From bbf8d1bbe9ddbebc3584a1a32dc620941ea44a31 Mon Sep 17 00:00:00 2001 From: andrea Date: Tue, 4 Jun 2024 16:50:39 +0200 Subject: [PATCH] [MIG] auth_saml: fix E501 Line too long --- auth_saml/models/auth_saml_provider.py | 3 ++- auth_saml/tests/test_pysaml.py | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/auth_saml/models/auth_saml_provider.py b/auth_saml/models/auth_saml_provider.py index 4a3f33393e..4b323b7c26 100644 --- a/auth_saml/models/auth_saml_provider.py +++ b/auth_saml/models/auth_saml_provider.py @@ -301,7 +301,8 @@ def _validate_auth_response(self, token: str, base_url: str = None): if not matching_value: raise Exception( - f"Matching attribute {self.matching_attribute} not found in user attrs: {attrs}" + f"Matching attribute {self.matching_attribute} not found " + f"in user attrs: {attrs}" ) if matching_value and isinstance(matching_value, list): diff --git a/auth_saml/tests/test_pysaml.py b/auth_saml/tests/test_pysaml.py index 937cd9caeb..570be1aa0c 100644 --- a/auth_saml/tests/test_pysaml.py +++ b/auth_saml/tests/test_pysaml.py @@ -278,7 +278,8 @@ def test_disallow_user_password(self): self.authenticate(user="test@example.com", password="Lu,ums-7vRU>0i]=YDLa") def test_disallow_user_admin_can_have_password(self): - """Test that admin can have its password set even if the disallow option is set.""" + """Test that admin can have its password set + even if the disallow option is set.""" # change the option self.browse_ref( "auth_saml.allow_saml_uid_and_internal_password"