summaryrefslogtreecommitdiff
path: root/keystoneclient/contrib
diff options
context:
space:
mode:
authorNavid Pustchi <npustchi@gmail.com>2016-05-03 18:54:12 +0000
committerNavid Pustchi <npustchi@gmail.com>2016-05-04 19:45:30 +0000
commitbca112c8ba5636becd6951fbfb8cb8f2474279fe (patch)
tree9c8e9ba8f060f1f4a8f6bd3cb4101a0f9ba7e45e /keystoneclient/contrib
parenta9adca02dbdbf786dd7015f4d3c67c514d757423 (diff)
downloadpython-keystoneclient-bca112c8ba5636becd6951fbfb8cb8f2474279fe.tar.gz
Fixing D202 and D203 PEP257 violation.
Currently tox ignores D202 and D203. D202: No blank lines allowed after function docstring. D203: 1 blank required before class docstring. This change removes D202 and D203 ignores in tox and fix violations. Change-Id: I97ef88c9cfd56774e47f789cbbcf8ccfe85d7737
Diffstat (limited to 'keystoneclient/contrib')
-rw-r--r--keystoneclient/contrib/auth/v3/oidc.py1
-rw-r--r--keystoneclient/contrib/auth/v3/saml2.py4
-rw-r--r--keystoneclient/contrib/ec2/utils.py1
3 files changed, 0 insertions, 6 deletions
diff --git a/keystoneclient/contrib/auth/v3/oidc.py b/keystoneclient/contrib/auth/v3/oidc.py
index 3c9f6d9..957c50e 100644
--- a/keystoneclient/contrib/auth/v3/oidc.py
+++ b/keystoneclient/contrib/auth/v3/oidc.py
@@ -138,7 +138,6 @@ class OidcPassword(federated.FederatedBaseAuth):
:returns: a token data representation
:rtype: :py:class:`keystoneclient.access.AccessInfo`
"""
-
# get an access token
client_auth = (self.client_id, self.client_secret)
payload = {'grant_type': self.grant_type, 'username': self.username,
diff --git a/keystoneclient/contrib/auth/v3/saml2.py b/keystoneclient/contrib/auth/v3/saml2.py
index a519458..8a07b7f 100644
--- a/keystoneclient/contrib/auth/v3/saml2.py
+++ b/keystoneclient/contrib/auth/v3/saml2.py
@@ -293,7 +293,6 @@ class Saml2UnscopedToken(_BaseSAMLPlugin):
def _send_idp_saml2_authn_request(self, session):
"""Present modified SAML2 authn assertion from the Service Provider."""
-
self._prepare_idp_saml2_request(self.saml2_authn_request)
idp_saml2_authn_request = self.saml2_authn_request
@@ -581,7 +580,6 @@ class ADFSUnscopedToken(_BaseSAMLPlugin):
:type fmt: string
"""
-
date_created = datetime.datetime.utcnow()
date_expires = date_created + datetime.timedelta(
seconds=self.DEFAULT_ADFS_TOKEN_EXPIRATION)
@@ -593,7 +591,6 @@ class ADFSUnscopedToken(_BaseSAMLPlugin):
Some values like username or password are inserted in the request.
"""
-
WSS_SECURITY_NAMESPACE = {
'o': ('http://docs.oasis-open.org/wss/2004/01/oasis-200401-'
'wss-wssecurity-secext-1.0.xsd')
@@ -905,7 +902,6 @@ class Saml2ScopedTokenMethod(v3.TokenMethod):
def get_auth_data(self, session, auth, headers, **kwargs):
"""Build and return request body for token scoping step."""
-
t = super(Saml2ScopedTokenMethod, self).get_auth_data(
session, auth, headers, **kwargs)
_token_method, token = t
diff --git a/keystoneclient/contrib/ec2/utils.py b/keystoneclient/contrib/ec2/utils.py
index 2906abe..f7fb8a1 100644
--- a/keystoneclient/contrib/ec2/utils.py
+++ b/keystoneclient/contrib/ec2/utils.py
@@ -162,7 +162,6 @@ class Ec2Signer(object):
def _calc_signature_4(self, params, verb, server_string, path, headers,
body_hash):
"""Generate AWS signature version 4 string."""
-
def sign(key, msg):
return hmac.new(key, self._get_utf8_value(msg),
hashlib.sha256).digest()