Mercurial > p > roundup > code
diff roundup/cgi/client.py @ 6975:fe4a6ba98bfe
flake8 - remove unused imports, unused vars, whitespace fixes
| author | John Rouillard <rouilj@ieee.org> |
|---|---|
| date | Wed, 14 Sep 2022 15:59:59 -0400 |
| parents | 178c80c77ca4 |
| children | 3917ae82fb24 |
line wrap: on
line diff
--- a/roundup/cgi/client.py Wed Sep 14 15:08:54 2022 -0400 +++ b/roundup/cgi/client.py Wed Sep 14 15:59:59 2022 -0400 @@ -8,20 +8,16 @@ import codecs import email.utils import errno -import hashlib import logging import mimetypes import os -import quopri import re import socket import stat import sys import time -from email.mime.base import MIMEBase from email.mime.multipart import MIMEMultipart -from email.mime.text import MIMEText from traceback import format_exc try: from OpenSSL.SSL import SysCallError @@ -29,13 +25,13 @@ class SysCallError(Exception): pass -import roundup.anypy.email_ +import roundup.anypy.email_ # noqa: F401 -- patches for email library code import roundup.anypy.random_ as random_ # quality of random checked below -from roundup import date, hyperdb, password, rest, roundupdb, xmlrpc +from roundup import hyperdb, rest, xmlrpc from roundup.anypy import http_, urllib_, xmlrpc_ -from roundup.anypy.cookie_ import BaseCookie, CookieError, get_cookie_date, \ +from roundup.anypy.cookie_ import BaseCookie, CookieError, get_cookie_date, \ SimpleCookie from roundup.anypy.html import html_escape from roundup.anypy.strings import s2b, b2s, bs2b, uchr, is_us @@ -76,7 +72,8 @@ description="User may access the rest interface") security.addPermissionToRole('Admin', p) - p = security.addPermission(name="Xmlrpc Access", + p = security.addPermission( + name="Xmlrpc Access", description="User may access the xmlrpc interface") security.addPermissionToRole('Admin', p) @@ -600,7 +597,7 @@ # It will return True if everything is ok, # raises exception on check failure. csrf_ok = self.handle_csrf(api=True) - except (Unauthorised, UsageError) as msg: + except (Unauthorised, UsageError): # report exception back to server exc_type, exc_value, exc_tb = sys.exc_info() output = xmlrpc_.client.dumps( @@ -639,7 +636,8 @@ return # allow preflight request even if unauthenticated - if (self.env['REQUEST_METHOD'] == "OPTIONS" + if ( + self.env['REQUEST_METHOD'] == "OPTIONS" and self.request.headers.get("Access-Control-Request-Headers") and self.request.headers.get("Access-Control-Request-Method") and self.request.headers.get("Origin") @@ -681,7 +679,7 @@ except (Unauthorised, UsageError) as msg: # FIXME should return what the client requests # via accept header. - output = s2b('{ "error": { "status": 400, "msg": "%s"}}' % + output = s2b('{ "error": { "status": 400, "msg": "%s"}}' % str(msg)) self.response_code = 400 self.setHeader("Content-Length", str(len(output))) @@ -885,7 +883,8 @@ self.response_code = 404 self.template = '404' try: - cl = self.db.getclass(self.classname) + # generates keyerror if class does not exist + self.db.getclass(self.classname) self.write_html(self.renderContext()) except KeyError: # we can't map the URL to a class we know about @@ -913,7 +912,7 @@ else: # in debug mode, only write error to screen. self.write_html(e.html) - except Exception as e: + except Exception as e: # noqa: F841 # Something has gone badly wrong. Therefore, we should # make sure that the response code indicates failure. if self.response_code == http_.client.OK: @@ -984,7 +983,7 @@ codecs.lookup(charset) except LookupError: self.add_error_message(self._('Unrecognized charset: %r') % - charset) + charset) charset_parameter = 0 else: @@ -1150,7 +1149,7 @@ self.make_user_anonymous() login = self.get_action_class('login')(self) login.verifyLogin(username, password) - except LoginError as err: + except LoginError: self.make_user_anonymous() raise user = username @@ -2205,12 +2204,12 @@ # tracker-defined action action_klass = self.instance.cgi_actions[action_name] else: - # go with a default - for name, action_klass in self.actions: + # go with a default, action_klass used after end of loop + for name, action_klass in self.actions: # noqa: B007 if name == action_name: break else: - raise ValueError('No such action "%s"' % + raise ValueError('No such action "%s"' % html_escape(action_name)) return action_klass
