Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Commit

Permalink
Replace returnValue with return (#5736)
Browse files Browse the repository at this point in the history
  • Loading branch information
anoadragon453 committed Feb 19, 2020
2 parents 2f270e2 + 4806651 commit f590f77
Show file tree
Hide file tree
Showing 177 changed files with 1,355 additions and 1,509 deletions.
1 change: 1 addition & 0 deletions changelog.d/5736.misc
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Replace uses of returnValue with plain return, as returnValue is not needed on Python 3.
2 changes: 1 addition & 1 deletion docs/log_contexts.rst
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ call any other functions.
d = more_stuff()
result = yield d # also fine, of course
defer.returnValue(result)
return result
def nonInlineCallbacksFun():
logger.debug("just a wrapper really")
Expand Down
34 changes: 15 additions & 19 deletions synapse/api/auth.py
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ def check_joined_room(self, room_id, user_id, current_state=None):
)

self._check_joined_room(member, user_id, room_id)
defer.returnValue(member)
return member

@defer.inlineCallbacks
def check_user_was_in_room(self, room_id, user_id):
Expand Down Expand Up @@ -156,13 +156,13 @@ def check_user_was_in_room(self, room_id, user_id):
if forgot:
raise AuthError(403, "User %s not in room %s" % (user_id, room_id))

defer.returnValue(member)
return member

@defer.inlineCallbacks
def check_host_in_room(self, room_id, host):
with Measure(self.clock, "check_host_in_room"):
latest_event_ids = yield self.store.is_host_joined(room_id, host)
defer.returnValue(latest_event_ids)
return latest_event_ids

def _check_joined_room(self, member, user_id, room_id):
if not member or member.membership != Membership.JOIN:
Expand Down Expand Up @@ -220,9 +220,7 @@ def get_user_by_req(
device_id="dummy-device", # stubbed
)

defer.returnValue(
synapse.types.create_requester(user_id, app_service=app_service)
)
return synapse.types.create_requester(user_id, app_service=app_service)

user_info = yield self.get_user_by_access_token(access_token, rights)
user = user_info["user"]
Expand Down Expand Up @@ -263,10 +261,8 @@ def get_user_by_req(

request.authenticated_entity = user.to_string()

defer.returnValue(
synapse.types.create_requester(
user, token_id, is_guest, device_id, app_service=app_service
)
return synapse.types.create_requester(
user, token_id, is_guest, device_id, app_service=app_service
)
except KeyError:
raise MissingClientTokenError()
Expand Down Expand Up @@ -335,7 +331,7 @@ def get_user_by_access_token(self, token, rights="access"):
msg="Access token has expired", soft_logout=True
)

defer.returnValue(r)
return r

# otherwise it needs to be a valid macaroon
try:
Expand Down Expand Up @@ -383,7 +379,7 @@ def get_user_by_access_token(self, token, rights="access"):
}
else:
raise RuntimeError("Unknown rights setting %s", rights)
defer.returnValue(ret)
return ret
except (
_InvalidMacaroonException,
pymacaroons.exceptions.MacaroonException,
Expand Down Expand Up @@ -511,7 +507,7 @@ def _verify_expiry(self, caveat):
def _look_up_user_by_access_token(self, token):
ret = yield self.store.get_user_by_access_token(token)
if not ret:
defer.returnValue(None)
return None

# we use ret.get() below because *lots* of unit tests stub out
# get_user_by_access_token in a way where it only returns a couple of
Expand All @@ -523,7 +519,7 @@ def _look_up_user_by_access_token(self, token):
"device_id": ret.get("device_id"),
"valid_until_ms": ret.get("valid_until_ms"),
}
defer.returnValue(user_info)
return user_info

def get_appservice_by_req(self, request):
token = self.get_access_token_from_request(request)
Expand All @@ -548,7 +544,7 @@ def is_server_admin(self, user):
@defer.inlineCallbacks
def compute_auth_events(self, event, current_state_ids, for_verification=False):
if event.type == EventTypes.Create:
defer.returnValue([])
return []

auth_ids = []

Expand Down Expand Up @@ -609,7 +605,7 @@ def compute_auth_events(self, event, current_state_ids, for_verification=False):
if member_event.content["membership"] == Membership.JOIN:
auth_ids.append(member_event.event_id)

defer.returnValue(auth_ids)
return auth_ids

@defer.inlineCallbacks
def check_can_change_room_list(self, room_id, user):
Expand All @@ -623,7 +619,7 @@ def check_can_change_room_list(self, room_id, user):

is_admin = yield self.is_server_admin(user)
if is_admin:
defer.returnValue(True)
return True

user_id = user.to_string()
yield self.check_joined_room(room_id, user_id)
Expand Down Expand Up @@ -717,7 +713,7 @@ def check_in_room_or_world_readable(self, room_id, user_id):
# * The user is a guest user, and has joined the room
# else it will throw.
member_event = yield self.check_user_was_in_room(room_id, user_id)
defer.returnValue((member_event.membership, member_event.event_id))
return (member_event.membership, member_event.event_id)
except AuthError:
visibility = yield self.state.get_current_state(
room_id, EventTypes.RoomHistoryVisibility, ""
Expand All @@ -726,7 +722,7 @@ def check_in_room_or_world_readable(self, room_id, user_id):
visibility
and visibility.content["history_visibility"] == "world_readable"
):
defer.returnValue((Membership.JOIN, None))
return (Membership.JOIN, None)
return
raise AuthError(
403, "Guest access not allowed", errcode=Codes.GUEST_ACCESS_FORBIDDEN
Expand Down
2 changes: 1 addition & 1 deletion synapse/api/filtering.py
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ def __init__(self, hs):
@defer.inlineCallbacks
def get_user_filter(self, user_localpart, filter_id):
result = yield self.store.get_user_filter(user_localpart, filter_id)
defer.returnValue(FilterCollection(result))
return FilterCollection(result)

def add_user_filter(self, user_localpart, user_filter):
self.check_valid_filter(user_filter)
Expand Down
8 changes: 4 additions & 4 deletions synapse/app/frontend_proxy.py
Original file line number Diff line number Diff line change
Expand Up @@ -70,12 +70,12 @@ def on_GET(self, request, user_id):
except HttpResponseException as e:
raise e.to_synapse_error()

defer.returnValue((200, result))
return (200, result)

@defer.inlineCallbacks
def on_PUT(self, request, user_id):
yield self.auth.get_user_by_req(request)
defer.returnValue((200, {}))
return (200, {})


class KeyUploadServlet(RestServlet):
Expand Down Expand Up @@ -126,11 +126,11 @@ def on_POST(self, request, device_id):
self.main_uri + request.uri.decode("ascii"), body, headers=headers
)

defer.returnValue((200, result))
return (200, result)
else:
# Just interested in counts.
result = yield self.store.count_e2e_one_time_keys(user_id, device_id)
defer.returnValue((200, {"one_time_key_counts": result}))
return (200, {"one_time_key_counts": result})


class FrontendProxySlavedStore(
Expand Down
2 changes: 1 addition & 1 deletion synapse/app/homeserver.py
100755 → 100644
Original file line number Diff line number Diff line change
Expand Up @@ -406,7 +406,7 @@ def do_acme():
if provision:
yield acme.provision_certificate()

defer.returnValue(provision)
return provision

@defer.inlineCallbacks
def reprovision_acme():
Expand Down
28 changes: 14 additions & 14 deletions synapse/appservice/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -175,21 +175,21 @@ def _is_exclusive(self, ns_key, test_string):
@defer.inlineCallbacks
def _matches_user(self, event, store):
if not event:
defer.returnValue(False)
return False

if self.is_interested_in_user(event.sender):
defer.returnValue(True)
return True
# also check m.room.member state key
if event.type == EventTypes.Member and self.is_interested_in_user(
event.state_key
):
defer.returnValue(True)
return True

if not store:
defer.returnValue(False)
return False

does_match = yield self._matches_user_in_member_list(event.room_id, store)
defer.returnValue(does_match)
return does_match

@cachedInlineCallbacks(num_args=1, cache_context=True)
def _matches_user_in_member_list(self, room_id, store, cache_context):
Expand All @@ -200,8 +200,8 @@ def _matches_user_in_member_list(self, room_id, store, cache_context):
# check joined member events
for user_id in member_list:
if self.is_interested_in_user(user_id):
defer.returnValue(True)
defer.returnValue(False)
return True
return False

def _matches_room_id(self, event):
if hasattr(event, "room_id"):
Expand All @@ -211,13 +211,13 @@ def _matches_room_id(self, event):
@defer.inlineCallbacks
def _matches_aliases(self, event, store):
if not store or not event:
defer.returnValue(False)
return False

alias_list = yield store.get_aliases_for_room(event.room_id)
for alias in alias_list:
if self.is_interested_in_alias(alias):
defer.returnValue(True)
defer.returnValue(False)
return True
return False

@defer.inlineCallbacks
def is_interested(self, event, store=None):
Expand All @@ -231,15 +231,15 @@ def is_interested(self, event, store=None):
"""
# Do cheap checks first
if self._matches_room_id(event):
defer.returnValue(True)
return True

if (yield self._matches_aliases(event, store)):
defer.returnValue(True)
return True

if (yield self._matches_user(event, store)):
defer.returnValue(True)
return True

defer.returnValue(False)
return False

def is_interested_in_user(self, user_id):
return (
Expand Down
38 changes: 19 additions & 19 deletions synapse/appservice/api.py
Original file line number Diff line number Diff line change
Expand Up @@ -97,40 +97,40 @@ def __init__(self, hs):
@defer.inlineCallbacks
def query_user(self, service, user_id):
if service.url is None:
defer.returnValue(False)
return False
uri = service.url + ("/users/%s" % urllib.parse.quote(user_id))
response = None
try:
response = yield self.get_json(uri, {"access_token": service.hs_token})
if response is not None: # just an empty json object
defer.returnValue(True)
return True
except CodeMessageException as e:
if e.code == 404:
defer.returnValue(False)
return False
return
logger.warning("query_user to %s received %s", uri, e.code)
except Exception as ex:
logger.warning("query_user to %s threw exception %s", uri, ex)
defer.returnValue(False)
return False

@defer.inlineCallbacks
def query_alias(self, service, alias):
if service.url is None:
defer.returnValue(False)
return False
uri = service.url + ("/rooms/%s" % urllib.parse.quote(alias))
response = None
try:
response = yield self.get_json(uri, {"access_token": service.hs_token})
if response is not None: # just an empty json object
defer.returnValue(True)
return True
except CodeMessageException as e:
logger.warning("query_alias to %s received %s", uri, e.code)
if e.code == 404:
defer.returnValue(False)
return False
return
except Exception as ex:
logger.warning("query_alias to %s threw exception %s", uri, ex)
defer.returnValue(False)
return False

@defer.inlineCallbacks
def query_3pe(self, service, kind, protocol, fields):
Expand All @@ -141,7 +141,7 @@ def query_3pe(self, service, kind, protocol, fields):
else:
raise ValueError("Unrecognised 'kind' argument %r to query_3pe()", kind)
if service.url is None:
defer.returnValue([])
return []

uri = "%s%s/thirdparty/%s/%s" % (
service.url,
Expand All @@ -155,7 +155,7 @@ def query_3pe(self, service, kind, protocol, fields):
logger.warning(
"query_3pe to %s returned an invalid response %r", uri, response
)
defer.returnValue([])
return []

ret = []
for r in response:
Expand All @@ -166,14 +166,14 @@ def query_3pe(self, service, kind, protocol, fields):
"query_3pe to %s returned an invalid result %r", uri, r
)

defer.returnValue(ret)
return ret
except Exception as ex:
logger.warning("query_3pe to %s threw exception %s", uri, ex)
defer.returnValue([])
return []

def get_3pe_protocol(self, service, protocol):
if service.url is None:
defer.returnValue({})
return {}

@defer.inlineCallbacks
def _get():
Expand All @@ -189,7 +189,7 @@ def _get():
logger.warning(
"query_3pe_protocol to %s did not return a" " valid result", uri
)
defer.returnValue(None)
return None

for instance in info.get("instances", []):
network_id = instance.get("network_id", None)
Expand All @@ -198,18 +198,18 @@ def _get():
service.id, network_id
).to_string()

defer.returnValue(info)
return info
except Exception as ex:
logger.warning("query_3pe_protocol to %s threw exception %s", uri, ex)
defer.returnValue(None)
return None

key = (service.id, protocol)
return self.protocol_meta_cache.wrap(key, _get)

@defer.inlineCallbacks
def push_bulk(self, service, events, txn_id=None):
if service.url is None:
defer.returnValue(True)
return True

events = self._serialize(events)

Expand All @@ -229,14 +229,14 @@ def push_bulk(self, service, events, txn_id=None):
)
sent_transactions_counter.labels(service.id).inc()
sent_events_counter.labels(service.id).inc(len(events))
defer.returnValue(True)
return True
return
except CodeMessageException as e:
logger.warning("push_bulk to %s received %s", uri, e.code)
except Exception as ex:
logger.warning("push_bulk to %s threw exception %s", uri, ex)
failed_transactions_counter.labels(service.id).inc()
defer.returnValue(False)
return False

def _serialize(self, events):
time_now = self.clock.time_msec()
Expand Down
Loading

0 comments on commit f590f77

Please sign in to comment.