Skip to content

Commit d0e36ec

Browse files
authored
Fix lint warnings, Add some lint rulesets (#257)
* Remove lint rules from ignore: these are now ignored by default * Add new rulesets to lint (DTZ, FA, PIE, RET, SIM): See https://docs.astral.sh/ruff/rules/ for details * Fix minor issues found by the rulesets * datetime.now() is deprecated * start argument in range() calls is not required * elif not required after return * pass not required Signed-off-by: Jussi Kukkonen <[email protected]>
1 parent 5860c5b commit d0e36ec

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

pyproject.toml

+1-2
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,8 @@ module = ["securesystemslib.*"]
3434
ignore_missing_imports = "True"
3535

3636
[tool.ruff]
37-
lint.select = ["ANN", "E", "F", "I", "N", "PL", "PYI", "RUF", "S", "UP", "W",]
37+
lint.select = ["ANN", "DTZ", "E", "F", "FA", "I", "N", "PIE", "PL", "PYI", "RET", "RUF", "S", "SIM", "UP", "W",]
3838
lint.ignore = [
39-
"ANN101", "ANN102", # nonsense, deprecated in ruff
4039
"S101", # assert is fine in pytest tests
4140
"PLR2004", # magic values are ok in a test suite
4241
]

tuf_conformance/repository_simulator.py

+6-4
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
sim = RepositorySimulator()
1919
2020
# publish a new version of metadata
21-
sim.root.expires = datetime.datetime.utcnow() + datetime.timedelta(days=7)
21+
sim.root.expires = datetime.datetime.now(datetime.UTC) + datetime.timedelta(days=7)
2222
sim.publish([Root.type])
2323
2424
# there are helper functions to do things like adding an artifact
@@ -115,7 +115,7 @@ def __init__(self, dump_dir: str | None) -> None:
115115
self.metadata_statistics: list[tuple[str, int | None]] = []
116116
self.artifact_statistics: list[tuple[str, str | None]] = []
117117

118-
now = datetime.datetime.utcnow()
118+
now = datetime.datetime.now(datetime.UTC)
119119
self.safe_expiry = now.replace(microsecond=0) + datetime.timedelta(days=30)
120120

121121
# Make a semi-deep copy of generated signers: The private keys can't be deep
@@ -179,7 +179,7 @@ def rotate_keys(self, role: str) -> None:
179179
"""remove all keys for role, then add threshold of new keys"""
180180
self.root.roles[role].keyids.clear()
181181
self.signers[role].clear()
182-
for _ in range(0, self.root.roles[role].threshold):
182+
for _ in range(self.root.roles[role].threshold):
183183
signer = self.new_signer()
184184
self.root.add_key(signer.public_key, role)
185185
self.add_signer(role, signer)
@@ -282,7 +282,8 @@ def fetch(self, path: str) -> bytes:
282282

283283
self.metadata_statistics.append((role, version))
284284
return self.fetch_metadata(role, version)
285-
elif path.startswith("targets/"):
285+
286+
if path.startswith("targets/"):
286287
# figure out target path and hash prefix
287288
target_path = path[len("targets/") :]
288289
dir_parts, sep, prefixed_filename = target_path.rpartition("/")
@@ -295,6 +296,7 @@ def fetch(self, path: str) -> bytes:
295296

296297
self.artifact_statistics.append((target_path, prefix))
297298
return self.fetch_target(target_path, prefix)
299+
298300
raise ValueError(f"Unknown path '{path}'")
299301

300302
def fetch_target(self, target_path: str, target_hash: str | None) -> bytes:

tuf_conformance/simulator_server.py

-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,6 @@ def log_message(self, format: str, *args: str) -> None:
4747
4848
Avoid output for now. TODO We may want to log in some situations?
4949
"""
50-
pass
5150

5251

5352
class SimulatorServer(ThreadingHTTPServer):

tuf_conformance/test_keys.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ def test_duplicate_keys(client: ClientRunner, server: SimulatorServer) -> None:
8080
signer = repo.new_signer()
8181

8282
# Add one key 9 times to root
83-
for n in range(0, 9):
83+
for n in range(9):
8484
repo.root.add_key(signer.public_key, Snapshot.type)
8585

8686
repo.add_signer(Snapshot.type, signer)
@@ -98,7 +98,7 @@ def test_duplicate_keys(client: ClientRunner, server: SimulatorServer) -> None:
9898
if sig["keyid"] == signer.public_key.keyid:
9999
break
100100
assert sig is not None
101-
for n in range(0, 8):
101+
for n in range(8):
102102
md["signatures"].append(sig)
103103
repo.signed_mds[Snapshot.type].append(json.dumps(md).encode())
104104

0 commit comments

Comments
 (0)