From 4811f35eb5c66a06fae3e8f85da6d374d3230be1 Mon Sep 17 00:00:00 2001
From: Eliot Berriot <contact@eliotberriot.com>
Date: Thu, 10 Jan 2019 11:10:39 +0100
Subject: [PATCH] Linting

---
 api/funkwhale_api/federation/authentication.py | 12 ++++++------
 api/funkwhale_api/federation/exceptions.py     |  1 -
 api/funkwhale_api/federation/utils.py          |  3 +--
 api/tests/federation/test_utils.py             |  2 +-
 4 files changed, 8 insertions(+), 10 deletions(-)

diff --git a/api/funkwhale_api/federation/authentication.py b/api/funkwhale_api/federation/authentication.py
index 6f0fd329..adfb8a18 100644
--- a/api/funkwhale_api/federation/authentication.py
+++ b/api/funkwhale_api/federation/authentication.py
@@ -2,7 +2,7 @@ import cryptography
 import logging
 
 from django.contrib.auth.models import AnonymousUser
-from rest_framework import authentication, exceptions
+from rest_framework import authentication, exceptions as rest_exceptions
 
 from funkwhale_api.moderation import models as moderation_models
 from . import actors, exceptions, keys, signing, utils
@@ -20,12 +20,12 @@ class SignatureAuthentication(authentication.BaseAuthentication):
         except KeyError:
             return
         except ValueError as e:
-            raise exceptions.AuthenticationFailed(str(e))
+            raise rest_exceptions.AuthenticationFailed(str(e))
 
         try:
             actor_url = key_id.split("#")[0]
         except (TypeError, IndexError, AttributeError):
-            raise exceptions.AuthenticationFailed("Invalid key id")
+            raise rest_exceptions.AuthenticationFailed("Invalid key id")
 
         policies = (
             moderation_models.InstancePolicy.objects.active()
@@ -41,15 +41,15 @@ class SignatureAuthentication(authentication.BaseAuthentication):
             logger.info(
                 "Discarding HTTP request from blocked actor/domain %s", actor_url
             )
-            raise exceptions.AuthenticationFailed(str(e))
+            raise rest_exceptions.AuthenticationFailed(str(e))
 
         if not actor.public_key:
-            raise exceptions.AuthenticationFailed("No public key found")
+            raise rest_exceptions.AuthenticationFailed("No public key found")
 
         try:
             signing.verify_django(request, actor.public_key.encode("utf-8"))
         except cryptography.exceptions.InvalidSignature:
-            raise exceptions.AuthenticationFailed("Invalid signature")
+            raise rest_exceptions.AuthenticationFailed("Invalid signature")
 
         return actor
 
diff --git a/api/funkwhale_api/federation/exceptions.py b/api/funkwhale_api/federation/exceptions.py
index 303a0c4b..eb2bd216 100644
--- a/api/funkwhale_api/federation/exceptions.py
+++ b/api/funkwhale_api/federation/exceptions.py
@@ -1,4 +1,3 @@
-from rest_framework import authentication, exceptions
 from rest_framework import exceptions
 
 
diff --git a/api/funkwhale_api/federation/utils.py b/api/funkwhale_api/federation/utils.py
index f29608a2..e49a4dd6 100644
--- a/api/funkwhale_api/federation/utils.py
+++ b/api/funkwhale_api/federation/utils.py
@@ -1,7 +1,6 @@
 import unicodedata
 import re
 from django.conf import settings
-from django.db.models import Q
 
 from funkwhale_api.common import session
 from funkwhale_api.moderation import models as moderation_models
@@ -64,7 +63,7 @@ def slugify_username(username):
 def retrieve_ap_object(
     fid, actor=None, serializer_class=None, queryset=None, apply_instance_policies=True
 ):
-    from . import activity, serializers
+    from . import activity
 
     policies = moderation_models.InstancePolicy.objects.active().filter(block_all=True)
     if apply_instance_policies and policies.matching_url(fid):
diff --git a/api/tests/federation/test_utils.py b/api/tests/federation/test_utils.py
index 761f44d3..a8d02cdb 100644
--- a/api/tests/federation/test_utils.py
+++ b/api/tests/federation/test_utils.py
@@ -79,7 +79,7 @@ def test_retrieve_ap_object_honor_instance_policy_different_url_and_id(
         block_all=True, for_domain=True
     ).target_domain
     fid = "https://ok/test"
-    m = r_mock.get(fid, json={"id": "http://{}/test".format(domain.name)})
+    r_mock.get(fid, json={"id": "http://{}/test".format(domain.name)})
 
     with pytest.raises(exceptions.BlockedActorOrDomain):
         utils.retrieve_ap_object(fid)
-- 
GitLab