Skip to content

Commit

Permalink
Merge pull request psf#887 from rvoicilas/develop
Browse files Browse the repository at this point in the history
Small changes to make the code more PEP8 compliant
  • Loading branch information
Kenneth Reitz committed Oct 17, 2012
2 parents 2363243 + 820dfb0 commit c631627
Show file tree
Hide file tree
Showing 11 changed files with 30 additions and 22 deletions.
2 changes: 1 addition & 1 deletion requests/auth.py
Expand Up @@ -94,7 +94,7 @@ def __call__(self, r):
# to preserve body.
r.url, r.headers, _ = self.client.sign(
unicode(r.full_url), unicode(r.method), None, r.headers)
elif decoded_body != None and contenttype in (CONTENT_TYPE_FORM_URLENCODED, ''):
elif decoded_body is not None and contenttype in (CONTENT_TYPE_FORM_URLENCODED, ''):
# Normal signing
if not contenttype:
r.headers['Content-Type'] = CONTENT_TYPE_FORM_URLENCODED
Expand Down
2 changes: 1 addition & 1 deletion requests/compat.py
Expand Up @@ -115,5 +115,5 @@
builtin_str = str
str = str
bytes = bytes
basestring = (str,bytes)
basestring = (str, bytes)
numeric_types = (int, float)
10 changes: 4 additions & 6 deletions requests/cookies.py
Expand Up @@ -235,7 +235,7 @@ def get_dict(self, domain=None, path=None):
Python dict of name-value pairs of cookies that meet the requirements."""
dictionary = {}
for cookie in iter(self):
if (domain == None or cookie.domain == domain) and (path == None
if (domain is None or cookie.domain == domain) and (path is None
or cookie.path == path):
dictionary[cookie.name] = cookie.value
return dictionary
Expand Down Expand Up @@ -279,7 +279,7 @@ def _find_no_duplicates(self, name, domain=None, path=None):
if cookie.name == name:
if domain is None or cookie.domain == domain:
if path is None or cookie.path == path:
if toReturn != None: # if there are multiple cookies that meet passed in criteria
if toReturn is not None: # if there are multiple cookies that meet passed in criteria
raise CookieConflictError('There are multiple cookies with name, %r' % (name))
toReturn = cookie.value # we will eventually return this as long as no cookie conflict

Expand Down Expand Up @@ -324,8 +324,7 @@ def create_cookie(name, value, **kwargs):
comment=None,
comment_url=None,
rest={'HttpOnly': None},
rfc2109=False,
)
rfc2109=False,)

badargs = set(kwargs) - set(result)
if badargs:
Expand Down Expand Up @@ -360,8 +359,7 @@ def morsel_to_cookie(morsel):
comment=morsel['comment'],
comment_url=bool(morsel['comment']),
rest={'HttpOnly': morsel['httponly']},
rfc2109=False,
)
rfc2109=False,)
return c


Expand Down
1 change: 0 additions & 1 deletion requests/hooks.py
Expand Up @@ -45,5 +45,4 @@ def dispatch_hook(key, hooks, hook_data):
if _hook_data is not None:
hook_data = _hook_data


return hook_data
2 changes: 1 addition & 1 deletion requests/models.py
Expand Up @@ -111,7 +111,7 @@ def __init__(self,
# Dictionary mapping protocol to the URL of the proxy (e.g. {'http': 'foo.bar:3128'})
self.proxies = dict(proxies or [])

for proxy_type,uri_ref in list(self.proxies.items()):
for proxy_type, uri_ref in list(self.proxies.items()):
if not uri_ref:
del self.proxies[proxy_type]

Expand Down
5 changes: 4 additions & 1 deletion requests/utils.py
Expand Up @@ -378,13 +378,15 @@ def stream_decode_response_unicode(iterator, r):
if rv:
yield rv


def iter_slices(string, slice_length):
"""Iterate over slices of a string."""
pos = 0
while pos < len(string):
yield string[pos:pos+slice_length]
yield string[pos:pos + slice_length]
pos += slice_length


def get_unicode_from_response(r):
"""Returns the requested content back in unicode.
Expand Down Expand Up @@ -543,6 +545,7 @@ def default_user_agent():
'%s/%s' % (platform.system(), platform.release()),
])


def parse_header_links(value):
"""Return a dict of parsed link headers proxies.
Expand Down
6 changes: 5 additions & 1 deletion tests/informal/test_leaked_connections.py
Expand Up @@ -4,7 +4,11 @@
the body of the request is not read.
"""

import gc, os, subprocess, requests, sys
import gc
import os
import requests
import subprocess
import sys


def main():
Expand Down
12 changes: 7 additions & 5 deletions tests/test_proxies.py
@@ -1,7 +1,9 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-

import sys, os, unittest
import os
import sys
import unittest

# Path hack.
sys.path.insert(0, os.path.abspath('..'))
Expand All @@ -14,13 +16,13 @@ class HTTPSProxyTest(unittest.TestCase):
smoke_url = "https://github.com"

def test_empty_https_proxy(self):
proxy = {"https" : "" }
result = requests.get(self.smoke_url, verify=False, proxies = proxy)
proxy = {"https": ""}
result = requests.get(self.smoke_url, verify=False, proxies=proxy)
self.assertEqual(result.status_code, 200)

def test_empty_http_proxy(self):
proxy = {"http" : "" }
result = requests.get(self.smoke_url, proxies = proxy)
proxy = {"http": ""}
result = requests.get(self.smoke_url, proxies=proxy)
self.assertEqual(result.status_code, 200)

if __name__ == '__main__':
Expand Down
5 changes: 3 additions & 2 deletions tests/test_requests.py
Expand Up @@ -51,6 +51,7 @@ def setUp(self):
# time.sleep(1)
_httpbin = True


class TestBaseMixin(object):

def assertCookieHas(self, cookie, **kwargs):
Expand All @@ -60,6 +61,7 @@ def assertCookieHas(self, cookie, **kwargs):
message = 'Failed comparison for %s: %s != %s' % (attr, cookie_attr, expected_value)
self.assertEqual(cookie_attr, expected_value, message)


class RequestsTestSuite(TestSetup, TestBaseMixin, unittest.TestCase):
"""Requests test cases."""

Expand Down Expand Up @@ -903,7 +905,7 @@ def test_connection_error(self):
def test_connection_error_with_safe_mode(self):
config = {'safe_mode': True}
r = get('http://localhost:1/nope', allow_redirects=False, config=config)
assert r.content == None
assert r.content is None

# def test_invalid_content(self):
# # WARNING: if you're using a terrible DNS provider (comcast),
Expand Down Expand Up @@ -1038,7 +1040,6 @@ def test_danger_mode_redirects(self):
s.config['danger_mode'] = True
s.get(httpbin('redirect', '4'))


def test_empty_response(self):
r = requests.get(httpbin('status', '404'))
r.text
Expand Down
3 changes: 2 additions & 1 deletion tests/test_requests_ext.py
Expand Up @@ -2,7 +2,8 @@
# -*- coding: utf-8 -*-

# Path hack.
import sys, os
import os
import sys
sys.path.insert(0, os.path.abspath('..'))

import unittest
Expand Down
4 changes: 2 additions & 2 deletions tests/test_requests_https.py
@@ -1,8 +1,8 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-

import sys, os
import json
import os
import sys
import unittest

# Path hack.
Expand Down

0 comments on commit c631627

Please sign in to comment.