LDAPEntry, self).__init__() # pylint: disable=no-member
|
||||
|
||||
if isinstance(_conn, LDAPEntry):
|
||||
assert _dn is None
|
||||
|
@ -1441,7 +1441,7 @@ def kinit_keytab(principal, keytab, ccache_name, config=None, attempts=1):
|
||||
% (attempt, attempts))
|
||||
return cred
|
||||
except gssapi.exceptions.GSSError as e:
|
||||
if e.min_code not in errors_to_retry:
|
||||
if e.min_code not in errors_to_retry: # pylint: disable=no-member
|
||||
raise
|
||||
root_logger.debug("Attempt %d/%d: failed: %s"
|
||||
% (attempt, attempts, e))
|
||||
|
@ -63,7 +63,9 @@ def auth_certificate_callback(sock, check_sig, is_server, certdb):
|
||||
# and the strerror attribute will contain a string describing the reason.
|
||||
approved_usage = cert.verify_now(certdb, check_sig, intended_usage, *pin_args)
|
||||
except Exception as e:
|
||||
root_logger.error('cert validation failed for "%s" (%s)', cert.subject, e.strerror)
|
||||
root_logger.error(
|
||||
'cert validation failed for "%s" (%s)', cert.subject,
|
||||
e.strerror) # pylint: disable=no-member
|
||||
cert_is_valid = False
|
||||
return cert_is_valid
|
||||
|
||||
@ -93,7 +95,8 @@ def auth_certificate_callback(sock, check_sig, is_server, certdb):
|
||||
cert_is_valid = cert.verify_hostname(hostname)
|
||||
except Exception as e:
|
||||
root_logger.error('failed verifying socket hostname "%s" matches cert subject "%s" (%s)',
|
||||
hostname, cert.subject, e.strerror)
|
||||
hostname, cert.subject,
|
||||
e.strerror) # pylint: disable=no-member
|
||||
cert_is_valid = False
|
||||
return cert_is_valid
|
||||
|
||||
|
@ -166,7 +166,9 @@ def verify_fqdn(host_name, no_host_dns=False, local_hostname=True):
|
||||
except socket.gaierror:
|
||||
pass
|
||||
except socket.error as e:
|
||||
root_logger.debug('socket.gethostbyaddr() error: %d: %s' % (e.errno, e.strerror))
|
||||
root_logger.debug(
|
||||
'socket.gethostbyaddr() error: %d: %s',
|
||||
e.errno, e.strerror) # pylint: disable=no-member
|
||||
|
||||
if no_host_dns:
|
||||
print("Warning: skipping DNS resolution of host", host_name)
|
||||
@ -733,7 +735,10 @@ def run_script(main_function, operation_name, log_file_name=None,
|
||||
try:
|
||||
return_value = main_function()
|
||||
except BaseException as e:
|
||||
if isinstance(e, SystemExit) and (e.code is None or e.code == 0):
|
||||
if (
|
||||
isinstance(e, SystemExit) and
|
||||
(e.code is None or e.code == 0) # pylint: disable=no-member
|
||||
):
|
||||
# Not an error after all
|
||||
root_logger.info('The %s command was successful',
|
||||
operation_name)
|
||||
|
@ -500,11 +500,12 @@ class OTPTokenImport(admintool.AdminTool):
|
||||
|
||||
# Verify a key is provided if one is needed.
|
||||
if self.doc.keyname is not None:
|
||||
if self.safe_options.keyfile is None:
|
||||
if self.safe_options.keyfile is None: # pylint: disable=no-member
|
||||
raise admintool.ScriptError("Encryption key required: %s!" % self.doc.keyname)
|
||||
|
||||
# Load the keyfile.
|
||||
with open(self.safe_options.keyfile) as f:
|
||||
keyfile = self.safe_options.keyfile # pylint: disable=no-member
|
||||
with open(keyfile) as f:
|
||||
self.doc.setKey(f.read())
|
||||
|
||||
def run(self):
|
||||
|
@ -332,7 +332,8 @@ def check_master_deleted(api, masters, interactive):
|
||||
try:
|
||||
ipautil.kinit_keytab(host_princ, paths.KRB5_KEYTAB, ccache_path)
|
||||
except gssapi.exceptions.GSSError as e:
|
||||
if e.min_code == KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN:
|
||||
min_code = e.min_code # pylint: disable=no-member
|
||||
if min_code == KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN:
|
||||
root_logger.debug("Host principal not found, assuming that "
|
||||
"master is removed from topology")
|
||||
return True
|
||||
|
@ -446,7 +446,8 @@ class Service(object):
|
||||
run_step(full_msg, method)
|
||||
step += 1
|
||||
except BaseException as e:
|
||||
if not (isinstance(e, SystemExit) and e.code == 0):
|
||||
if not (isinstance(e, SystemExit) and
|
||||
e.code == 0): # pylint: disable=no-member
|
||||
# show the traceback, so it's not lost if cleanup method fails
|
||||
root_logger.debug("%s" % traceback.format_exc())
|
||||
self.print_msg(' [error] %s: %s' % (type(e).__name__, e))
|
||||
|
@ -344,7 +344,9 @@ class Declarative(XMLRPC_test):
|
||||
# client side. However, if we switch to using JSON-RPC for the default
|
||||
# transport, the exception is a free-form data structure (dict).
|
||||
# For now just compare the strings
|
||||
# pylint: disable=no-member
|
||||
assert_deepequal(expected.strerror, e.strerror)
|
||||
# pylint: enable=no-member
|
||||
|
||||
def check_callable(self, nice, cmd, args, options, expected):
|
||||
name = expected.__class__.__name__
|
||||
|
Loading…
Reference in New Issue
Block a user