Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit 4548d1f

Browse files
Remove unnecessary parentheses around return statements (#5931)
Python will return a tuple whether there are parentheses around the returned values or not. I'm just sick of my editor complaining about this all over the place :)
1 parent 4fca313 commit 4548d1f

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+287
-286
lines changed

changelog.d/5931.misc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Remove unnecessary parentheses in return statements.

synapse/api/auth.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -276,25 +276,25 @@ def _get_appservice_user_id(self, request):
276276
self.get_access_token_from_request(request)
277277
)
278278
if app_service is None:
279-
return (None, None)
279+
return None, None
280280

281281
if app_service.ip_range_whitelist:
282282
ip_address = IPAddress(self.hs.get_ip_from_request(request))
283283
if ip_address not in app_service.ip_range_whitelist:
284-
return (None, None)
284+
return None, None
285285

286286
if b"user_id" not in request.args:
287-
return (app_service.sender, app_service)
287+
return app_service.sender, app_service
288288

289289
user_id = request.args[b"user_id"][0].decode("utf8")
290290
if app_service.sender == user_id:
291-
return (app_service.sender, app_service)
291+
return app_service.sender, app_service
292292

293293
if not app_service.is_interested_in_user(user_id):
294294
raise AuthError(403, "Application service cannot masquerade as this user.")
295295
if not (yield self.store.get_user_by_id(user_id)):
296296
raise AuthError(403, "Application service has not registered this user")
297-
return (user_id, app_service)
297+
return user_id, app_service
298298

299299
@defer.inlineCallbacks
300300
def get_user_by_access_token(self, token, rights="access"):
@@ -694,7 +694,7 @@ def check_in_room_or_world_readable(self, room_id, user_id):
694694
# * The user is a guest user, and has joined the room
695695
# else it will throw.
696696
member_event = yield self.check_user_was_in_room(room_id, user_id)
697-
return (member_event.membership, member_event.event_id)
697+
return member_event.membership, member_event.event_id
698698
except AuthError:
699699
visibility = yield self.state.get_current_state(
700700
room_id, EventTypes.RoomHistoryVisibility, ""
@@ -703,7 +703,7 @@ def check_in_room_or_world_readable(self, room_id, user_id):
703703
visibility
704704
and visibility.content["history_visibility"] == "world_readable"
705705
):
706-
return (Membership.JOIN, None)
706+
return Membership.JOIN, None
707707
return
708708
raise AuthError(
709709
403, "Guest access not allowed", errcode=Codes.GUEST_ACCESS_FORBIDDEN

synapse/app/frontend_proxy.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,12 +70,12 @@ def on_GET(self, request, user_id):
7070
except HttpResponseException as e:
7171
raise e.to_synapse_error()
7272

73-
return (200, result)
73+
return 200, result
7474

7575
@defer.inlineCallbacks
7676
def on_PUT(self, request, user_id):
7777
yield self.auth.get_user_by_req(request)
78-
return (200, {})
78+
return 200, {}
7979

8080

8181
class KeyUploadServlet(RestServlet):
@@ -126,11 +126,11 @@ def on_POST(self, request, device_id):
126126
self.main_uri + request.uri.decode("ascii"), body, headers=headers
127127
)
128128

129-
return (200, result)
129+
return 200, result
130130
else:
131131
# Just interested in counts.
132132
result = yield self.store.count_e2e_one_time_keys(user_id, device_id)
133-
return (200, {"one_time_key_counts": result})
133+
return 200, {"one_time_key_counts": result}
134134

135135

136136
class FrontendProxySlavedStore(

synapse/crypto/event_signing.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ def compute_content_hash(event_dict, hash_algorithm):
8383
event_json_bytes = encode_canonical_json(event_dict)
8484

8585
hashed = hash_algorithm(event_json_bytes)
86-
return (hashed.name, hashed.digest())
86+
return hashed.name, hashed.digest()
8787

8888

8989
def compute_event_reference_hash(event, hash_algorithm=hashlib.sha256):
@@ -106,7 +106,7 @@ def compute_event_reference_hash(event, hash_algorithm=hashlib.sha256):
106106
event_dict.pop("unsigned", None)
107107
event_json_bytes = encode_canonical_json(event_dict)
108108
hashed = hash_algorithm(event_json_bytes)
109-
return (hashed.name, hashed.digest())
109+
return hashed.name, hashed.digest()
110110

111111

112112
def compute_event_signature(event_dict, signature_name, signing_key):

synapse/federation/federation_client.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ def get_state_for_room(self, destination, room_id, event_id):
355355

356356
auth_chain.sort(key=lambda e: e.depth)
357357

358-
return (pdus, auth_chain)
358+
return pdus, auth_chain
359359
except HttpResponseException as e:
360360
if e.code == 400 or e.code == 404:
361361
logger.info("Failed to use get_room_state_ids API, falling back")
@@ -404,7 +404,7 @@ def get_state_for_room(self, destination, room_id, event_id):
404404

405405
signed_auth.sort(key=lambda e: e.depth)
406406

407-
return (signed_pdus, signed_auth)
407+
return signed_pdus, signed_auth
408408

409409
@defer.inlineCallbacks
410410
def get_events_from_store_or_dest(self, destination, room_id, event_ids):
@@ -429,7 +429,7 @@ def get_events_from_store_or_dest(self, destination, room_id, event_ids):
429429
missing_events.discard(k)
430430

431431
if not missing_events:
432-
return (signed_events, failed_to_fetch)
432+
return signed_events, failed_to_fetch
433433

434434
logger.debug(
435435
"Fetching unknown state/auth events %s for room %s",
@@ -465,7 +465,7 @@ def get_events_from_store_or_dest(self, destination, room_id, event_ids):
465465
# We removed all events we successfully fetched from `batch`
466466
failed_to_fetch.update(batch)
467467

468-
return (signed_events, failed_to_fetch)
468+
return signed_events, failed_to_fetch
469469

470470
@defer.inlineCallbacks
471471
@log_function

synapse/federation/federation_server.py

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ def on_backfill_request(self, origin, room_id, versions, limit):
100100

101101
res = self._transaction_from_pdus(pdus).get_dict()
102102

103-
return (200, res)
103+
return 200, res
104104

105105
@defer.inlineCallbacks
106106
@log_function
@@ -163,7 +163,7 @@ def _handle_incoming_transaction(self, origin, transaction, request_time):
163163
yield self.transaction_actions.set_response(
164164
origin, transaction, 400, response
165165
)
166-
return (400, response)
166+
return 400, response
167167

168168
received_pdus_counter.inc(len(transaction.pdus))
169169

@@ -265,7 +265,7 @@ def process_pdus_for_room(room_id):
265265
logger.debug("Returning: %s", str(response))
266266

267267
yield self.transaction_actions.set_response(origin, transaction, 200, response)
268-
return (200, response)
268+
return 200, response
269269

270270
@defer.inlineCallbacks
271271
def received_edu(self, origin, edu_type, content):
@@ -298,7 +298,7 @@ def on_context_state_request(self, origin, room_id, event_id):
298298
event_id,
299299
)
300300

301-
return (200, resp)
301+
return 200, resp
302302

303303
@defer.inlineCallbacks
304304
def on_state_ids_request(self, origin, room_id, event_id):
@@ -315,7 +315,7 @@ def on_state_ids_request(self, origin, room_id, event_id):
315315
state_ids = yield self.handler.get_state_ids_for_pdu(room_id, event_id)
316316
auth_chain_ids = yield self.store.get_auth_chain_ids(state_ids)
317317

318-
return (200, {"pdu_ids": state_ids, "auth_chain_ids": auth_chain_ids})
318+
return 200, {"pdu_ids": state_ids, "auth_chain_ids": auth_chain_ids}
319319

320320
@defer.inlineCallbacks
321321
def _on_context_state_request_compute(self, room_id, event_id):
@@ -345,15 +345,15 @@ def on_pdu_request(self, origin, event_id):
345345
pdu = yield self.handler.get_persisted_pdu(origin, event_id)
346346

347347
if pdu:
348-
return (200, self._transaction_from_pdus([pdu]).get_dict())
348+
return 200, self._transaction_from_pdus([pdu]).get_dict()
349349
else:
350-
return (404, "")
350+
return 404, ""
351351

352352
@defer.inlineCallbacks
353353
def on_query_request(self, query_type, args):
354354
received_queries_counter.labels(query_type).inc()
355355
resp = yield self.registry.on_query(query_type, args)
356-
return (200, resp)
356+
return 200, resp
357357

358358
@defer.inlineCallbacks
359359
def on_make_join_request(self, origin, room_id, user_id, supported_versions):
@@ -435,7 +435,7 @@ def on_send_leave_request(self, origin, content, room_id):
435435

436436
logger.debug("on_send_leave_request: pdu sigs: %s", pdu.signatures)
437437
yield self.handler.on_send_leave_request(origin, pdu)
438-
return (200, {})
438+
return 200, {}
439439

440440
@defer.inlineCallbacks
441441
def on_event_auth(self, origin, room_id, event_id):
@@ -446,7 +446,7 @@ def on_event_auth(self, origin, room_id, event_id):
446446
time_now = self._clock.time_msec()
447447
auth_pdus = yield self.handler.on_event_auth(event_id)
448448
res = {"auth_chain": [a.get_pdu_json(time_now) for a in auth_pdus]}
449-
return (200, res)
449+
return 200, res
450450

451451
@defer.inlineCallbacks
452452
def on_query_auth_request(self, origin, content, room_id, event_id):
@@ -499,7 +499,7 @@ def on_query_auth_request(self, origin, content, room_id, event_id):
499499
"missing": ret.get("missing", []),
500500
}
501501

502-
return (200, send_content)
502+
return 200, send_content
503503

504504
@log_function
505505
def on_query_client_keys(self, origin, content):

synapse/handlers/account_data.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,8 @@ def get_new_events(self, user, from_key, **kwargs):
5151
{"type": account_data_type, "content": content, "room_id": room_id}
5252
)
5353

54-
return (results, current_stream_id)
54+
return results, current_stream_id
5555

5656
@defer.inlineCallbacks
5757
def get_pagination_rows(self, user, config, key):
58-
return ([], config.to_id)
58+
return [], config.to_id

synapse/handlers/auth.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ def check_auth(self, flows, clientdict, clientip, password_servlet=False):
280280
creds,
281281
list(clientdict),
282282
)
283-
return (creds, clientdict, session["id"])
283+
return creds, clientdict, session["id"]
284284

285285
ret = self._auth_dict_for_flows(flows, session)
286286
ret["completed"] = list(creds)
@@ -722,7 +722,7 @@ def validate_login(self, username, login_submission):
722722
known_login_type = True
723723
is_valid = yield provider.check_password(qualified_user_id, password)
724724
if is_valid:
725-
return (qualified_user_id, None)
725+
return qualified_user_id, None
726726

727727
if not hasattr(provider, "get_supported_login_types") or not hasattr(
728728
provider, "check_auth"
@@ -766,7 +766,7 @@ def validate_login(self, username, login_submission):
766766
)
767767

768768
if canonical_user_id:
769-
return (canonical_user_id, None)
769+
return canonical_user_id, None
770770

771771
if not known_login_type:
772772
raise SynapseError(400, "Unknown login type %s" % login_type)
@@ -816,7 +816,7 @@ def check_password_provider_3pid(self, medium, address, password):
816816
result = (result, None)
817817
return result
818818

819-
return (None, None)
819+
return None, None
820820

821821
@defer.inlineCallbacks
822822
def _check_local_password(self, user_id, password):

synapse/handlers/federation.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1428,7 +1428,7 @@ def _make_and_verify_event(
14281428
assert event.user_id == user_id
14291429
assert event.state_key == user_id
14301430
assert event.room_id == room_id
1431-
return (origin, event, format_ver)
1431+
return origin, event, format_ver
14321432

14331433
@defer.inlineCallbacks
14341434
@log_function

synapse/handlers/initial_sync.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -449,7 +449,7 @@ def _check_in_room_or_world_readable(self, room_id, user_id):
449449
# * The user is a guest user, and has joined the room
450450
# else it will throw.
451451
member_event = yield self.auth.check_user_was_in_room(room_id, user_id)
452-
return (member_event.membership, member_event.event_id)
452+
return member_event.membership, member_event.event_id
453453
return
454454
except AuthError:
455455
visibility = yield self.state_handler.get_current_state(
@@ -459,7 +459,7 @@ def _check_in_room_or_world_readable(self, room_id, user_id):
459459
visibility
460460
and visibility.content["history_visibility"] == "world_readable"
461461
):
462-
return (Membership.JOIN, None)
462+
return Membership.JOIN, None
463463
return
464464
raise AuthError(
465465
403, "Guest access not allowed", errcode=Codes.GUEST_ACCESS_FORBIDDEN

0 commit comments

Comments
 (0)