mirror of
https://git.anonymousland.org/anonymousland/synapse.git
synced 2025-05-06 10:24:57 -04:00
Update black, and run auto formatting over the codebase (#9381)
- Update black version to the latest
- Run black auto formatting over the codebase
- Run autoformatting according to [`docs/code_style.md
`](80d6dc9783/docs/code_style.md
)
- Update `code_style.md` docs around installing black to use the correct version
This commit is contained in:
parent
5636e597c3
commit
0a00b7ff14
271 changed files with 2802 additions and 1713 deletions
|
@ -102,7 +102,8 @@ class FallbackAuthTests(unittest.HomeserverTestCase):
|
|||
"""Ensure that fallback auth via a captcha works."""
|
||||
# Returns a 401 as per the spec
|
||||
channel = self.register(
|
||||
401, {"username": "user", "type": "m.login.password", "password": "bar"},
|
||||
401,
|
||||
{"username": "user", "type": "m.login.password", "password": "bar"},
|
||||
)
|
||||
|
||||
# Grab the session
|
||||
|
@ -191,7 +192,10 @@ class UIAuthTests(unittest.HomeserverTestCase):
|
|||
) -> FakeChannel:
|
||||
"""Delete an individual device."""
|
||||
channel = self.make_request(
|
||||
"DELETE", "devices/" + device, body, access_token=access_token,
|
||||
"DELETE",
|
||||
"devices/" + device,
|
||||
body,
|
||||
access_token=access_token,
|
||||
)
|
||||
|
||||
# Ensure the response is sane.
|
||||
|
@ -204,7 +208,10 @@ class UIAuthTests(unittest.HomeserverTestCase):
|
|||
# Note that this uses the delete_devices endpoint so that we can modify
|
||||
# the payload half-way through some tests.
|
||||
channel = self.make_request(
|
||||
"POST", "delete_devices", body, access_token=self.user_tok,
|
||||
"POST",
|
||||
"delete_devices",
|
||||
body,
|
||||
access_token=self.user_tok,
|
||||
)
|
||||
|
||||
# Ensure the response is sane.
|
||||
|
@ -417,7 +424,10 @@ class UIAuthTests(unittest.HomeserverTestCase):
|
|||
|
||||
# and now the delete request should succeed.
|
||||
self.delete_device(
|
||||
self.user_tok, self.device_id, 200, body={"auth": {"session": session_id}},
|
||||
self.user_tok,
|
||||
self.device_id,
|
||||
200,
|
||||
body={"auth": {"session": session_id}},
|
||||
)
|
||||
|
||||
@skip_unless(HAS_OIDC, "requires OIDC")
|
||||
|
@ -443,8 +453,7 @@ class UIAuthTests(unittest.HomeserverTestCase):
|
|||
@skip_unless(HAS_OIDC, "requires OIDC")
|
||||
@override_config({"oidc_config": TEST_OIDC_CONFIG})
|
||||
def test_offers_both_flows_for_upgraded_user(self):
|
||||
"""A user that had a password and then logged in with SSO should get both flows
|
||||
"""
|
||||
"""A user that had a password and then logged in with SSO should get both flows"""
|
||||
login_resp = self.helper.login_via_oidc(UserID.from_string(self.user).localpart)
|
||||
self.assertEqual(login_resp["user_id"], self.user)
|
||||
|
||||
|
@ -459,8 +468,7 @@ class UIAuthTests(unittest.HomeserverTestCase):
|
|||
@skip_unless(HAS_OIDC, "requires OIDC")
|
||||
@override_config({"oidc_config": TEST_OIDC_CONFIG})
|
||||
def test_ui_auth_fails_for_incorrect_sso_user(self):
|
||||
"""If the user tries to authenticate with the wrong SSO user, they get an error
|
||||
"""
|
||||
"""If the user tries to authenticate with the wrong SSO user, they get an error"""
|
||||
# log the user in
|
||||
login_resp = self.helper.login_via_oidc(UserID.from_string(self.user).localpart)
|
||||
self.assertEqual(login_resp["user_id"], self.user)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue