mirror of
https://github.com/Kozea/Radicale.git
synced 2025-06-26 16:45:52 +00:00
flake8 regression E261
This commit is contained in:
parent
4bbbc3c384
commit
d1098c3e22
4 changed files with 8 additions and 8 deletions
|
@ -177,7 +177,7 @@ def xml_report(base_prefix: str, path: str, xml_request: Optional[ET.Element],
|
||||||
|
|
||||||
props: Union[ET.Element, List]
|
props: Union[ET.Element, List]
|
||||||
if root.find(xmlutils.make_clark("D:prop")) is not None:
|
if root.find(xmlutils.make_clark("D:prop")) is not None:
|
||||||
props = root.find(xmlutils.make_clark("D:prop")) # type: ignore[assignment]
|
props = root.find(xmlutils.make_clark("D:prop")) # type: ignore[assignment]
|
||||||
else:
|
else:
|
||||||
props = []
|
props = []
|
||||||
|
|
||||||
|
|
|
@ -96,7 +96,7 @@ class Auth(auth.BaseAuth):
|
||||||
self._has_bcrypt = False
|
self._has_bcrypt = False
|
||||||
self._has_argon2 = False
|
self._has_argon2 = False
|
||||||
self._htpasswd_ok = False
|
self._htpasswd_ok = False
|
||||||
self._htpasswd_not_ok_reminder_seconds = 60 # currently hardcoded
|
self._htpasswd_not_ok_reminder_seconds = 60 # currently hardcoded
|
||||||
(self._htpasswd_ok, self._htpasswd_bcrypt_use, self._htpasswd_argon2_use, self._htpasswd, self._htpasswd_size, self._htpasswd_mtime_ns) = self._read_htpasswd(True, False)
|
(self._htpasswd_ok, self._htpasswd_bcrypt_use, self._htpasswd_argon2_use, self._htpasswd, self._htpasswd_size, self._htpasswd_mtime_ns) = self._read_htpasswd(True, False)
|
||||||
self._lock = threading.Lock()
|
self._lock = threading.Lock()
|
||||||
|
|
||||||
|
|
|
@ -1319,7 +1319,7 @@ permissions: RrWw""")
|
||||||
</C:comp-filter>
|
</C:comp-filter>
|
||||||
</C:comp-filter>"""], "valarm", items=[1, 2])
|
</C:comp-filter>"""], "valarm", items=[1, 2])
|
||||||
assert "/calendar.ics/valarm1.ics" not in answer
|
assert "/calendar.ics/valarm1.ics" not in answer
|
||||||
assert "/calendar.ics/valarm2.ics" in answer # absolute date
|
assert "/calendar.ics/valarm2.ics" in answer # absolute date
|
||||||
answer = self._test_filter(["""\
|
answer = self._test_filter(["""\
|
||||||
<C:comp-filter name="VCALENDAR">
|
<C:comp-filter name="VCALENDAR">
|
||||||
<C:comp-filter name="VEVENT">
|
<C:comp-filter name="VEVENT">
|
||||||
|
@ -1348,7 +1348,7 @@ permissions: RrWw""")
|
||||||
</C:comp-filter>
|
</C:comp-filter>
|
||||||
</C:comp-filter>
|
</C:comp-filter>
|
||||||
</C:comp-filter>"""], "valarm", items=[1, 2])
|
</C:comp-filter>"""], "valarm", items=[1, 2])
|
||||||
assert "/calendar.ics/valarm1.ics" in answer # -15 min offset
|
assert "/calendar.ics/valarm1.ics" in answer # -15 min offset
|
||||||
assert "/calendar.ics/valarm2.ics" not in answer
|
assert "/calendar.ics/valarm2.ics" not in answer
|
||||||
|
|
||||||
def test_time_range_filter_todos_completed(self) -> None:
|
def test_time_range_filter_todos_completed(self) -> None:
|
||||||
|
|
|
@ -102,7 +102,7 @@ def ssl_context_options_by_protocol(protocol: str, ssl_context_options):
|
||||||
ssl_context_options |= ssl.OP_NO_TLSv1_3
|
ssl_context_options |= ssl.OP_NO_TLSv1_3
|
||||||
logger.debug("SSL cleared SSL context options: '0x%x'", ssl_context_options)
|
logger.debug("SSL cleared SSL context options: '0x%x'", ssl_context_options)
|
||||||
for entry in protocol.split():
|
for entry in protocol.split():
|
||||||
entry = entry.strip('+') # remove trailing '+'
|
entry = entry.strip('+') # remove trailing '+'
|
||||||
if entry == "ALL":
|
if entry == "ALL":
|
||||||
logger.debug("SSL context options, enable ALL (some maybe not supported by underlying OpenSSL, SSLv2 not enabled at all)")
|
logger.debug("SSL context options, enable ALL (some maybe not supported by underlying OpenSSL, SSLv2 not enabled at all)")
|
||||||
ssl_context_options &= ~ssl.OP_NO_SSLv3
|
ssl_context_options &= ~ssl.OP_NO_SSLv3
|
||||||
|
@ -162,7 +162,7 @@ def ssl_context_options_by_protocol(protocol: str, ssl_context_options):
|
||||||
|
|
||||||
def ssl_context_minimum_version_by_options(ssl_context_options):
|
def ssl_context_minimum_version_by_options(ssl_context_options):
|
||||||
logger.debug("SSL calculate minimum version by context options: '0x%x'", ssl_context_options)
|
logger.debug("SSL calculate minimum version by context options: '0x%x'", ssl_context_options)
|
||||||
ssl_context_minimum_version = ssl.TLSVersion.SSLv3 # default
|
ssl_context_minimum_version = ssl.TLSVersion.SSLv3 # default
|
||||||
if ((ssl_context_options & ssl.OP_NO_SSLv3) and (ssl_context_minimum_version == ssl.TLSVersion.SSLv3)):
|
if ((ssl_context_options & ssl.OP_NO_SSLv3) and (ssl_context_minimum_version == ssl.TLSVersion.SSLv3)):
|
||||||
ssl_context_minimum_version = ssl.TLSVersion.TLSv1
|
ssl_context_minimum_version = ssl.TLSVersion.TLSv1
|
||||||
if ((ssl_context_options & ssl.OP_NO_TLSv1) and (ssl_context_minimum_version == ssl.TLSVersion.TLSv1)):
|
if ((ssl_context_options & ssl.OP_NO_TLSv1) and (ssl_context_minimum_version == ssl.TLSVersion.TLSv1)):
|
||||||
|
@ -172,7 +172,7 @@ def ssl_context_minimum_version_by_options(ssl_context_options):
|
||||||
if ((ssl_context_options & ssl.OP_NO_TLSv1_2) and (ssl_context_minimum_version == ssl.TLSVersion.TLSv1_2)):
|
if ((ssl_context_options & ssl.OP_NO_TLSv1_2) and (ssl_context_minimum_version == ssl.TLSVersion.TLSv1_2)):
|
||||||
ssl_context_minimum_version = ssl.TLSVersion.TLSv1_3
|
ssl_context_minimum_version = ssl.TLSVersion.TLSv1_3
|
||||||
if ((ssl_context_options & ssl.OP_NO_TLSv1_3) and (ssl_context_minimum_version == ssl.TLSVersion.TLSv1_3)):
|
if ((ssl_context_options & ssl.OP_NO_TLSv1_3) and (ssl_context_minimum_version == ssl.TLSVersion.TLSv1_3)):
|
||||||
ssl_context_minimum_version = 0 # all disabled
|
ssl_context_minimum_version = 0 # all disabled
|
||||||
|
|
||||||
logger.debug("SSL context options: '0x%x' results in minimum version: %s", ssl_context_options, ssl_context_minimum_version)
|
logger.debug("SSL context options: '0x%x' results in minimum version: %s", ssl_context_options, ssl_context_minimum_version)
|
||||||
return ssl_context_minimum_version
|
return ssl_context_minimum_version
|
||||||
|
@ -180,7 +180,7 @@ def ssl_context_minimum_version_by_options(ssl_context_options):
|
||||||
|
|
||||||
def ssl_context_maximum_version_by_options(ssl_context_options):
|
def ssl_context_maximum_version_by_options(ssl_context_options):
|
||||||
logger.debug("SSL calculate maximum version by context options: '0x%x'", ssl_context_options)
|
logger.debug("SSL calculate maximum version by context options: '0x%x'", ssl_context_options)
|
||||||
ssl_context_maximum_version = ssl.TLSVersion.TLSv1_3 # default
|
ssl_context_maximum_version = ssl.TLSVersion.TLSv1_3 # default
|
||||||
if ((ssl_context_options & ssl.OP_NO_TLSv1_3) and (ssl_context_maximum_version == ssl.TLSVersion.TLSv1_3)):
|
if ((ssl_context_options & ssl.OP_NO_TLSv1_3) and (ssl_context_maximum_version == ssl.TLSVersion.TLSv1_3)):
|
||||||
ssl_context_maximum_version = ssl.TLSVersion.TLSv1_2
|
ssl_context_maximum_version = ssl.TLSVersion.TLSv1_2
|
||||||
if ((ssl_context_options & ssl.OP_NO_TLSv1_2) and (ssl_context_maximum_version == ssl.TLSVersion.TLSv1_2)):
|
if ((ssl_context_options & ssl.OP_NO_TLSv1_2) and (ssl_context_maximum_version == ssl.TLSVersion.TLSv1_2)):
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue