Skip to content

Commit 96aeb68

Browse files
committed
Codestyle fixes
1 parent ac1164e commit 96aeb68

File tree

19 files changed

+551
-402
lines changed

19 files changed

+551
-402
lines changed

redis/asyncio/client.py

Lines changed: 24 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,13 @@
5353
list_or_args,
5454
)
5555
from redis.credentials import CredentialProvider
56-
from redis.event import EventDispatcher, AfterPooledConnectionsInstantiationEvent, ClientType, \
57-
AfterSingleConnectionInstantiationEvent, AfterPubSubConnectionInstantiationEvent
56+
from redis.event import (
57+
AfterPooledConnectionsInstantiationEvent,
58+
AfterPubSubConnectionInstantiationEvent,
59+
AfterSingleConnectionInstantiationEvent,
60+
ClientType,
61+
EventDispatcher,
62+
)
5863
from redis.exceptions import (
5964
ConnectionError,
6065
ExecAbortError,
@@ -323,19 +328,19 @@ def __init__(
323328
# This arg only used if no pool is passed in
324329
self.auto_close_connection_pool = auto_close_connection_pool
325330
connection_pool = ConnectionPool(**kwargs)
326-
event_dispatcher.dispatch(AfterPooledConnectionsInstantiationEvent(
327-
[connection_pool],
328-
ClientType.ASYNC,
329-
credential_provider
330-
))
331+
event_dispatcher.dispatch(
332+
AfterPooledConnectionsInstantiationEvent(
333+
[connection_pool], ClientType.ASYNC, credential_provider
334+
)
335+
)
331336
else:
332337
# If a pool is passed in, do not close it
333338
self.auto_close_connection_pool = False
334-
event_dispatcher.dispatch(AfterPooledConnectionsInstantiationEvent(
335-
[connection_pool],
336-
ClientType.ASYNC,
337-
credential_provider
338-
))
339+
event_dispatcher.dispatch(
340+
AfterPooledConnectionsInstantiationEvent(
341+
[connection_pool], ClientType.ASYNC, credential_provider
342+
)
343+
)
339344

340345
self.connection_pool = connection_pool
341346
self._event_dispatcher = event_dispatcher
@@ -370,7 +375,9 @@ async def initialize(self: _RedisT) -> _RedisT:
370375
self.connection = await self.connection_pool.get_connection("_")
371376

372377
self._event_dispatcher.dispatch(
373-
AfterSingleConnectionInstantiationEvent(self.connection, ClientType.ASYNC, self._single_conn_lock)
378+
AfterSingleConnectionInstantiationEvent(
379+
self.connection, ClientType.ASYNC, self._single_conn_lock
380+
)
374381
)
375382
return self
376383

@@ -539,7 +546,9 @@ def pubsub(self, **kwargs) -> "PubSub":
539546
subscribe to channels and listen for messages that get published to
540547
them.
541548
"""
542-
return PubSub(self.connection_pool, event_dispatcher=self._event_dispatcher, **kwargs)
549+
return PubSub(
550+
self.connection_pool, event_dispatcher=self._event_dispatcher, **kwargs
551+
)
543552

544553
def monitor(self) -> "Monitor":
545554
return Monitor(self.connection_pool)
@@ -898,10 +907,7 @@ async def connect(self):
898907

899908
self._event_dispatcher.dispatch(
900909
AfterPubSubConnectionInstantiationEvent(
901-
self.connection,
902-
self.connection_pool,
903-
ClientType.ASYNC,
904-
self._lock
910+
self.connection, self.connection_pool, ClientType.ASYNC, self._lock
905911
)
906912
)
907913

redis/asyncio/cluster.py

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,11 @@
4747
from redis.commands import READ_COMMANDS, AsyncRedisClusterCommands
4848
from redis.crc import REDIS_CLUSTER_HASH_SLOTS, key_slot
4949
from redis.credentials import CredentialProvider
50-
from redis.event import EventDispatcher, AsyncAfterConnectionReleasedEvent, AfterAsyncClusterInstantiationEvent
50+
from redis.event import (
51+
AfterAsyncClusterInstantiationEvent,
52+
AsyncAfterConnectionReleasedEvent,
53+
EventDispatcher,
54+
)
5155
from redis.exceptions import (
5256
AskError,
5357
BusyLoadingError,
@@ -60,10 +64,11 @@
6064
MaxConnectionsError,
6165
MovedError,
6266
RedisClusterException,
67+
RedisError,
6368
ResponseError,
6469
SlotNotCoveredError,
6570
TimeoutError,
66-
TryAgainError, RedisError,
71+
TryAgainError,
6772
)
6873
from redis.typing import AnyKeyT, EncodableT, KeyT
6974
from redis.utils import (
@@ -1097,12 +1102,13 @@ async def re_auth_callback(self, token: TokenInterface):
10971102
while self._free:
10981103
conn = self._free.popleft()
10991104
await conn.retry.call_with_retry(
1100-
lambda: conn.send_command('AUTH', token.try_get('oid'), token.get_value()),
1101-
lambda error: self._mock(error)
1105+
lambda: conn.send_command(
1106+
"AUTH", token.try_get("oid"), token.get_value()
1107+
),
1108+
lambda error: self._mock(error),
11021109
)
11031110
await conn.retry.call_with_retry(
1104-
lambda: conn.read_response(),
1105-
lambda error: self._mock(error)
1111+
lambda: conn.read_response(), lambda error: self._mock(error)
11061112
)
11071113
tmp_queue.append(conn)
11081114

@@ -1272,7 +1278,8 @@ async def initialize(self) -> None:
12721278
self._event_dispatcher.dispatch(
12731279
AfterAsyncClusterInstantiationEvent(
12741280
self.nodes_cache,
1275-
self.connection_kwargs.get("credential_provider", None))
1281+
self.connection_kwargs.get("credential_provider", None),
1282+
)
12761283
)
12771284
cluster_slots = await startup_node.execute_command("CLUSTER SLOTS")
12781285
except ResponseError:

redis/asyncio/connection.py

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
from urllib.parse import ParseResult, parse_qs, unquote, urlparse
3030

3131
from ..auth.token import TokenInterface
32-
from ..event import EventDispatcher, AsyncAfterConnectionReleasedEvent
32+
from ..event import AsyncAfterConnectionReleasedEvent, EventDispatcher
3333
from ..utils import format_error_message
3434

3535
# the functionality is available in 3.11.x but has a major issue before
@@ -42,7 +42,11 @@
4242
from redis.asyncio.retry import Retry
4343
from redis.backoff import NoBackoff
4444
from redis.connection import DEFAULT_RESP_VERSION
45-
from redis.credentials import CredentialProvider, UsernamePasswordCredentialProvider, StreamingCredentialProvider
45+
from redis.credentials import (
46+
CredentialProvider,
47+
StreamingCredentialProvider,
48+
UsernamePasswordCredentialProvider,
49+
)
4650
from redis.exceptions import (
4751
AuthenticationError,
4852
AuthenticationWrongNumberOfArgsError,
@@ -151,7 +155,7 @@ def __init__(
151155
encoder_class: Type[Encoder] = Encoder,
152156
credential_provider: Optional[CredentialProvider] = None,
153157
protocol: Optional[int] = 2,
154-
event_dispatcher: Optional[EventDispatcher] = EventDispatcher()
158+
event_dispatcher: Optional[EventDispatcher] = EventDispatcher(),
155159
):
156160
if (username or password) and credential_provider is not None:
157161
raise DataError(
@@ -678,9 +682,9 @@ def set_re_auth_token(self, token: TokenInterface):
678682
async def re_auth(self):
679683
if self._re_auth_token is not None:
680684
await self.send_command(
681-
'AUTH',
682-
self._re_auth_token.try_get('oid'),
683-
self._re_auth_token.get_value()
685+
"AUTH",
686+
self._re_auth_token.try_get("oid"),
687+
self._re_auth_token.get_value(),
684688
)
685689
await self.read_response()
686690
self._re_auth_token = None
@@ -1143,7 +1147,9 @@ async def release(self, connection: AbstractConnection):
11431147
# not doing so is an error that will cause an exception here.
11441148
self._in_use_connections.remove(connection)
11451149
self._available_connections.append(connection)
1146-
await self._event_dispatcher.dispatch_async(AsyncAfterConnectionReleasedEvent(connection))
1150+
await self._event_dispatcher.dispatch_async(
1151+
AsyncAfterConnectionReleasedEvent(connection)
1152+
)
11471153

11481154
async def disconnect(self, inuse_connections: bool = True):
11491155
"""
@@ -1181,12 +1187,13 @@ async def re_auth_callback(self, token: TokenInterface):
11811187
async with self._lock:
11821188
for conn in self._available_connections:
11831189
await conn.retry.call_with_retry(
1184-
lambda: conn.send_command('AUTH', token.try_get('oid'), token.get_value()),
1185-
lambda error: self._mock(error)
1190+
lambda: conn.send_command(
1191+
"AUTH", token.try_get("oid"), token.get_value()
1192+
),
1193+
lambda error: self._mock(error),
11861194
)
11871195
await conn.retry.call_with_retry(
1188-
lambda: conn.read_response(),
1189-
lambda error: self._mock(error)
1196+
lambda: conn.read_response(), lambda error: self._mock(error)
11901197
)
11911198
for conn in self._in_use_connections:
11921199
conn.set_re_auth_token(token)

redis/auth/err.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ class RequestTokenErr(Exception):
55
"""
66
Represents an exception during token request.
77
"""
8+
89
def __init__(self, *args):
910
super().__init__(*args)
1011

@@ -13,15 +14,18 @@ class InvalidTokenSchemaErr(Exception):
1314
"""
1415
Represents an exception related to invalid token schema.
1516
"""
17+
1618
def __init__(self, missing_fields: Iterable[str] = []):
1719
super().__init__(
18-
"Unexpected token schema. Following fields are missing: " + ", ".join(missing_fields)
20+
"Unexpected token schema. Following fields are missing: "
21+
+ ", ".join(missing_fields)
1922
)
2023

2124

2225
class TokenRenewalErr(Exception):
2326
"""
2427
Represents an exception during token renewal process.
2528
"""
29+
2630
def __init__(self, *args):
27-
super().__init__(*args)
31+
super().__init__(*args)

redis/auth/idp.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
from abc import ABC, abstractmethod
2+
23
from redis.auth.token import TokenInterface
34

45
"""
@@ -20,6 +21,7 @@ class IdentityProviderConfigInterface(ABC):
2021
"""
2122
Configuration class that provides a configured identity provider.
2223
"""
24+
2325
@abstractmethod
2426
def get_provider(self) -> IdentityProviderInterface:
2527
pass

redis/auth/token.py

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
11
from abc import ABC, abstractmethod
2-
3-
import jwt
42
from datetime import datetime, timezone
53

4+
import jwt
65
from redis.auth.err import InvalidTokenSchemaErr
76

87

@@ -44,7 +43,9 @@ def get_ttl_ms(self) -> float:
4443

4544

4645
class SimpleToken(TokenInterface):
47-
def __init__(self, value: str, expires_at_ms: float, received_at_ms: float, claims: dict) -> None:
46+
def __init__(
47+
self, value: str, expires_at_ms: float, received_at_ms: float, claims: dict
48+
) -> None:
4849
self.value = value
4950
self.expires_at = expires_at_ms
5051
self.received_at = received_at_ms
@@ -77,30 +78,34 @@ def get_received_at_ms(self) -> float:
7778

7879
class JWToken(TokenInterface):
7980

80-
REQUIRED_FIELDS = {'exp'}
81+
REQUIRED_FIELDS = {"exp"}
8182

8283
def __init__(self, token: str):
8384
self._value = token
8485
self._decoded = jwt.decode(
8586
self._value,
8687
options={"verify_signature": False},
87-
algorithms=[jwt.get_unverified_header(self._value).get('alg')]
88+
algorithms=[jwt.get_unverified_header(self._value).get("alg")],
8889
)
8990
self._validate_token()
9091

9192
def is_expired(self) -> bool:
92-
exp = self._decoded['exp']
93+
exp = self._decoded["exp"]
9394
if exp == -1:
9495
return False
9596

96-
return self._decoded['exp'] * 1000 <= datetime.now(timezone.utc).timestamp() * 1000
97+
return (
98+
self._decoded["exp"] * 1000 <= datetime.now(timezone.utc).timestamp() * 1000
99+
)
97100

98101
def ttl(self) -> float:
99-
exp = self._decoded['exp']
102+
exp = self._decoded["exp"]
100103
if exp == -1:
101104
return -1
102105

103-
return self._decoded['exp'] * 1000 - datetime.now(timezone.utc).timestamp() * 1000
106+
return (
107+
self._decoded["exp"] * 1000 - datetime.now(timezone.utc).timestamp() * 1000
108+
)
104109

105110
def try_get(self, key: str) -> str:
106111
return self._decoded.get(key)
@@ -109,7 +114,7 @@ def get_value(self) -> str:
109114
return self._value
110115

111116
def get_expires_at_ms(self) -> float:
112-
return float(self._decoded['exp'] * 1000)
117+
return float(self._decoded["exp"] * 1000)
113118

114119
def get_received_at_ms(self) -> float:
115120
return datetime.now(timezone.utc).timestamp() * 1000
@@ -118,4 +123,4 @@ def _validate_token(self):
118123
actual_fields = {x for x in self._decoded.keys()}
119124

120125
if len(self.REQUIRED_FIELDS - actual_fields) != 0:
121-
raise InvalidTokenSchemaErr(self.REQUIRED_FIELDS - actual_fields)
126+
raise InvalidTokenSchemaErr(self.REQUIRED_FIELDS - actual_fields)

0 commit comments

Comments
 (0)