Skip to content

Commit a9ee263

Browse files
committed
fix: pre-commit suggestions incorporated
1 parent 6faa494 commit a9ee263

File tree

12 files changed

+46
-47
lines changed

12 files changed

+46
-47
lines changed

Access/accessrequest_helper.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ def getGrantFailedRequests(request):
5858
except Exception as e:
5959
return process_error_response(request, e)
6060

61-
61+
6262

6363
def getPendingRevokeFailures(request):
6464
if request.GET.get('username'):

Access/group_helper.py

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ def updateOwner(request, group, context):
134134
logger.debug("updating owners for group "+ group.name + " requested by "+ request.user.username)
135135
data=request.POST
136136
data=dict(data.lists())
137-
137+
138138
if "owners" not in data:
139139
data["owners"] = []
140140
destination = [request.user.user.email]
@@ -159,7 +159,7 @@ def updateOwner(request, group, context):
159159
def isAllowedGroupAdminFunctions(request,groupMembers):
160160
ownersEmail = [member.user.email for member in groupMembers.filter(is_owner = True)]
161161
is_approver = len(User.objects.filter(role=Role.objects.get(label='TEAMS:ACCESSAPPROVE'),state=1, email=request.user.user.email)) > 0
162-
162+
163163
if request.user.user.email not in ownersEmail and not (request.user.is_superuser or request.user.user.is_ops or is_approver):
164164
return False
165165
return True
@@ -175,7 +175,7 @@ def check_user_is_group_owner(user_name, group):
175175
return False
176176

177177
def approveNewGroupRequest(request, group_id):
178-
178+
179179
try:
180180
group_object = GroupV2.objects.get(group_id=group_id, status='Pending')
181181
except Exception as e:
@@ -196,7 +196,7 @@ def approveNewGroupRequest(request, group_id):
196196
group_object.approver = request.user.user
197197
group_object.status = 'Approved'
198198
group_object.save()
199-
199+
200200
MembershipV2.objects.filter(group=group_object, status="Pending").update(status="Approved", approver=request.user.user)
201201
initial_members = list(MembershipV2.objects.filter(group=group_object).values_list("user__user__username", flat=True))
202202

@@ -228,7 +228,7 @@ def approveNewGroupRequest(request, group_id):
228228
logger.error("Error in Approving New Group request.")
229229
context = {}
230230
context['error'] = "Error Occured while Approving group creation. Please contact admin - "+str(e)
231-
return context
231+
return context
232232

233233
def get_user_group(request, group_name):
234234
try:
@@ -245,7 +245,7 @@ def get_user_group(request, group_name):
245245
groupMembers = MembershipV2.objects.filter(group=group).filter(status="Approved").only('user')
246246
if not isAllowedGroupAdminFunctions(request, groupMembers):
247247
raise Exception("Permission denied, you're not owner of this group")
248-
248+
249249
groupMembers = get_users_from_groupmembers(groupMembers)
250250
context['groupMembers'] = groupMembers
251251
context['groupName'] = group_name
@@ -255,14 +255,14 @@ def get_user_group(request, group_name):
255255
logger.error("Error in Add New User to Group request.")
256256
context = {}
257257
context['error'] = {'error_msg': 'Internal Error', 'msg': "Error Occured while loading the page. Please contact admin, " + str(e)}
258-
return context
258+
return context
259259

260260
def get_users_from_groupmembers(group_members):
261261
return [member.user for member in group_members]
262262

263263
def add_user_to_group(request):
264264
try:
265-
265+
266266
data = request.POST
267267
data = dict(data.lists())
268268
group = GroupV2.objects.filter(name=data['groupName'][0]).filter(status='Approved')[0]
@@ -297,7 +297,7 @@ def add_user_to_group(request):
297297
return json_response
298298

299299
sendMailForGroupApproval(membership_id, user_email, str(request.user), data['groupName'][0], request.META['HTTP_HOST'], data['memberReason'][0])
300-
300+
301301
context = {}
302302
context['status'] = {'title':'Request Submitted', 'msg': 'Once Approved the newly added members will be granted the same permissions as the group'}
303303
return context
@@ -309,7 +309,7 @@ def add_user_to_group(request):
309309
return context
310310

311311
def is_user_in_group(user_email, group_members_email):
312-
return user_email in group_members_email
312+
return user_email in group_members_email
313313

314314
def sendMailForGroupApproval(membership_id, userEmail, requester, group_name, http_host, reason ):
315315
primary_approver , otherApprover = helpers.getApprovers()
@@ -320,10 +320,10 @@ def sendMailForGroupApproval(membership_id, userEmail, requester, group_name, ht
320320

321321

322322
def generateUserAddToGroupEmailBody(user_email, primary_approver, other_approver, requester, group_name, reason):
323-
return helpers.generateStringFromTemplate(filename="add_user_to_group_mail.html",
323+
return helpers.generateStringFromTemplate(filename="add_user_to_group_mail.html",
324324
user_email = user_email,
325-
primary_approver = primary_approver,
326-
other_approver = other_approver,
325+
primary_approver = primary_approver,
326+
other_approver = other_approver,
327327
requester = requester,
328328
group_name = group_name,
329329
reason = reason)

Access/models.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ def getAccessRequestDetails(self, access_module):
343343
access_request_data["accessMeta"] = access_module.combine_labels_meta(access_labels)
344344

345345
return access_request_data
346-
346+
347347
def updateMetaData(self, key, data):
348348
with transaction.atomic():
349349
mapping = UserAccessMapping.objects.select_for_update().get(request_id=self.request_id)

Access/tests/test_access_views_helper.py

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -244,14 +244,14 @@ def test_executeGroupAccess(
244244
"mod1",
245245
True,
246246
"GrantFailed",
247-
),
247+
),
248248
(
249249
test_run_access_grant_approveException,
250250
"1",
251251
"mod1",
252252
True,
253253
"GrantFailed",
254-
),
254+
),
255255
],
256256
)
257257

@@ -261,7 +261,7 @@ def test_run_access_grant(mocker, testName, accessType ,userState, response, res
261261
requestObject = mocker.MagicMock()
262262
requestObject.user.state = userState
263263
requestObject.save.return_value = True
264-
264+
265265
elif testName == test_run_access_grant_accessApproved:
266266
requestObject = mocker.MagicMock()
267267
requestObject.user.state = userState
@@ -303,4 +303,3 @@ def test_run_access_grant(mocker, testName, accessType ,userState, response, res
303303
assert requestObject.status == response_status
304304
if response_status == "GrantFailed":
305305
general.emailSES.call_count == 1
306-

Access/tests/test_accessrequest_helper.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ def requestGet(val):
111111
mocker.patch("Access.models.User.objects.get", return_value=mocker.MagicMock())
112112
elif testname == Test_pendingFailure_Exception:
113113
mocker.patch("Access.models.UserAccessMapping.objects.filter", return_value=None, side_effect = Exception(getUserExceptionString))
114-
114+
115115
context = accessrequest_helper.getGrantFailedRequests(request)
116116
assert str(context) == expectedOutput
117117

@@ -137,7 +137,7 @@ def requestGet(val):
137137
if val == 'username':
138138
return True
139139
return False
140-
140+
141141
request.GET.get = requestGet
142142

143143
orderByPatch = mocker.MagicMock()
@@ -150,9 +150,9 @@ def requestGet(val):
150150
if val == 'access_type':
151151
return "request_type"
152152
return False
153-
153+
154154
request.GET.get = requestGet
155-
155+
156156
orderByPatch = mocker.MagicMock()
157157
orderByPatch.order_by.return_value = failures
158158
mocker.patch("Access.models.User.objects.get", return_value=mocker.MagicMock())
@@ -163,12 +163,12 @@ def requestGet(val):
163163
if val == 'access_type' or val == 'username':
164164
return False
165165
return True
166-
166+
167167
request.GET.get = requestGet
168-
168+
169169
orderByPatch = mocker.MagicMock()
170170
orderByPatch.order_by.return_value = failures
171-
mocker.patch("Access.models.UserAccessMapping.objects.filter", return_value=orderByPatch)
171+
mocker.patch("Access.models.UserAccessMapping.objects.filter", return_value=orderByPatch)
172172

173173
elif testname == test_pendingRevoke_Exception:
174174
request.GET.get.return_value = True

Access/tests/test_group_helper.py

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ def test_updateOwner(mocker):
170170
test_approveNewGroupRequest_ThrowsException,
171171
"{'error': 'Error Occured while Approving group creation. Please contact admin - sendEmailError'}",
172172
"grp1", False, True,
173-
),
173+
),
174174
]
175175
)
176176

@@ -186,7 +186,7 @@ def test_approveNewGroupRequest(mocker, testname, expectedoutput,groupID, reques
186186
mock_groupObject.status="Declined"
187187
mock_groupObject.approver.user.username = "username2"
188188
mocker.patch("Access.models.GroupV2.objects.get", return_value=mock_groupObject)
189-
189+
190190
elif testname == test_approveNewGroupRequest_UserApprovingHisOwn:
191191
request.user.username = "username1"
192192
mock_groupObject = mocker.MagicMock()
@@ -204,7 +204,7 @@ def test_approveNewGroupRequest(mocker, testname, expectedoutput,groupID, reques
204204
mock_groupObject.requester.user.username = "username3"
205205
mock_groupObject.save.return_value = True
206206
mock_groupObject.requester.email = "requester@email.com"
207-
207+
208208
mock_membership_update = mocker.MagicMock()
209209
mock_membership_update.update.return_value = True
210210
mock_membership_update.values_list.return_value = ["member1"]
@@ -222,7 +222,7 @@ def test_approveNewGroupRequest(mocker, testname, expectedoutput,groupID, reques
222222
mock_groupObject.requester.user.username = "username3"
223223
mock_groupObject.save.return_value = True
224224
mock_groupObject.requester.email = "requester@email.com"
225-
225+
226226
mock_membership_update = mocker.MagicMock()
227227
mock_membership_update.update.return_value = True
228228
mock_membership_update.values_list.return_value = ["member1"]
@@ -246,7 +246,7 @@ def test_approveNewGroupRequest(mocker, testname, expectedoutput,groupID, reques
246246
assert models.MembershipV2.objects.filter.call_count == 2
247247
assert general.emailSES.call_count == 1
248248
assert helpers.generateStringFromTemplate.call_count == 2
249-
249+
250250

251251
test_get_user_group_group_not_found = "GroupNotFound"
252252
test_get_user_group_cannot_access_group = "UserIsNotOwnerOfGroupOrSuperUser"
@@ -267,7 +267,7 @@ def test_approveNewGroupRequest(mocker, testname, expectedoutput,groupID, reques
267267
test_get_user_group_can_access_group,
268268
"TestGroupName1",
269269
"{'groupMembers': 'user1', 'groupName': 'TestGroupName1'}",
270-
),
270+
),
271271
]
272272
)
273273
def test_get_user_group(mocker, test_name, group_name, expected_output):
@@ -289,12 +289,12 @@ def test_get_user_group(mocker, test_name, group_name, expected_output):
289289
mock_membership_filter1 = mocker.MagicMock()
290290
mock_group_member = mocker.MagicMock()
291291
mock_group_member.filter.return_value = ["member1@email.com"]
292-
292+
293293
mock_membership_filter1.filter.return_value = mock_membership_only_filter
294294

295295
mocker.patch("Access.models.MembershipV2.objects.filter", return_value=mock_membership_filter1)
296296
mocker.patch("Access.group_helper.isAllowedGroupAdminFunctions", return_value = False)
297-
297+
298298
elif test_name == test_get_user_group_can_access_group:
299299
request.user.user.email = "member1@email.com"
300300
request.user.is_superuser = True
@@ -309,7 +309,7 @@ def test_get_user_group(mocker, test_name, group_name, expected_output):
309309
mocker.patch("Access.group_helper.isAllowedGroupAdminFunctions", return_value = True)
310310

311311
mock_membership_only_filter = mocker.MagicMock()
312-
312+
313313
def mock_get_users_from_groupmembers(groupMembers):
314314
return "user1"
315315

@@ -319,10 +319,10 @@ def mock_get_users_from_groupmembers(groupMembers):
319319

320320
mock_group_member = mocker.MagicMock()
321321
mock_group_member.filter.return_value = [mock_member]
322-
mock_membership_only_filter.only.return_value = mock_group_member
322+
mock_membership_only_filter.only.return_value = mock_group_member
323323
mock_membership_filter1.filter.return_value = mock_membership_only_filter
324324

325-
325+
326326
context = group_helper.get_user_group(request, group_name)
327327
assert str(context) == expected_output
328328

@@ -353,7 +353,7 @@ def mock_get_users_from_groupmembers(groupMembers):
353353
test_add_user_to_group_doesnot_need_approval,
354354
"groupName=TestGroupName&selectedUserList=member2@member2.com&memberReason=somereason",
355355
"is now being processed', 'desc': 'A email will be sent after the requested access are granted'}}",
356-
),
356+
),
357357
]
358358
)
359359
def test_add_user_to_group(mocker, test_name, post_data, expected_output):
@@ -414,7 +414,7 @@ def test_add_user_to_group(mocker, test_name, post_data, expected_output):
414414
request.POST = QueryDict(post_data)
415415
request.user.email = "member1@member1.com"
416416
request.user.is_superuser = True
417-
417+
418418

419419
mock_member = mocker.MagicMock()
420420
mock_member.user.email = "member2@member2.com"
@@ -487,7 +487,7 @@ def test_add_user_to_group(mocker, test_name, post_data, expected_output):
487487
mock_thread.start.return_value = True
488488

489489
mocker.patch("threading.Thread", return_value = mock_thread)
490-
490+
491491

492492
context = group_helper.add_user_to_group(request)
493493
assert expected_output in str(context)

Access/views.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ def groupAccessList(request, groupName):
8282
context = group_helper.getGroupAccessList(request, groupName)
8383
if context['error']:
8484
return render(request,"BSOps/accessStatus.html",context)
85-
85+
8686
return render(request,"BSOps/groupAccessList.html",context)
8787

8888

BrowserStackAutomation/urls.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
groupRequestAccess,
3131
groupAccessList,
3232
approveNewGroup,
33-
add_user_to_group,
33+
add_user_to_group,
3434
)
3535

3636
urlpatterns = [
@@ -50,7 +50,7 @@
5050
re_path(r"^access/requestAccess$", requestAccess, name="requestAccess"),
5151
re_path(r"^group/requestAccess$", groupRequestAccess, name="groupRequestAccess"),
5252
re_path(r'^group/access/list/(?P<groupName>[\w -]+)$', groupAccessList, name='groupAccessList'),
53-
re_path(r'^group/new/accept/(?P<requestId>.*)$', approveNewGroup, name="approveNewGroup"),
53+
re_path(r'^group/new/accept/(?P<requestId>.*)$', approveNewGroup, name="approveNewGroup"),
5454
re_path(r'^group/adduser/(?P<groupName>[\w -]+)$', add_user_to_group, name='addUserToGroup'),
5555

5656
]

bootprocess/admin.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@
55
admin.site.register(Permission)
66
admin.site.register(UserAccessMapping)
77
admin.site.register(Role)
8-
admin.site.register(AccessV2)
8+
admin.site.register(AccessV2)

bootprocess/views_helper.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
def getDashboardData(request):
1818
user = access_user.objects.get(user__username=request.user)
19-
19+
2020
# Add users to DEFAULT_ACCESS_GROUP if the user is not already on the group
2121
user_membership = str(
2222
MembershipV2.objects.filter(user=user).filter(status="Approved")

0 commit comments

Comments
 (0)