mirror of
https://github.com/django/django.git
synced 2025-10-31 09:41:08 +00:00
Refs #33476 -- Refactored code to strictly match 88 characters line length.
This commit is contained in:
@@ -89,7 +89,10 @@ class UserModelChecksTests(SimpleTestCase):
|
||||
checks.Warning(
|
||||
"'CustomUserNonUniqueUsername.username' is named as "
|
||||
"the 'USERNAME_FIELD', but it is not unique.",
|
||||
hint="Ensure that your authentication backend(s) can handle non-unique usernames.",
|
||||
hint=(
|
||||
"Ensure that your authentication backend(s) can handle "
|
||||
"non-unique usernames."
|
||||
),
|
||||
obj=CustomUserNonUniqueUsername,
|
||||
id="auth.W004",
|
||||
),
|
||||
@@ -264,8 +267,9 @@ class ModelsPermissionsChecksTests(SimpleTestCase):
|
||||
errors,
|
||||
[
|
||||
checks.Error(
|
||||
"The verbose_name of model 'auth_tests.Checked' must be at most 244 "
|
||||
"characters for its builtin permission names to be at most 255 characters.",
|
||||
"The verbose_name of model 'auth_tests.Checked' must be at most "
|
||||
"244 characters for its builtin permission names to be at most 255 "
|
||||
"characters.",
|
||||
obj=Checked,
|
||||
id="auth.E007",
|
||||
),
|
||||
|
||||
@@ -174,10 +174,15 @@ class UserCreationFormTest(TestDataMixin, TestCase):
|
||||
@override_settings(
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.MinimumLengthValidator",
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation.MinimumLengthValidator"
|
||||
),
|
||||
"OPTIONS": {
|
||||
"min_length": 12,
|
||||
},
|
||||
@@ -259,7 +264,10 @@ class UserCreationFormTest(TestDataMixin, TestCase):
|
||||
@override_settings(
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
]
|
||||
)
|
||||
@@ -267,13 +275,18 @@ class UserCreationFormTest(TestDataMixin, TestCase):
|
||||
form = UserCreationForm()
|
||||
self.assertEqual(
|
||||
form.fields["password1"].help_text,
|
||||
"<ul><li>Your password can’t be too similar to your other personal information.</li></ul>",
|
||||
"<ul><li>"
|
||||
"Your password can’t be too similar to your other personal information."
|
||||
"</li></ul>",
|
||||
)
|
||||
|
||||
@override_settings(
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
]
|
||||
)
|
||||
@@ -610,10 +623,15 @@ class SetPasswordFormTest(TestDataMixin, TestCase):
|
||||
@override_settings(
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.MinimumLengthValidator",
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation.MinimumLengthValidator"
|
||||
),
|
||||
"OPTIONS": {
|
||||
"min_length": 12,
|
||||
},
|
||||
@@ -651,10 +669,15 @@ class SetPasswordFormTest(TestDataMixin, TestCase):
|
||||
@override_settings(
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.MinimumLengthValidator",
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation.MinimumLengthValidator"
|
||||
),
|
||||
"OPTIONS": {
|
||||
"min_length": 12,
|
||||
},
|
||||
@@ -663,7 +686,8 @@ class SetPasswordFormTest(TestDataMixin, TestCase):
|
||||
)
|
||||
def test_help_text_translation(self):
|
||||
french_help_texts = [
|
||||
"Votre mot de passe ne peut pas trop ressembler à vos autres informations personnelles.",
|
||||
"Votre mot de passe ne peut pas trop ressembler à vos autres informations "
|
||||
"personnelles.",
|
||||
"Votre mot de passe doit contenir au minimum 12 caractères.",
|
||||
]
|
||||
form = SetPasswordForm(self.u1)
|
||||
@@ -1129,7 +1153,10 @@ class ReadOnlyPasswordHashTest(SimpleTestCase):
|
||||
)
|
||||
def test_render(self):
|
||||
widget = ReadOnlyPasswordHashWidget()
|
||||
value = "pbkdf2_sha256$100000$a6Pucb1qSFcD$WmCkn9Hqidj48NVe5x0FEM6A9YiOqQcl/83m2Z5udm0="
|
||||
value = (
|
||||
"pbkdf2_sha256$100000$a6Pucb1qSFcD$WmCkn9Hqidj48NVe5x0FEM6A9YiOqQcl/83m2Z5u"
|
||||
"dm0="
|
||||
)
|
||||
self.assertHTMLEqual(
|
||||
widget.render("name", value, {"id": "id_password"}),
|
||||
"""
|
||||
|
||||
@@ -390,7 +390,8 @@ class TestUtilsHashPass(SimpleTestCase):
|
||||
encoded = hasher.encode("lètmein", "seasalt2")
|
||||
self.assertEqual(
|
||||
encoded,
|
||||
"pbkdf2_sha256$390000$seasalt2$geC/uZ92nRXDSjSxeoiBqYyRcrLzMm8xK3ro1QS1uo8=",
|
||||
"pbkdf2_sha256$390000$seasalt2$geC/uZ92nRXDSjSxeoiBqYyRcrLzMm8xK3r"
|
||||
"o1QS1uo8=",
|
||||
)
|
||||
self.assertTrue(hasher.verify("lètmein", encoded))
|
||||
|
||||
|
||||
@@ -202,7 +202,8 @@ class ChangepasswordManagementCommandTestCase(TestCase):
|
||||
|
||||
self.assertEqual(
|
||||
command_output,
|
||||
"Changing password for user 'joe'\nPassword changed successfully for user 'joe'",
|
||||
"Changing password for user 'joe'\n"
|
||||
"Password changed successfully for user 'joe'",
|
||||
)
|
||||
self.assertTrue(User.objects.get(username="joe").check_password("not qwerty"))
|
||||
|
||||
@@ -267,7 +268,8 @@ class MultiDBChangepasswordManagementCommandTestCase(TestCase):
|
||||
|
||||
self.assertEqual(
|
||||
command_output,
|
||||
"Changing password for user 'joe'\nPassword changed successfully for user 'joe'",
|
||||
"Changing password for user 'joe'\n"
|
||||
"Password changed successfully for user 'joe'",
|
||||
)
|
||||
self.assertTrue(
|
||||
User.objects.using("other").get(username="joe").check_password("not qwerty")
|
||||
@@ -785,7 +787,10 @@ class CreatesuperuserManagementCommandTestCase(TestCase):
|
||||
@override_settings(
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
]
|
||||
)
|
||||
@@ -830,7 +835,10 @@ class CreatesuperuserManagementCommandTestCase(TestCase):
|
||||
AUTH_USER_MODEL="auth_tests.CustomUser",
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
],
|
||||
)
|
||||
@@ -877,7 +885,10 @@ class CreatesuperuserManagementCommandTestCase(TestCase):
|
||||
AUTH_USER_MODEL="auth_tests.CustomUser",
|
||||
AUTH_PASSWORD_VALIDATORS=[
|
||||
{
|
||||
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator"
|
||||
"NAME": (
|
||||
"django.contrib.auth.password_validation."
|
||||
"UserAttributeSimilarityValidator"
|
||||
)
|
||||
},
|
||||
],
|
||||
)
|
||||
@@ -1094,7 +1105,10 @@ class CreatesuperuserManagementCommandTestCase(TestCase):
|
||||
stdout=new_io,
|
||||
stderr=new_io,
|
||||
)
|
||||
msg = "Error: That username is already taken.\nSuperuser created successfully."
|
||||
msg = (
|
||||
"Error: That username is already taken.\n"
|
||||
"Superuser created successfully."
|
||||
)
|
||||
self.assertEqual(new_io.getvalue().strip(), msg)
|
||||
|
||||
test(self)
|
||||
|
||||
@@ -172,7 +172,10 @@ class PasswordResetTest(AuthViewsTestCase):
|
||||
self.assertIn("<html>", message.get_payload(1).get_payload())
|
||||
|
||||
def test_email_found_custom_from(self):
|
||||
"Email is sent if a valid email address is provided for password reset when a custom from_email is provided."
|
||||
"""
|
||||
Email is sent if a valid email address is provided for password reset
|
||||
when a custom from_email is provided.
|
||||
"""
|
||||
response = self.client.post(
|
||||
"/password_reset_from_email/", {"email": "staffmember@example.com"}
|
||||
)
|
||||
|
||||
@@ -148,7 +148,9 @@ urlpatterns = auth_urlpatterns + [
|
||||
"reset/post_reset_login_custom_backend/<uidb64>/<token>/",
|
||||
views.PasswordResetConfirmView.as_view(
|
||||
post_reset_login=True,
|
||||
post_reset_login_backend="django.contrib.auth.backends.AllowAllUsersModelBackend",
|
||||
post_reset_login_backend=(
|
||||
"django.contrib.auth.backends.AllowAllUsersModelBackend"
|
||||
),
|
||||
),
|
||||
),
|
||||
path("reset/missing_parameters/", views.PasswordResetConfirmView.as_view()),
|
||||
|
||||
Reference in New Issue
Block a user