From 2df393b15150c191835d803567e30e35fccee28a Mon Sep 17 00:00:00 2001 From: Tore Brede <Tore.Brede@uib.no> Date: Mon, 22 Nov 2021 11:31:19 +0100 Subject: [PATCH] GREG-113: Fixing linting and formatting errors --- gregui/api/serializers/guest.py | 12 +++-- gregui/api/views/invitation.py | 16 +++---- gregui/tests/api/views/test_invitation.py | 56 ++++++++++++----------- 3 files changed, 46 insertions(+), 38 deletions(-) diff --git a/gregui/api/serializers/guest.py b/gregui/api/serializers/guest.py index 866dd829..6d93031f 100644 --- a/gregui/api/serializers/guest.py +++ b/gregui/api/serializers/guest.py @@ -5,7 +5,7 @@ from rest_framework import serializers from greg.models import Identity, Person from gregui.validation import ( validate_phone_number, - validate_norwegian_national_id_number + validate_norwegian_national_id_number, ) @@ -65,7 +65,11 @@ class GuestRegisterSerializer(serializers.ModelSerializer): today = datetime.date.today() # Check that the date of birth is between the interval starting about 100 years ago and last year - if not (today - datetime.timedelta(weeks=100 * 52) < value < today - datetime.timedelta(weeks=52)): + if ( + not today - datetime.timedelta(weeks=100 * 52) + < value + < today - datetime.timedelta(weeks=52) + ): raise serializers.ValidationError("Invalid date of birth") class Meta: @@ -78,13 +82,13 @@ class GuestRegisterSerializer(serializers.ModelSerializer): "mobile_phone", "fnr", "passport", - "date_of_birth" + "date_of_birth", ) read_only_fields = ("id",) def create_identity_or_update( - identity_type: Identity.IdentityType, value: str, person: Person + identity_type: Identity.IdentityType, value: str, person: Person ): existing_identity = person.identities.filter(type=identity_type).first() if not existing_identity: diff --git a/gregui/api/views/invitation.py b/gregui/api/views/invitation.py index 7082894f..7072b940 100644 --- a/gregui/api/views/invitation.py +++ b/gregui/api/views/invitation.py @@ -72,8 +72,8 @@ class InvitationView(CreateAPIView, DestroyAPIView): person = serializer.save() for invitationlink in InvitationLink.objects.filter( - invitation__role__person_id=person.id, - invitation__role__sponsor_id=sponsor_user.sponsor_id, + invitation__role__person_id=person.id, + invitation__role__sponsor_id=sponsor_user.sponsor_id, ): send_invite_mail(invitationlink) @@ -150,7 +150,7 @@ class InvitedGuestView(GenericAPIView): "fnr", "mobile_phone", "passport", - "date_of_birth" + "date_of_birth", ] fields_allowed_to_update_if_feide = ["mobile_phone"] @@ -243,10 +243,10 @@ class InvitedGuestView(GenericAPIView): # If there is a Feide ID registered with the guest, assume that the name is also coming from there feide_id = self._get_identity_or_none(person, Identity.IdentityType.FEIDE_ID) if not self._only_allowed_fields_in_request( - data, - self.fields_allowed_to_update_if_invite - if feide_id is None - else self.fields_allowed_to_update_if_feide, + data, + self.fields_allowed_to_update_if_invite + if feide_id is None + else self.fields_allowed_to_update_if_feide, ): return Response(status=status.HTTP_400_BAD_REQUEST) @@ -296,7 +296,7 @@ class InvitedGuestView(GenericAPIView): @staticmethod def _get_identity_or_none( - person: Person, identity_type: Identity.IdentityType + person: Person, identity_type: Identity.IdentityType ) -> Optional[str]: try: return person.identities.get(type=identity_type).value diff --git a/gregui/tests/api/views/test_invitation.py b/gregui/tests/api/views/test_invitation.py index 3bf201aa..42d6706a 100644 --- a/gregui/tests/api/views/test_invitation.py +++ b/gregui/tests/api/views/test_invitation.py @@ -56,7 +56,7 @@ def test_get_invited_info_no_session(client, invitation_link): @pytest.mark.django_db def test_get_invited_info_session_okay( - client, invited_person, sponsor_foo_data, role_type_foo, unit_foo + client, invited_person, sponsor_foo_data, role_type_foo, unit_foo ): person, invitation_link = invited_person # get a session @@ -91,7 +91,7 @@ def test_get_invited_info_session_okay( @pytest.mark.django_db def test_get_invited_info_expired_link( - client, invitation_link, invitation_expired_date + client, invitation_link, invitation_expired_date ): # Get a session while link is valid client.get(reverse("gregui-v1:invite-verify"), data={"uuid": invitation_link.uuid}) @@ -134,7 +134,7 @@ def test_invited_guest_can_post_information(client: APIClient, invited_person): @pytest.mark.django_db def test_post_invited_info_expired_session( - client, invitation_link, invitation_expired_date + client, invitation_link, invitation_expired_date ): # get a session client.post(reverse("gregui-v1:invite-verify"), data={"uuid": invitation_link.uuid}) @@ -246,10 +246,10 @@ def test_register_passport(client, invited_person): session.save() assert ( - Identity.objects.filter( - person__id=person.id, type=Identity.IdentityType.PASSPORT_NUMBER - ).count() - == 0 + Identity.objects.filter( + person__id=person.id, type=Identity.IdentityType.PASSPORT_NUMBER + ).count() + == 0 ) response = client.post(url, data, format="json") @@ -266,15 +266,15 @@ def test_register_passport(client, invited_person): @pytest.mark.django_db def test_name_update_not_allowed_if_feide_identity_is_present( - client: APIClient, - person_foo, - sponsor_foo, - unit_foo, - role_type_foo, - create_role, - create_invitation, - create_invitation_link, - invitation_valid_date, + client: APIClient, + person_foo, + sponsor_foo, + unit_foo, + role_type_foo, + create_role, + create_invitation, + create_invitation_link, + invitation_valid_date, ): # This person has a Feide ID, so the name is assumed to come from there as well # and the guest should not be allowed to update it @@ -310,15 +310,15 @@ def test_name_update_not_allowed_if_feide_identity_is_present( @pytest.mark.django_db def test_name_update_allowed_if_feide_identity_is_not_present( - client: APIClient, - create_person, - sponsor_foo, - unit_foo, - role_type_foo, - create_role, - create_invitation, - create_invitation_link, - invitation_valid_date, + client: APIClient, + create_person, + sponsor_foo, + unit_foo, + role_type_foo, + create_role, + create_invitation, + create_invitation_link, + invitation_valid_date, ): # This person does not have a Feide ID, so he will be viewed as someone whose name was entered manually # by the sponsor, and in it that case the guest can update it @@ -408,7 +408,11 @@ def test_date_of_birth_stored(client, invited_person_verified_nin): assert response.status_code == status.HTTP_200_OK person = Person.objects.get() - assert person.date_of_birth == datetime.datetime.strptime(date_of_birth, "%Y-%m-%d").date() + assert ( + person.date_of_birth + == datetime.datetime.strptime(date_of_birth, "%Y-%m-%d").date() + ) + @pytest.mark.django_db def test_invalid_date_of_birth_rejected(client, invited_person_verified_nin): -- GitLab