Skip to content

Commit 333d604

Browse files
[Fixes #12713] fix black and flake8
1 parent e981421 commit 333d604

File tree

6 files changed

+58
-19
lines changed

6 files changed

+58
-19
lines changed

geonode/base/api/tests.py

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2374,7 +2374,14 @@ def test_resource_service_copy_with_perms_dataset_set_default_perms(self):
23742374
}
23752375
resource.set_permissions(_perms)
23762376
# checking that bobby is in the original dataset perms list
2377-
self.assertTrue("bobby" in "bobby" in [x.username for x in permissions_registry.get_perms(instance=_resource, include_virtual=True).get("users", [])])
2377+
self.assertTrue(
2378+
"bobby"
2379+
in "bobby"
2380+
in [
2381+
x.username
2382+
for x in permissions_registry.get_perms(instance=resource, include_virtual=True).get("users", [])
2383+
]
2384+
)
23782385
# copying the resource, should remove the perms for bobby
23792386
# only the default perms should be available
23802387
copy_url = reverse("importer_resource_copy", kwargs={"pk": resource.pk})
@@ -2389,8 +2396,20 @@ def test_resource_service_copy_with_perms_dataset_set_default_perms(self):
23892396
self.assertEqual("finished", self.client.get(response.json().get("status_url")).json().get("status"))
23902397
_resource = Dataset.objects.filter(title__icontains="test_copy_with_perms").last()
23912398
self.assertIsNotNone(_resource)
2392-
self.assertNotIn("bobby", [x.username for x in permissions_registry.get_perms(instance=_resource, include_virtual=True).get("users", [])])
2393-
self.assertIn("admin", [x.username for x in permissions_registry.get_perms(instance=_resource, include_virtual=True).get("users", [])])
2399+
self.assertNotIn(
2400+
"bobby",
2401+
[
2402+
x.username
2403+
for x in permissions_registry.get_perms(instance=_resource, include_virtual=True).get("users", [])
2404+
],
2405+
)
2406+
self.assertIn(
2407+
"admin",
2408+
[
2409+
x.username
2410+
for x in permissions_registry.get_perms(instance=_resource, include_virtual=True).get("users", [])
2411+
],
2412+
)
23942413

23952414
def test_resource_service_copy_with_perms_doc(self):
23962415
files = os.path.join(gisdata.GOOD_DATA, "vector/single_point.shp")
@@ -3427,7 +3446,7 @@ def test_simple_resourcebase_can_be_created_by_resourcemanager(self):
34273446
},
34283447
"groups": {anonymous_group: set(["view_resourcebase"])},
34293448
}
3430-
3449+
34313450
actual_perms = permissions_registry.get_perms(instance=resource, include_virtual=True).copy()
34323451
self.assertIsNotNone(actual_perms)
34333452
self.assertTrue(self.user in actual_perms["users"].keys())

geonode/documents/tests.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -402,7 +402,7 @@ def test_set_document_permissions(self):
402402
self.assertFalse(self.anonymous_user.has_perm("view_resourcebase", document.get_self_resource()))
403403

404404
# Test that previous permissions for users other than ones specified in
405-
# the perm_spec (and the document owner) were
405+
# the perm_spec (and the document owner) were
406406
current_perms = permissions_registry.get_perms(instance=document, include_virtual=True)
407407
self.assertEqual(len(current_perms["users"]), 1)
408408

geonode/layers/utils.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -358,7 +358,9 @@ def set_datasets_permissions(
358358
# for the selected resource
359359
resource = resource.first()
360360
# getting the actual permissions available for the dataset
361-
original_perms = PermSpec(permissions_registry.get_perms(instance=resource, include_virtual=False), resource)
361+
original_perms = PermSpec(
362+
permissions_registry.get_perms(instance=resource, include_virtual=False), resource
363+
)
362364
new_perms_payload = {"organizations": [], "users": [], "groups": []}
363365
# if the username is specified, we add them to the payload with the compact
364366
# perm value

geonode/security/registry.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ def get_perms(self, instance, user=None, include_virtual=True, *args, **kwargs):
7171

7272
for handler in self.REGISTRY:
7373
payload = handler.get_perms(instance, payload, user, include_virtual=include_virtual, *args, **kwargs)
74-
74+
7575
if user:
7676
return payload["users"][user]
7777
return payload

geonode/security/tests.py

Lines changed: 27 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2313,7 +2313,10 @@ def test_if_anonymoys_default_perms_is_false_should_not_assign_perms_to_user_gro
23132313
"""
23142314

23152315
resource = resource_manager.create(str(uuid.uuid4), Dataset, defaults={"owner": self.group_member})
2316-
self.assertFalse(self.group_profile.group in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys())
2316+
self.assertFalse(
2317+
self.group_profile.group
2318+
in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys()
2319+
)
23172320

23182321
@override_settings(DEFAULT_ANONYMOUS_DOWNLOAD_PERMISSION=False)
23192322
def test_if_anonymoys_default_download_perms_is_false_should_not_assign_perms_to_user_group(self):
@@ -2322,7 +2325,10 @@ def test_if_anonymoys_default_download_perms_is_false_should_not_assign_perms_to
23222325
"""
23232326

23242327
resource = resource_manager.create(str(uuid.uuid4), Dataset, defaults={"owner": self.group_member})
2325-
self.assertFalse(self.group_profile.group in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys())
2328+
self.assertFalse(
2329+
self.group_profile.group
2330+
in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys()
2331+
)
23262332

23272333
@override_settings(DEFAULT_ANONYMOUS_DOWNLOAD_PERMISSION=False)
23282334
@override_settings(RESOURCE_PUBLISHING=True)
@@ -2333,8 +2339,13 @@ def test_if_anonymoys_default_perms_is_false_should_assign_perms_to_user_group_i
23332339
"""
23342340

23352341
resource = resource_manager.create(str(uuid.uuid4), Dataset, defaults={"owner": self.group_member})
2336-
self.assertTrue(self.group_profile.group in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys())
2337-
group_val = permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"][self.group_profile.group]
2342+
self.assertTrue(
2343+
self.group_profile.group
2344+
in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys()
2345+
)
2346+
group_val = permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"][
2347+
self.group_profile.group
2348+
]
23382349
self.assertSetEqual({"view_resourcebase", "download_resourcebase"}, set(group_val))
23392350

23402351
@override_settings(DEFAULT_ANONYMOUS_VIEW_PERMISSION=False)
@@ -2349,8 +2360,13 @@ def test_if_anonymoys_default_perms_is_false_should_assign_perms_to_user_group_i
23492360

23502361
resource = resource_manager.create(str(uuid.uuid4), Dataset, defaults={"owner": self.group_member})
23512362

2352-
self.assertTrue(self.group_profile.group in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys())
2353-
group_val = permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"][self.group_profile.group]
2363+
self.assertTrue(
2364+
self.group_profile.group
2365+
in permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"].keys()
2366+
)
2367+
group_val = permissions_registry.get_perms(instance=resource, include_virtual=True)["groups"][
2368+
self.group_profile.group
2369+
]
23542370
self.assertSetEqual({"view_resourcebase", "download_resourcebase"}, set(group_val))
23552371

23562372

@@ -2411,7 +2427,7 @@ def setUp(self):
24112427
assign_perm(perm, self.member_with_perms, self.resource.get_self_resource())
24122428

24132429
# Assert inital assignment of permissions to groups and users
2414-
resource_perm_specs = self.permissions_registry.get_perms(instance=resource, include_virtual=True)
2430+
resource_perm_specs = self.permissions_registry.get_perms(instance=self.resource, include_virtual=True)
24152431
self.assertSetEqual(
24162432
set(resource_perm_specs["users"][self.author]), set(self.owner_perms + self.edit_perms + self.dataset_perms)
24172433
)
@@ -2460,7 +2476,7 @@ def test_owner_is_group_manager(self):
24602476
# Admin publishes and approves the resource
24612477
response = self.admin_approve_and_publish_resource()
24622478
self.assertEqual(response.status_code, 200)
2463-
resource_perm_specs = self.permissions_registry.get_perms(instance=resource, include_virtual=True)
2479+
resource_perm_specs = self.permissions_registry.get_perms(instance=self.resource, include_virtual=True)
24642480

24652481
# Once a resource has been published, the 'publish_resourcebase' permission should be removed anyway
24662482
self.assertSetEqual(
@@ -2471,7 +2487,7 @@ def test_owner_is_group_manager(self):
24712487
# Admin un-approves and un-publishes the resource
24722488
response = self.admin_unapprove_and_unpublish_resource()
24732489
self.assertEqual(response.status_code, 200)
2474-
resource_perm_specs = self.permissions_registry.get_perms(instance=resource, include_virtual=True)
2490+
resource_perm_specs = self.permissions_registry.get_perms(instance=self.resource, include_virtual=True)
24752491

24762492
self.assertSetEqual(
24772493
set(resource_perm_specs["users"][self.author]),
@@ -2481,7 +2497,7 @@ def test_owner_is_group_manager(self):
24812497
GroupMember.objects.get(group=self.owner_group, user=self.author).demote()
24822498

24832499
def assertions_for_approved_or_published_is_true(self):
2484-
resource_perm_specs = self.permissions_registry.get_perms(instance=resource, include_virtual=True)
2500+
resource_perm_specs = self.permissions_registry.get_perms(instance=self.resource, include_virtual=True)
24852501
self.assertSetEqual(set(resource_perm_specs["users"][self.author]), set(self.owner_perms))
24862502
self.assertSetEqual(
24872503
set(resource_perm_specs["users"][self.member_with_perms]), set(self.owner_perms + self.dataset_perms)
@@ -2498,7 +2514,7 @@ def assertions_for_approved_or_published_is_true(self):
24982514
self.assertSetEqual(set(resource_perm_specs["groups"][self.resource_group.group]), set(self.safe_perms))
24992515

25002516
def assertions_for_approved_and_published_is_false(self):
2501-
resource_perm_specs = self.permissions_registry.get_perms(instance=resource, include_virtual=True)
2517+
resource_perm_specs = self.permissions_registry.get_perms(instance=self.resource, include_virtual=True)
25022518
self.assertSetEqual(
25032519
set(resource_perm_specs["users"][self.author]), set(self.owner_perms + self.edit_perms + self.dataset_perms)
25042520
)

geonode/security/utils.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -625,7 +625,9 @@ def get_permissions(
625625
_permissions = copy.deepcopy(permissions)
626626

627627
if _resource:
628-
perm_spec = _permissions or copy.deepcopy(permissions_registry.get_perms(instance=_resource, include_virtual=True))
628+
perm_spec = _permissions or copy.deepcopy(
629+
permissions_registry.get_perms(instance=_resource, include_virtual=True)
630+
)
629631

630632
# Sanity checks
631633
if isinstance(perm_spec, str):

0 commit comments

Comments
 (0)