]> git.ipfire.org Git - thirdparty/dnspython.git/commitdiff
flake8 linting
authorBob Halley <halley@dnspython.org>
Wed, 20 May 2020 14:18:56 +0000 (07:18 -0700)
committerBob Halley <halley@dnspython.org>
Wed, 20 May 2020 14:18:56 +0000 (07:18 -0700)
dns/dnssec.py
dns/opcode.py
dns/rdataclass.py
dns/rdatatype.py
dns/rdtypes/ANY/CDNSKEY.py
dns/rdtypes/ANY/DNSKEY.py
dns/rdtypes/dnskeybase.py

index dee290d094fadc2a2a0646288c5e535a4f9e56a9..f775086ffe68757ef4b4751bd943494175ded307 100644 (file)
@@ -105,7 +105,7 @@ def key_id(key):
     """
 
     rdata = _to_rdata(key, None)
-    if key.algorithm == RSAMD5:
+    if key.algorithm == Algorithm.RSAMD5:
         return (rdata[-3] << 8) + rdata[-2]
     else:
         total = 0
@@ -196,46 +196,46 @@ def _find_candidate_keys(keys, rrsig):
 
 
 def _is_rsa(algorithm):
-    return algorithm in (RSAMD5, RSASHA1,
-                         RSASHA1NSEC3SHA1, RSASHA256,
-                         RSASHA512)
+    return algorithm in (Algorithm.RSAMD5, Algorithm.RSASHA1,
+                         Algorithm.RSASHA1NSEC3SHA1, Algorithm.RSASHA256,
+                         Algorithm.RSASHA512)
 
 
 def _is_dsa(algorithm):
-    return algorithm in (DSA, DSANSEC3SHA1)
+    return algorithm in (Algorithm.DSA, Algorithm.DSANSEC3SHA1)
 
 
 def _is_ecdsa(algorithm):
-    return algorithm in (ECDSAP256SHA256, ECDSAP384SHA384)
+    return algorithm in (Algorithm.ECDSAP256SHA256, Algorithm.ECDSAP384SHA384)
 
 
 def _is_eddsa(algorithm):
-    return algorithm in (ED25519, ED448)
+    return algorithm in (Algorithm.ED25519, Algorithm.ED448)
 
 
 def _is_gost(algorithm):
-    return algorithm == ECCGOST
+    return algorithm == Algorithm.ECCGOST
 
 
 def _is_md5(algorithm):
-    return algorithm == RSAMD5
+    return algorithm == Algorithm.RSAMD5
 
 
 def _is_sha1(algorithm):
-    return algorithm in (DSA, RSASHA1,
-                         DSANSEC3SHA1, RSASHA1NSEC3SHA1)
+    return algorithm in (Algorithm.DSA, Algorithm.RSASHA1,
+                         Algorithm.DSANSEC3SHA1, Algorithm.RSASHA1NSEC3SHA1)
 
 
 def _is_sha256(algorithm):
-    return algorithm in (RSASHA256, ECDSAP256SHA256)
+    return algorithm in (Algorithm.RSASHA256, Algorithm.ECDSAP256SHA256)
 
 
 def _is_sha384(algorithm):
-    return algorithm == ECDSAP384SHA384
+    return algorithm == Algorithm.ECDSAP384SHA384
 
 
 def _is_sha512(algorithm):
-    return algorithm == RSASHA512
+    return algorithm == Algorithm.RSASHA512
 
 
 def _make_hash(algorithm):
@@ -249,9 +249,9 @@ def _make_hash(algorithm):
         return hashes.SHA384()
     if _is_sha512(algorithm):
         return hashes.SHA512()
-    if algorithm == ED25519:
+    if algorithm == Algorithm.ED25519:
         return hashes.SHA512()
-    if algorithm == ED448:
+    if algorithm == Algorithm.ED448:
         return hashes.SHAKE256(114)
 
     raise ValidationFailure('unknown hash for algorithm %u' % algorithm)
@@ -358,7 +358,7 @@ def _validate_rrsig(rrset, rrsig, keys, origin=None, now=None):
                                              _bytes_to_long(sig_s))
         elif _is_ecdsa(rrsig.algorithm):
             keyptr = candidate_key.key
-            if rrsig.algorithm == ECDSAP256SHA256:
+            if rrsig.algorithm == Algorithm.ECDSAP256SHA256:
                 curve = ec.SECP256R1()
                 octets = 32
             else:
@@ -380,7 +380,7 @@ def _validate_rrsig(rrset, rrsig, keys, origin=None, now=None):
 
         elif _is_eddsa(rrsig.algorithm):
             keyptr = candidate_key.key
-            if rrsig.algorithm == ED25519:
+            if rrsig.algorithm == Algorithm.ED25519:
                 loader = ed25519.Ed25519PublicKey
             else:
                 loader = ed448.Ed448PublicKey
index 509916e9e4ff8e8139c5560beadc519ecca6e433..5a76326a7071514b50d5ef610e3f8f894e7b48ec 100644 (file)
@@ -104,4 +104,4 @@ def is_update(flags):
     Returns a ``bool``.
     """
 
-    return from_flags(flags) == UPDATE
+    return from_flags(flags) == Opcode.UPDATE
index e7c957be0a90594101a194d57460cb16c8b2ad01..46744eabbc25d85faad4265f6d6deaa460114f1a 100644 (file)
@@ -50,7 +50,7 @@ class RdataClass(dns.enum.IntEnum):
 
 globals().update(RdataClass.__members__)
 
-_metaclasses = {NONE, ANY}
+_metaclasses = {RdataClass.NONE, RdataClass.ANY}
 
 
 class UnknownRdataclass(dns.exception.DNSException):
index ba2e261509cc908806c83c8f8e405ae5698398b6..0a669ebc80996d0009e2dbce9bbcb7fcdf9f236e 100644 (file)
@@ -116,9 +116,10 @@ _registered_by_value = {}
 
 globals().update(RdataType.__members__)
 
-_metatypes = {OPT}
+_metatypes = {RdataType.OPT}
 
-_singletons = {SOA, NXT, DNAME, NSEC, CNAME}
+_singletons = {RdataType.SOA, RdataType.NXT, RdataType.DNAME,
+               RdataType.NSEC, RdataType.CNAME}
 
 
 class UnknownRdatatype(dns.exception.DNSException):
index aae8bd7770cd7baf697c141d7e89e8eaf87b1dd9..7225318304f458a3ec31251a43cb852e9b7960ba 100644 (file)
@@ -16,7 +16,7 @@
 # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 
 import dns.rdtypes.dnskeybase
-from dns.rdtypes.dnskeybase import SEP, REVOKE, ZONE
+from dns.rdtypes.dnskeybase import SEP, REVOKE, ZONE  # noqa: F401
 
 
 class CDNSKEY(dns.rdtypes.dnskeybase.DNSKEYBase):
index f5c918b0c35174bb2f61ecb4dc6ff86e008dae0e..2ee37988cc820a469038ce02ab525eee89477611 100644 (file)
@@ -16,7 +16,7 @@
 # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 
 import dns.rdtypes.dnskeybase
-from dns.rdtypes.dnskeybase import SEP, REVOKE, ZONE
+from dns.rdtypes.dnskeybase import SEP, REVOKE, ZONE  # noqa: F401
 
 
 class DNSKEY(dns.rdtypes.dnskeybase.DNSKEYBase):
index 3b35a0c64447372a0fc4c7c5b23e210cbf95418e..1099e394551f85cc0a2503567000a9dfa7101fab 100644 (file)
@@ -24,7 +24,7 @@ import dns.dnssec
 import dns.rdata
 
 # wildcard import
-__all__ = ["SEP", "REVOKE", "ZONE"]
+__all__ = ["SEP", "REVOKE", "ZONE"]   # noqa: F822
 
 class Flag(enum.IntFlag):
     SEP = 0x0001