Skip to content

Commit ca19512

Browse files
committed
Format updates
1 parent 1c6e9f6 commit ca19512

File tree

1 file changed

+56
-36
lines changed

1 file changed

+56
-36
lines changed

tests/test_access_mixins.py

Lines changed: 56 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,12 @@
1212

1313
from django.urls import reverse_lazy
1414

15-
from .factories import GroupFactory, UserFactory, UserObjectPermissionsFactory, ArticleFactory
15+
from .factories import (
16+
GroupFactory,
17+
UserFactory,
18+
UserObjectPermissionsFactory,
19+
ArticleFactory,
20+
)
1621
from .helpers import TestViewHelper
1722
from .views import (
1823
PermissionRequiredView,
@@ -68,9 +73,7 @@ def test_redirects_to_login(self):
6873
user = self.build_unauthorized_user()
6974
self.client.login(username=user.username, password="asdf1234")
7075
resp = self.client.get(self.view_url)
71-
self.assertRedirects(
72-
resp, "/accounts/login/?next={0}".format(self.view_url)
73-
)
76+
self.assertRedirects(resp, "/accounts/login/?next={0}".format(self.view_url))
7477

7578
def test_raise_permission_denied(self):
7679
"""
@@ -159,15 +162,11 @@ def test_custom_login_url(self):
159162
user = self.build_unauthorized_user()
160163
req = self.build_request(user=user, path=self.view_url)
161164
resp = self.dispatch_view(req, login_url="/login/")
162-
self.assertEqual(
163-
"/login/?next={0}".format(self.view_url), resp["Location"]
164-
)
165+
self.assertEqual("/login/?next={0}".format(self.view_url), resp["Location"])
165166

166167
# Test with reverse_lazy
167168
resp = self.dispatch_view(req, login_url=reverse_lazy("headline"))
168-
self.assertEqual(
169-
"/headline/?next={0}".format(self.view_url), resp["Location"]
170-
)
169+
self.assertEqual("/headline/?next={0}".format(self.view_url), resp["Location"])
171170

172171
def test_custom_redirect_field_name(self):
173172
"""
@@ -186,9 +185,7 @@ def test_get_login_url_raises_exception(self):
186185
ImproperlyConfigured.
187186
"""
188187
with self.assertRaises(ImproperlyConfigured):
189-
self.dispatch_view(
190-
self.build_request(path=self.view_url), login_url=None
191-
)
188+
self.dispatch_view(self.build_request(path=self.view_url), login_url=None)
192189

193190
def test_get_redirect_field_name_raises_exception(self):
194191
"""
@@ -210,9 +207,7 @@ def test_overridden_login_url(self):
210207
user = self.build_unauthorized_user()
211208
self.client.login(username=user.username, password="asdf1234")
212209
resp = self.client.get(self.view_url)
213-
self.assertRedirects(
214-
resp, "/auth/login/?next={0}".format(self.view_url)
215-
)
210+
self.assertRedirects(resp, "/auth/login/?next={0}".format(self.view_url))
216211

217212
def test_redirect_unauthenticated(self):
218213
resp = self.dispatch_view(
@@ -221,9 +216,7 @@ def test_redirect_unauthenticated(self):
221216
redirect_unauthenticated_users=True,
222217
)
223218
assert resp.status_code == 302
224-
assert resp["Location"] == "/accounts/login/?next={0}".format(
225-
self.view_url
226-
)
219+
assert resp["Location"] == "/accounts/login/?next={0}".format(self.view_url)
227220

228221
def test_redirect_unauthenticated_false(self):
229222
with self.assertRaises(PermissionDenied):
@@ -437,7 +430,7 @@ def test_object_level_permissions(self):
437430
valid_req,
438431
permission_required=permissions,
439432
object_level_permissions=True,
440-
raise_exception=True
433+
raise_exception=True,
441434
)
442435
invalid_req_1 = self.build_request(path=self.view_url, user=invalid_user_1)
443436
invalid_req_2 = self.build_request(path=self.view_url, user=invalid_user_2)
@@ -448,22 +441,21 @@ def test_object_level_permissions(self):
448441
invalid_req_1,
449442
permission_required=permissions,
450443
object_level_permissions=True,
451-
raise_exception=True
444+
raise_exception=True,
452445
)
453446
with self.assertRaises(PermissionDenied):
454447
self.dispatch_view(
455448
invalid_req_2,
456449
permission_required=permissions,
457450
object_level_permissions=True,
458-
raise_exception=True
451+
raise_exception=True,
459452
)
460453

461454

462455
@pytest.mark.django_db
463-
class TestMultiplePermissionsRequiredMixin(
464-
_TestAccessBasicsMixin, test.TestCase
465-
):
456+
class TestMultiplePermissionsRequiredMixin(_TestAccessBasicsMixin, test.TestCase):
466457
"""Scenarios around requiring multiple permissions"""
458+
467459
view_class = MultiplePermissionsRequiredView
468460
view_url = "/multiple_permissions_required/"
469461

@@ -593,8 +585,12 @@ def test_all_object_level_permissions_key(self):
593585
permissions = {"all": ["auth.add_user", "tests.add_article"]}
594586
valid_user = UserFactory(permissions=permissions["all"])
595587
invalid_user = UserFactory(permissions=["auth.add_user"])
596-
UserObjectPermissionsFactory(user=valid_user, permission=auth_add_user, article_object=article)
597-
UserObjectPermissionsFactory(user=valid_user, permission=tests_add_article, article_object=article)
588+
UserObjectPermissionsFactory(
589+
user=valid_user, permission=auth_add_user, article_object=article
590+
)
591+
UserObjectPermissionsFactory(
592+
user=valid_user, permission=tests_add_article, article_object=article
593+
)
598594
# Act
599595
valid_req = self.build_request(path=self.view_url, user=valid_user)
600596
valid_resp = self.dispatch_view(
@@ -605,7 +601,10 @@ def test_all_object_level_permissions_key(self):
605601
self.assertEqual(valid_resp.status_code, 200)
606602
with self.assertRaises(PermissionDenied):
607603
self.dispatch_view(
608-
invalid_req, permissions=permissions, object_level_permissions=True, raise_exception=True
604+
invalid_req,
605+
permissions=permissions,
606+
object_level_permissions=True,
607+
raise_exception=True,
609608
)
610609

611610
def test_any_object_level_permissions_key(self):
@@ -623,29 +622,44 @@ def test_any_object_level_permissions_key(self):
623622
user = UserFactory(permissions=[permissions["any"][0]])
624623
user_1 = UserFactory()
625624
user_2 = UserFactory(permissions=permissions["any"])
626-
UserObjectPermissionsFactory(user=user, permission=auth_add_user, article_object=article)
627-
UserObjectPermissionsFactory(user=user, permission=tests_add_article, article_object=article)
625+
UserObjectPermissionsFactory(
626+
user=user, permission=auth_add_user, article_object=article
627+
)
628+
UserObjectPermissionsFactory(
629+
user=user, permission=tests_add_article, article_object=article
630+
)
628631
# Act
629632
valid_req = self.build_request(path=self.view_url, user=user)
630633
valid_resp = self.dispatch_view(
631-
valid_req, permissions=permissions, object_level_permissions=True, raise_exception=True
634+
valid_req,
635+
permissions=permissions,
636+
object_level_permissions=True,
637+
raise_exception=True,
632638
)
633639
invalid_req_1 = self.build_request(path=self.view_url, user=user_1)
634640
invalid_req_2 = self.build_request(path=self.view_url, user=user_2)
635641
# Assert
636642
self.assertEqual(valid_resp.status_code, 200)
637643
with self.assertRaises(PermissionDenied):
638644
self.dispatch_view(
639-
invalid_req_1, permissions=permissions, object_level_permissions=True, raise_exception=True
645+
invalid_req_1,
646+
permissions=permissions,
647+
object_level_permissions=True,
648+
raise_exception=True,
640649
)
641650
with self.assertRaises(PermissionDenied):
642-
self.dispatch_view(invalid_req_2, permissions=permissions, object_level_permissions=True, raise_exception=True)
643-
651+
self.dispatch_view(
652+
invalid_req_2,
653+
permissions=permissions,
654+
object_level_permissions=True,
655+
raise_exception=True,
656+
)
644657

645658

646659
@pytest.mark.django_db
647660
class TestSuperuserRequiredMixin(_TestAccessBasicsMixin, test.TestCase):
648661
"""Scenarios requiring a superuser"""
662+
649663
view_class = SuperuserRequiredView
650664
view_url = "/superuser_required/"
651665

@@ -661,6 +675,7 @@ def build_unauthorized_user(self):
661675
@pytest.mark.django_db
662676
class TestStaffuserRequiredMixin(_TestAccessBasicsMixin, test.TestCase):
663677
"""Scenarios requiring a staff user"""
678+
664679
view_class = StaffuserRequiredView
665680
view_url = "/staffuser_required/"
666681

@@ -763,6 +778,7 @@ def test_with_unicode(self):
763778
@pytest.mark.django_db
764779
class TestUserPassesTestMixin(_TestAccessBasicsMixin, test.TestCase):
765780
"""Scenarios requiring a user to pass a test"""
781+
766782
view_class = UserPassesTestView
767783
view_url = "/user_passes_test/"
768784
view_not_implemented_class = UserPassesTestNotImplementedView
@@ -816,6 +832,7 @@ def test_not_implemented(self):
816832
@pytest.mark.django_db
817833
class TestSSLRequiredMixin(test.TestCase):
818834
"""Scenarios around requiring SSL"""
835+
819836
view_class = SSLRequiredView
820837
view_url = "/sslrequired/"
821838

@@ -852,7 +869,7 @@ def test_https_does_not_redirect(self):
852869

853870
@pytest.mark.django_db
854871
class TestRecentLoginRequiredMixin(test.TestCase):
855-
""" Scenarios requiring a recent login"""
872+
"""Scenarios requiring a recent login"""
856873

857874
view_class = RecentLoginRequiredView
858875
recent_view_url = "/recent_login/"
@@ -877,7 +894,10 @@ def test_outdated_login(self):
877894
user = UserFactory(last_login=last_login)
878895
self.client.login(username=user.username, password="asdf1234")
879896
resp = self.client.get(self.outdated_view_url)
880-
assert resp.status_code in [302, 405] # 302 is for Django < 5, while 405 is for Django >= 5
897+
assert resp.status_code in [
898+
302,
899+
405,
900+
] # 302 is for Django < 5, while 405 is for Django >= 5
881901

882902
def test_not_logged_in(self):
883903
"""Anonymous requests should be handled appropriately"""

0 commit comments

Comments
 (0)