]> git.ipfire.org Git - thirdparty/tornado.git/commitdiff
Run autopep8
authorBen Darnell <ben@bendarnell.com>
Sun, 10 Apr 2016 19:42:50 +0000 (15:42 -0400)
committerBen Darnell <ben@bendarnell.com>
Sun, 10 Apr 2016 19:42:50 +0000 (15:42 -0400)
tornado/auth.py
tornado/test/auth_test.py
tornado/test/simple_httpclient_test.py
tornado/test/web_test.py
tornado/testing.py

index 9e6e1754d03127a7f689dd3706f39dbf1b640210..ee3db4e95dbd8add93b351894d26b9b2d1beb776 100644 (file)
@@ -995,8 +995,8 @@ class FacebookGraphMixin(OAuth2Mixin):
                 self._on_get_user_info, future, session, fields),
             access_token=session["access_token"],
             appsecret_proof=hmac.new(key=client_secret.encode('utf8'),
-                msg=session["access_token"].encode('utf8'),
-                digestmod=hashlib.sha256).hexdigest(),
+                                     msg=session["access_token"].encode('utf8'),
+                                     digestmod=hashlib.sha256).hexdigest(),
             fields=",".join(fields)
         )
 
index 0a7d9bbfa4ade706014bc753ed3693c137fbb9c0..92616fa30632e005a4f35d80dd3a61cd915530bd 100644 (file)
@@ -430,8 +430,8 @@ class AuthTest(AsyncHTTPTestCase):
         parsed = json_decode(response.body)
         self.assertEqual(parsed,
                          {u'access_token': {u'key': u'hjkl',
-                                              u'screen_name': u'foo',
-                                              u'secret': u'vbnm'},
+                                            u'screen_name': u'foo',
+                                            u'secret': u'vbnm'},
                           u'name': u'Foo',
                           u'screen_name': u'foo',
                           u'username': u'foo'})
index 0f60aba7cdb914a1f3c5b9110ec161e6e33ec01f..74073182d7afb418e7249a70082c39aa681dbf97 100644 (file)
@@ -773,6 +773,6 @@ class ChunkedWithContentLengthTest(AsyncHTTPTestCase):
     def test_chunked_with_content_length(self):
         # Make sure the invalid headers are detected
         with ExpectLog(gen_log, ("Malformed HTTP message from None: Response "
-                       "with both Transfer-Encoding and Content-Length")):
+                                 "with both Transfer-Encoding and Content-Length")):
             response = self.fetch('/chunkwithcl')
         self.assertEqual(response.code, 599)
index 24e6b07a7298c94a98d75bd1803b4d55ca811473..fd4d137d8880a4b880724f663e2cc99a2050feda 100644 (file)
@@ -1479,6 +1479,7 @@ class RaiseWithReasonTest(SimpleHandlerTestCase):
     def test_httperror_str_from_httputil(self):
         self.assertEqual(str(HTTPError(682)), "HTTP 682: Unknown")
 
+
 @wsgi_safe
 class ErrorHandlerXSRFTest(WebTestCase):
     def get_handlers(self):
@@ -2187,6 +2188,7 @@ class BaseStreamingRequestFlowControlTest(object):
                                        'data_received', 'data_received',
                                        'post']))
 
+
 class DecoratedStreamingRequestFlowControlTest(
         BaseStreamingRequestFlowControlTest,
         WebTestCase):
index f000771db085bbfd595f6bd81e03823fd43c0fc0..e3f7ea60866fd071668d80dd406030f7d41988bc 100644 (file)
@@ -98,7 +98,7 @@ def bind_unused_port(reuse_port=False):
     Returns a tuple (socket, port).
     """
     sock = netutil.bind_sockets(None, '127.0.0.1', family=socket.AF_INET,
-                                  reuse_port=reuse_port)[0]
+                                reuse_port=reuse_port)[0]
     port = sock.getsockname()[1]
     return sock, port