Skip to content

Commit

Permalink
isort config and apply
Browse files Browse the repository at this point in the history
  • Loading branch information
loechel committed May 5, 2017
1 parent c056981 commit 6cfd519
Show file tree
Hide file tree
Showing 46 changed files with 269 additions and 126 deletions.
25 changes: 22 additions & 3 deletions setup.cfg
Expand Up @@ -4,10 +4,30 @@ ignore =
bootstrap.py

[isort]
force_alphabetical_sort = True
force_alphabetical_sort = False
force_single_line = True
lines_after_imports = 2
force_to_top = False
from_first = True

sections = FUTURE,STDLIB,COMPATLIB,FIRSTPARTY,THIRDPARTY,ZOPE,LOCALFOLDER

known_compatlib = six
known_firstparty =
known_thirdparty =
known_zope = zope,Products,zc,z3c,ExtensionClass,Acquisition,Persistence,RestrictedPython
known_localfolder = AccessControl

import_heading_future_library = Future Imports
import_heading_stdlib = Standard Library Imports
import_heading_compatlib = Python 2 / 3 compatibility helper libraries
import_heading_firstparty =
import_heading_thirdparty =
import_heading_zope = Zope Imports
import_heading_localfolder = AccessControl internal imports

line_length = 200
lines_after_imports = 2

skip =
bootstrap.py
not_skip =
Expand All @@ -24,6 +44,5 @@ ignore =
N805,
N806,
N812,
E301,
F821,
F841,
9 changes: 5 additions & 4 deletions src/AccessControl/AuthEncoding.py
Expand Up @@ -14,17 +14,18 @@
# flake8: NOQA: E401

from __future__ import absolute_import

from AuthEncoding.AuthEncoding import MySQLDigestScheme
from AuthEncoding.AuthEncoding import PasswordEncryptionScheme
from AuthEncoding.AuthEncoding import SHADigestScheme
from AuthEncoding.AuthEncoding import SSHADigestScheme
from AuthEncoding.AuthEncoding import constant_time_compare
from AuthEncoding.AuthEncoding import is_encrypted
from AuthEncoding.AuthEncoding import listSchemes
from AuthEncoding.AuthEncoding import MySQLDigestScheme
from AuthEncoding.AuthEncoding import PasswordEncryptionScheme
from AuthEncoding.AuthEncoding import pw_encode
from AuthEncoding.AuthEncoding import pw_encrypt
from AuthEncoding.AuthEncoding import pw_validate
from AuthEncoding.AuthEncoding import registerScheme
from AuthEncoding.AuthEncoding import SHADigestScheme
from AuthEncoding.AuthEncoding import SSHADigestScheme


# Bogosity on various platforms due to ITAR restrictions
Expand Down
1 change: 1 addition & 0 deletions src/AccessControl/DTML.py
Expand Up @@ -13,6 +13,7 @@
"""Add security system support to Document Templates
"""

# Zope Imports
from zope.deferredimport import deprecated


Expand Down
3 changes: 2 additions & 1 deletion src/AccessControl/ImplC.py
Expand Up @@ -15,13 +15,14 @@

"""C implementation of the access control machinery."""

# AccessControl internal imports
from AccessControl.cAccessControl import SecurityManager as cSecurityManager
from AccessControl.cAccessControl import ZopeSecurityPolicy as cZopeSecurityPolicy # NOQA: E501
from AccessControl.cAccessControl import PermissionRole
from AccessControl.cAccessControl import _what_not_even_god_should_do
from AccessControl.cAccessControl import aq_validate
from AccessControl.cAccessControl import guarded_getattr
from AccessControl.cAccessControl import imPermissionRole
from AccessControl.cAccessControl import PermissionRole
from AccessControl.cAccessControl import rolesForPermissionOn
from AccessControl.cAccessControl import setDefaultBehaviors
from AccessControl.ImplPython import SecurityManager
Expand Down
13 changes: 8 additions & 5 deletions src/AccessControl/ImplPython.py
Expand Up @@ -15,19 +15,22 @@

# isort:skip

# Standard Library Imports
from logging import getLogger
import os

# Python 2 / 3 compatibility helper libraries
from six import string_types

# Zope Imports
from Acquisition import aq_acquire
from Acquisition import aq_base
from Acquisition import aq_inContextOf
from Acquisition import aq_inner
from Acquisition import aq_parent
from ExtensionClass import Base
from logging import getLogger
from six import string_types
from zope.interface import implementer

import os
# import string


# This is used when a permission maps explicitly to no permission. We
# try and get this from cAccessControl first to make sure that if both
Expand Down
9 changes: 6 additions & 3 deletions src/AccessControl/Owned.py
Expand Up @@ -15,14 +15,17 @@

# flake8: NOQA: E401

# Zope Imports
from zope.deferredimport import deprecated

# AccessControl internal imports
# BBB
from AccessControl.owner import absattr
from AccessControl.owner import EditUnowned
from AccessControl.owner import EmergencyUserCannotOwn
from AccessControl.owner import UnownableOwner
from AccessControl.owner import absattr
from AccessControl.owner import ownableFilter
from AccessControl.owner import ownerInfo
from AccessControl.owner import UnownableOwner
from zope.deferredimport import deprecated


deprecated(
Expand Down
6 changes: 4 additions & 2 deletions src/AccessControl/Permission.py
Expand Up @@ -13,10 +13,12 @@
"""Permissions
"""

from Acquisition import aq_base

# Standard Library Imports
import re

# Zope Imports
from Acquisition import aq_base


_NOT_ALLOWED_CHARS = re.compile(r'[^a-zA-Z0-9_]')

Expand Down
13 changes: 9 additions & 4 deletions src/AccessControl/PermissionMapping.py
Expand Up @@ -17,15 +17,20 @@
need the object's ordinary permissions intact so we can manage it.
"""

# Standard Library Imports
from cgi import escape

# Zope Imports
from Acquisition import ImplicitAcquisitionWrapper
from ExtensionClass import Base
from zope.interface import implementer

# AccessControl internal imports
from AccessControl.class_init import InitializeClass
from AccessControl.interfaces import IPermissionMappingSupport
from AccessControl.owner import UnownableOwner
from AccessControl.Permission import getPermissionIdentifier
from AccessControl.requestmethod import requestmethod
from Acquisition import ImplicitAcquisitionWrapper
from cgi import escape
from ExtensionClass import Base
from zope.interface import implementer


@implementer(IPermissionMappingSupport)
Expand Down
1 change: 1 addition & 0 deletions src/AccessControl/Permissions.py
Expand Up @@ -13,6 +13,7 @@
"""Constant definitions for built-in Zope permissions
"""

# Zope Imports
from zope.deferredimport import deprecated


Expand Down
7 changes: 5 additions & 2 deletions src/AccessControl/Role.py
Expand Up @@ -15,18 +15,21 @@

# flake8: NOQA: E401

# Zope Imports
from zope.deferredimport import deprecated

# AccessControl internal imports
# BBB
from AccessControl.rolemanager import DEFAULTMAXLISTUSERS
from AccessControl.rolemanager import _isBeingUsedAsAMethod
from AccessControl.rolemanager import _isNotBeingUsedAsAMethod
from AccessControl.rolemanager import class_attrs
from AccessControl.rolemanager import class_dict
from AccessControl.rolemanager import classattr
from AccessControl.rolemanager import DEFAULTMAXLISTUSERS
from AccessControl.rolemanager import gather_permissions
from AccessControl.rolemanager import instance_attrs
from AccessControl.rolemanager import instance_dict
from AccessControl.rolemanager import reqattr
from zope.deferredimport import deprecated


deprecated(
Expand Down
12 changes: 8 additions & 4 deletions src/AccessControl/SecurityInfo.py
Expand Up @@ -38,13 +38,17 @@
"""

from AccessControl.class_init import InitializeClass
from AccessControl.ImplPython import _what_not_even_god_should_do
from Acquisition import Implicit
# Standard Library Imports
from logging import getLogger
import sys

# Zope Imports
from Acquisition import Implicit
from Persistence import Persistent

import sys
# AccessControl internal imports
from AccessControl.class_init import InitializeClass
from AccessControl.ImplPython import _what_not_even_god_should_do


# always patch Persistent before ClassSecurityInfo is used
Expand Down
2 changes: 2 additions & 0 deletions src/AccessControl/SecurityManagement.py
Expand Up @@ -13,6 +13,8 @@
"""Security management
"""
from __future__ import absolute_import

# AccessControl internal imports
from AccessControl import SpecialUsers


Expand Down
1 change: 1 addition & 0 deletions src/AccessControl/SecurityManager.py
Expand Up @@ -13,6 +13,7 @@
'''API module to set the security policy
'''

# AccessControl internal imports
from AccessControl import ImplPython as _ImplPython
# from AccessControl.SimpleObjectPolicies import _noroles

Expand Down
1 change: 0 additions & 1 deletion src/AccessControl/SimpleObjectPolicies.py
Expand Up @@ -59,7 +59,6 @@
from BTrees.OOBTree import OOBTree
from BTrees.OOBTree import OOBucket
from BTrees.OOBTree import OOSet

import Record


Expand Down
15 changes: 9 additions & 6 deletions src/AccessControl/User.py
Expand Up @@ -15,24 +15,27 @@

# flake8: NOQA: E401

# Zope Imports
from zope.deferredimport import deprecated

# AccessControl internal imports
from AccessControl.users import UnrestrictedUser as Super
from AccessControl.users import BasicUser
from AccessControl.users import NullUnrestrictedUser
from AccessControl.users import SimpleUser
from AccessControl.users import SpecialUser
from AccessControl.users import User
from AccessControl.users import _remote_user_mode
from AccessControl.users import absattr
from AccessControl.users import addr_match
from AccessControl.users import BasicUser
from AccessControl.users import domainSpecMatch
from AccessControl.users import emergency_user
from AccessControl.users import host_match
from AccessControl.users import nobody
from AccessControl.users import NullUnrestrictedUser
from AccessControl.users import readUserAccessFile
from AccessControl.users import reqattr
from AccessControl.users import rolejoin
from AccessControl.users import SimpleUser
from AccessControl.users import SpecialUser
from AccessControl.users import system
from AccessControl.users import User
from zope.deferredimport import deprecated


deprecated(
Expand Down
30 changes: 19 additions & 11 deletions src/AccessControl/ZopeGuards.py
Expand Up @@ -12,25 +12,33 @@
##############################################################################

from __future__ import absolute_import
from AccessControl.SecurityInfo import secureModule
from AccessControl.SecurityManagement import getSecurityManager
from AccessControl.SimpleObjectPolicies import ContainerAssertions
from AccessControl.SimpleObjectPolicies import Containers

# Standard Library Imports
from functools import reduce
import math
import random
import string
import warnings

# Python 2 / 3 compatibility helper libraries
import six

from zExceptions import Unauthorized

# Zope Imports
from RestrictedPython.Eval import RestrictionCapableEval
from RestrictedPython.Guards import full_write_guard
from RestrictedPython.Guards import guarded_iter_unpack_sequence
from RestrictedPython.Guards import guarded_unpack_sequence
from RestrictedPython.Guards import safe_builtins
from RestrictedPython.Utilities import utility_builtins
from zExceptions import Unauthorized

import math
import random
import RestrictedPython
import six
import string
import warnings

# AccessControl internal imports
from AccessControl.SecurityInfo import secureModule
from AccessControl.SecurityManagement import getSecurityManager
from AccessControl.SimpleObjectPolicies import ContainerAssertions
from AccessControl.SimpleObjectPolicies import Containers


_marker = [] # Create a new marker object.
Expand Down
10 changes: 8 additions & 2 deletions src/AccessControl/ZopeSecurityPolicy.py
Expand Up @@ -13,11 +13,17 @@
"""Define Zope's default security policy
"""
from __future__ import absolute_import

# Standard Library Imports
from types import MethodType

# Python 2 / 3 compatibility helper libraries
from six import string_types

# AccessControl internal imports
# AccessControl.Implementation inserts:
# ZopeSecurityPolicy, getRoles, rolesForPermissionOn
from AccessControl.SimpleObjectPolicies import _noroles
from six import string_types
from types import MethodType


rolesForPermissionOn = None # XXX: avoid import loop
Expand Down
5 changes: 3 additions & 2 deletions src/AccessControl/__init__.py
Expand Up @@ -13,15 +13,16 @@

# flake8: NOQA: E401

# AccessControl internal imports
# This has to happen early so things get initialized properly
from AccessControl.Implementation import setImplementation
from AccessControl.SecurityInfo import ACCESS_NONE
from AccessControl.SecurityInfo import ACCESS_PRIVATE
from AccessControl.SecurityInfo import ACCESS_PUBLIC
from AccessControl.SecurityInfo import allow_class
from AccessControl.SecurityInfo import allow_module
from AccessControl.SecurityInfo import ClassSecurityInfo
from AccessControl.SecurityInfo import ModuleSecurityInfo
from AccessControl.SecurityInfo import allow_class
from AccessControl.SecurityInfo import allow_module
from AccessControl.SecurityInfo import secureModule
from AccessControl.SecurityManagement import getSecurityManager
from AccessControl.SecurityManagement import setSecurityPolicy
Expand Down
6 changes: 4 additions & 2 deletions src/AccessControl/class_init.py
Expand Up @@ -13,10 +13,12 @@
"""Class initialization.
"""

from AccessControl.Permission import ApplicationDefaultPermissions # BBB # NOQA: F401,E501

# Standard Library Imports
import logging

# AccessControl internal imports
from AccessControl.Permission import ApplicationDefaultPermissions # BBB # NOQA: F401,E501


def InitializeClass(self):
from AccessControl.Permission import registerPermissions
Expand Down

0 comments on commit 6cfd519

Please sign in to comment.