Skip to content

Commit a8c86be

Browse files
authored
Update linter requirements (#7010)
1 parent 65ed7be commit a8c86be

File tree

5 files changed

+23
-23
lines changed

5 files changed

+23
-23
lines changed
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# PEP8 code linting, which we run on all commits.
2-
flake8==3.5.0
3-
flake8-tidy-imports==1.1.0
4-
pycodestyle==2.3.1
2+
flake8==3.7.8
3+
flake8-tidy-imports==3.0.0
4+
pycodestyle==2.5.0
55

66
# Sort and lint imports
7-
isort==4.3.3
7+
isort==4.3.21

rest_framework/schemas/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@
2323
from rest_framework.settings import api_settings
2424

2525
from . import coreapi, openapi
26-
from .inspectors import DefaultSchema # noqa
2726
from .coreapi import AutoSchema, ManualSchema, SchemaGenerator # noqa
27+
from .inspectors import DefaultSchema # noqa
2828

2929

3030
def get_schema_view(

setup.cfg

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ addopts=--tb=short --strict -ra
66
testspath = tests
77

88
[flake8]
9-
ignore = E501
9+
ignore = E501,W504
1010
banned-modules = json = use from rest_framework.utils import json!
1111

1212
[isort]

tests/schemas/test_coreapi.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@
2424
from rest_framework.views import APIView
2525
from rest_framework.viewsets import GenericViewSet, ModelViewSet
2626

27-
from . import views
2827
from ..models import BasicModel, ForeignKeySource, ManyToManySource
28+
from . import views
2929

3030
factory = APIRequestFactory()
3131

tests/test_permissions.py

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -494,28 +494,28 @@ def setUp(self):
494494
self.custom_message = 'Custom: You cannot access this resource'
495495

496496
def test_permission_denied(self):
497-
response = denied_view(self.request, pk=1)
498-
detail = response.data.get('detail')
499-
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
500-
self.assertNotEqual(detail, self.custom_message)
497+
response = denied_view(self.request, pk=1)
498+
detail = response.data.get('detail')
499+
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
500+
self.assertNotEqual(detail, self.custom_message)
501501

502502
def test_permission_denied_with_custom_detail(self):
503-
response = denied_view_with_detail(self.request, pk=1)
504-
detail = response.data.get('detail')
505-
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
506-
self.assertEqual(detail, self.custom_message)
503+
response = denied_view_with_detail(self.request, pk=1)
504+
detail = response.data.get('detail')
505+
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
506+
self.assertEqual(detail, self.custom_message)
507507

508508
def test_permission_denied_for_object(self):
509-
response = denied_object_view(self.request, pk=1)
510-
detail = response.data.get('detail')
511-
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
512-
self.assertNotEqual(detail, self.custom_message)
509+
response = denied_object_view(self.request, pk=1)
510+
detail = response.data.get('detail')
511+
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
512+
self.assertNotEqual(detail, self.custom_message)
513513

514514
def test_permission_denied_for_object_with_custom_detail(self):
515-
response = denied_object_view_with_detail(self.request, pk=1)
516-
detail = response.data.get('detail')
517-
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
518-
self.assertEqual(detail, self.custom_message)
515+
response = denied_object_view_with_detail(self.request, pk=1)
516+
detail = response.data.get('detail')
517+
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
518+
self.assertEqual(detail, self.custom_message)
519519

520520

521521
class PermissionsCompositionTests(TestCase):

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy