Re: [Freeipa-devel] [PATCH 0425] pylint: suppress false positive no-member errors
On 03/02/2016 01:35 PM, David Kupka wrote: > Tested with pylint-1.5.4-2, works for me, ACK. > > - Original Message - > From: "Martin Basti" <mba...@redhat.com> > To: "freeipa-devel" <freeipa-devel@redhat.com> > Sent: Tuesday, March 1, 2016 5:55:54 PM > Subject: Re: [Freeipa-devel] [PATCH 0425] pylint: suppress false positive > no-member errors > > > > On 25.02.2016 17:50, Martin Basti wrote: > > > > > On 25.02.2016 15:48, Martin Basti wrote: > > > The last pylint 1.5 patch, \o/ > > https://fedorahosted.org/freeipa/ticket/5615 > > > self-NACK too broad disables > > > Updated patches attached. > Pushed to: ipa-4-2: aaad91d32ee855813bac5f57f8af128cfee327a5 ipa-4-3: 76545e2a54ebbfc5422d2a4bcd51fad1bbd8a79a master: 72d5499c5a902c860c5496ee6e604526672e5777 -- Manage your subscription for the Freeipa-devel mailing list: https://www.redhat.com/mailman/listinfo/freeipa-devel Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code
Re: [Freeipa-devel] [PATCH 0425] pylint: suppress false positive no-member errors
Tested with pylint-1.5.4-2, works for me, ACK. - Original Message - From: "Martin Basti" <mba...@redhat.com> To: "freeipa-devel" <freeipa-devel@redhat.com> Sent: Tuesday, March 1, 2016 5:55:54 PM Subject: Re: [Freeipa-devel] [PATCH 0425] pylint: suppress false positive no-member errors On 25.02.2016 17:50, Martin Basti wrote: On 25.02.2016 15:48, Martin Basti wrote: The last pylint 1.5 patch, \o/ https://fedorahosted.org/freeipa/ticket/5615 self-NACK too broad disables Updated patches attached. -- Manage your subscription for the Freeipa-devel mailing list: https://www.redhat.com/mailman/listinfo/freeipa-devel Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code -- Manage your subscription for the Freeipa-devel mailing list: https://www.redhat.com/mailman/listinfo/freeipa-devel Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code
Re: [Freeipa-devel] [PATCH 0425] pylint: suppress false positive no-member errors
On 25.02.2016 17:50, Martin Basti wrote: On 25.02.2016 15:48, Martin Basti wrote: The last pylint 1.5 patch, \o/ https://fedorahosted.org/freeipa/ticket/5615 self-NACK too broad disables Updated patches attached. From 3e99288583f02661ed4875e90a10491948f42564 Mon Sep 17 00:00:00 2001 From: Martin BastiDate: Thu, 25 Feb 2016 13:46:33 +0100 Subject: [PATCH] pylint: supress false positive no-member errors pylint 1.5 prints many false positive no-member errors which are supressed by this commit. https://fedorahosted.org/freeipa/ticket/5615 --- install/tools/ipactl | 4 ++-- ipalib/krb_utils.py | 2 +- ipalib/plugins/batch.py | 9 +++-- ipalib/plugins/server.py | 5 +++-- ipapython/ipaldap.py | 2 +- ipapython/ipautil.py | 2 +- ipapython/nsslib.py | 7 +-- ipaserver/install/installutils.py| 9 +++-- ipaserver/install/ipa_otptoken_import.py | 5 +++-- ipaserver/install/server/install.py | 3 ++- ipaserver/install/service.py | 3 ++- ipatests/test_xmlrpc/xmlrpc_test.py | 2 ++ 12 files changed, 36 insertions(+), 17 deletions(-) diff --git a/install/tools/ipactl b/install/tools/ipactl index ff5ea5a50a291da35e895d5674bdc8ea76ed48d4..d27ada56556c58c42242cf0add11ef47d4440f56 100755 --- a/install/tools/ipactl +++ b/install/tools/ipactl @@ -290,7 +290,7 @@ def ipa_start(options): if isinstance(e, IpactlError): # do not display any other error message -raise IpactlError(rval=e.rval) +raise IpactlError(rval=e.rval) # pylint: disable=no-member else: raise IpactlError() @@ -387,7 +387,7 @@ def ipa_restart(options): pass if isinstance(e, IpactlError): # do not display any other error message -raise IpactlError(rval=e.rval) +raise IpactlError(rval=e.rval) # pylint: disable=no-member else: raise IpactlError() diff --git a/ipalib/krb_utils.py b/ipalib/krb_utils.py index b33e4b7c82cf08c68220531ebacca309117ad770..e6e277c7a0926187ebcde7ba08e45ebb56ad865e 100644 --- a/ipalib/krb_utils.py +++ b/ipalib/krb_utils.py @@ -160,7 +160,7 @@ def get_credentials(name=None, ccache_name=None): try: return gssapi.Credentials(usage='initiate', name=name, store=store) except gssapi.exceptions.GSSError as e: -if e.min_code == KRB5_FCC_NOFILE: +if e.min_code == KRB5_FCC_NOFILE: # pylint: disable=no-member raise ValueError('"%s", ccache="%s"' % (e.message, ccache_name)) raise diff --git a/ipalib/plugins/batch.py b/ipalib/plugins/batch.py index 626ba2835bd5387df3d49d66293284f40e4b0d42..2da7b7ca811fc67b22c43655352ace539488ce0d 100644 --- a/ipalib/plugins/batch.py +++ b/ipalib/plugins/batch.py @@ -114,11 +114,16 @@ class batch(Command): if isinstance(e, errors.RequirementError) or \ isinstance(e, errors.CommandError): self.info( -'%s: batch: %s', context.principal, e.__class__.__name__ +'%s: batch: %s', +context.principal, # pylint: disable=no-member +e.__class__.__name__ ) else: self.info( -'%s: batch: %s(%s): %s', context.principal, name, ', '.join(api.Command[name]._repr_iter(**params)), e.__class__.__name__ +'%s: batch: %s(%s): %s', +context.principal, name, # pylint: disable=no-member +', '.join(api.Command[name]._repr_iter(**params)), +e.__class__.__name__ ) if isinstance(e, errors.PublicError): reported_error = e diff --git a/ipalib/plugins/server.py b/ipalib/plugins/server.py index e31def77cc649e6392ea8527040e61a56a83ff2f..93ced8b73049b61fe274c15d84150a892cd34529 100644 --- a/ipalib/plugins/server.py +++ b/ipalib/plugins/server.py @@ -228,8 +228,9 @@ class server_conncheck(crud.PKQuery): privilege = u'Replication Administrators' privilege_dn = self.api.Object.privilege.get_dn(privilege) ldap = self.obj.backend -filter = ldap.make_filter( -{'krbprincipalname': context.principal, 'memberof': privilege_dn}, +filter = ldap.make_filter({ +'krbprincipalname': context.principal, # pylint: disable=no-member +'memberof': privilege_dn}, rules=ldap.MATCH_ALL) try: ldap.find_entries(base_dn=self.api.env.basedn, filter=filter) diff --git a/ipapython/ipaldap.py b/ipapython/ipaldap.py index 7522c504b5b8901002776521f05f4ebab8c35ec8..2965ba4a5509eb16589bc9dde9485147d9114032 100644 --- a/ipapython/ipaldap.py +++ b/ipapython/ipaldap.py
Re: [Freeipa-devel] [PATCH 0425] pylint: suppress false positive no-member errors
On 25.02.2016 15:48, Martin Basti wrote: The last pylint 1.5 patch, \o/ https://fedorahosted.org/freeipa/ticket/5615 self-NACK too broad disables -- Manage your subscription for the Freeipa-devel mailing list: https://www.redhat.com/mailman/listinfo/freeipa-devel Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code
[Freeipa-devel] [PATCH 0425] pylint: suppress false positive no-member errors
The last pylint 1.5 patch, \o/ https://fedorahosted.org/freeipa/ticket/5615 From 785fb245fbe04b4cc630e6bc1c1ee670d6eca6a8 Mon Sep 17 00:00:00 2001 From: Martin BastiDate: Thu, 25 Feb 2016 13:46:33 +0100 Subject: [PATCH] pylint: supress false positive no-member errors pylint 1.5 prints many false positive no-member errors which are supressed by this commit. https://fedorahosted.org/freeipa/ticket/5615 --- install/tools/ipactl | 4 ++-- ipalib/krb_utils.py | 2 +- ipalib/plugins/batch.py | 9 +++-- ipalib/plugins/server.py | 5 +++-- ipapython/ipaldap.py | 2 +- ipapython/ipautil.py | 2 +- ipapython/nsslib.py | 7 +-- ipaserver/install/installutils.py| 9 +++-- ipaserver/install/ipa_otptoken_import.py | 4 +++- ipaserver/install/server/install.py | 2 ++ ipaserver/install/service.py | 3 ++- ipatests/test_xmlrpc/xmlrpc_test.py | 2 ++ 12 files changed, 36 insertions(+), 15 deletions(-) diff --git a/install/tools/ipactl b/install/tools/ipactl index ff5ea5a50a291da35e895d5674bdc8ea76ed48d4..d27ada56556c58c42242cf0add11ef47d4440f56 100755 --- a/install/tools/ipactl +++ b/install/tools/ipactl @@ -290,7 +290,7 @@ def ipa_start(options): if isinstance(e, IpactlError): # do not display any other error message -raise IpactlError(rval=e.rval) +raise IpactlError(rval=e.rval) # pylint: disable=no-member else: raise IpactlError() @@ -387,7 +387,7 @@ def ipa_restart(options): pass if isinstance(e, IpactlError): # do not display any other error message -raise IpactlError(rval=e.rval) +raise IpactlError(rval=e.rval) # pylint: disable=no-member else: raise IpactlError() diff --git a/ipalib/krb_utils.py b/ipalib/krb_utils.py index b33e4b7c82cf08c68220531ebacca309117ad770..e6e277c7a0926187ebcde7ba08e45ebb56ad865e 100644 --- a/ipalib/krb_utils.py +++ b/ipalib/krb_utils.py @@ -160,7 +160,7 @@ def get_credentials(name=None, ccache_name=None): try: return gssapi.Credentials(usage='initiate', name=name, store=store) except gssapi.exceptions.GSSError as e: -if e.min_code == KRB5_FCC_NOFILE: +if e.min_code == KRB5_FCC_NOFILE: # pylint: disable=no-member raise ValueError('"%s", ccache="%s"' % (e.message, ccache_name)) raise diff --git a/ipalib/plugins/batch.py b/ipalib/plugins/batch.py index 626ba2835bd5387df3d49d66293284f40e4b0d42..2da7b7ca811fc67b22c43655352ace539488ce0d 100644 --- a/ipalib/plugins/batch.py +++ b/ipalib/plugins/batch.py @@ -114,11 +114,16 @@ class batch(Command): if isinstance(e, errors.RequirementError) or \ isinstance(e, errors.CommandError): self.info( -'%s: batch: %s', context.principal, e.__class__.__name__ +'%s: batch: %s', +context.principal, # pylint: disable=no-member +e.__class__.__name__ ) else: self.info( -'%s: batch: %s(%s): %s', context.principal, name, ', '.join(api.Command[name]._repr_iter(**params)), e.__class__.__name__ +'%s: batch: %s(%s): %s', +context.principal, name, # pylint: disable=no-member +', '.join(api.Command[name]._repr_iter(**params)), +e.__class__.__name__ ) if isinstance(e, errors.PublicError): reported_error = e diff --git a/ipalib/plugins/server.py b/ipalib/plugins/server.py index e31def77cc649e6392ea8527040e61a56a83ff2f..93ced8b73049b61fe274c15d84150a892cd34529 100644 --- a/ipalib/plugins/server.py +++ b/ipalib/plugins/server.py @@ -228,8 +228,9 @@ class server_conncheck(crud.PKQuery): privilege = u'Replication Administrators' privilege_dn = self.api.Object.privilege.get_dn(privilege) ldap = self.obj.backend -filter = ldap.make_filter( -{'krbprincipalname': context.principal, 'memberof': privilege_dn}, +filter = ldap.make_filter({ +'krbprincipalname': context.principal, # pylint: disable=no-member +'memberof': privilege_dn}, rules=ldap.MATCH_ALL) try: ldap.find_entries(base_dn=self.api.env.basedn, filter=filter) diff --git a/ipapython/ipaldap.py b/ipapython/ipaldap.py index 7522c504b5b8901002776521f05f4ebab8c35ec8..2965ba4a5509eb16589bc9dde9485147d9114032 100644 --- a/ipapython/ipaldap.py +++ b/ipapython/ipaldap.py @@ -208,7 +208,7 @@ class LDAPEntry(collections.MutableMapping): Keyword arguments can be used to override values of specific attributes.