pylint: fix duplicate-value

Related: https://pagure.io/freeipa/issue/9278

Signed-off-by: Florence Blanc-Renaud <flo@redhat.com>
Reviewed-By: Stanislav Levin <slev@altlinux.org>
This commit is contained in:
Florence Blanc-Renaud 2022-11-21 16:56:54 +01:00
parent 2268ef4e3c
commit 8e7e48dc78
5 changed files with 7 additions and 7 deletions

View File

@ -233,7 +233,7 @@ class automountlocation(LDAPObject):
'ipapermdefaultattr': {
'cn', 'objectclass',
'automountinformation', 'automountkey', 'description',
'automountmapname', 'description',
'automountmapname',
},
},
'System: Add Automount Locations': {

View File

@ -568,13 +568,13 @@ class certreq(BaseCertObject):
'request_type',
default=u'pkcs10',
autofill=True,
flags={'no_option', 'no_update', 'no_update', 'no_search'},
flags={'no_option', 'no_update', 'no_search'},
),
Str(
'profile_id?', validate_profile_id,
label=_("Profile ID"),
doc=_("Certificate Profile to use"),
flags={'no_update', 'no_update', 'no_search'},
flags={'no_update', 'no_search'},
),
Str(
'cert_request_status',

View File

@ -332,7 +332,7 @@ class host(LDAPObject):
'nshostlocation', 'nsosversion', 'objectclass',
'serverhostname', 'usercertificate', 'userclass',
'enrolledby', 'managedby', 'ipaassignedidview',
'krbprincipalname', 'krbcanonicalname', 'krbprincipalaliases',
'krbcanonicalname', 'krbprincipalaliases',
'krbprincipalexpiration', 'krbpasswordexpiration',
'krblastpwdchange', 'krbprincipalauthind',
},

View File

@ -223,8 +223,8 @@ class sudorule(LDAPObject):
'ipasudorunasextuser', 'ipasudorunasextgroup', 'memberdenycmd',
'memberallowcmd', 'memberuser', 'memberhost', 'externalhost',
'sudonotafter', 'hostmask', 'sudoorder', 'sudonotbefore',
'ipasudorunas', 'externalhost', 'ipasudorunasgroup',
'ipasudoopt', 'memberhost',
'ipasudorunas', 'ipasudorunasgroup',
'ipasudoopt',
},
'replaces': [
'(targetattr = "description || ipaenabledflag || usercategory || hostcategory || cmdcategory || ipasudorunasusercategory || ipasudorunasgroupcategory || externaluser || ipasudorunasextuser || ipasudorunasextgroup || memberdenycmd || memberallowcmd || memberuser")(target = "ldap:///ipauniqueid=*,cn=sudorules,cn=sudo,$SUFFIX")(version 3.0;acl "permission:Modify Sudo rule";allow (write) groupdn = "ldap:///cn=Modify Sudo rule,cn=permissions,cn=pbac,$SUFFIX";)',

View File

@ -39,7 +39,7 @@ class CAACLTracker(Tracker):
u'ipamemberca_ca'}
category_keys = {
u'ipacacategory', u'ipacertprofilecategory', u'usercategory',
u'hostcategory', u'servicecategory', u'ipacacategory'}
u'hostcategory', u'servicecategory'}
retrieve_keys = {
u'dn', u'cn', u'description', u'ipaenabledflag',
u'ipamemberca', u'ipamembercertprofile', u'memberuser',