Skip to content

Commit 0327393

Browse files
authored
Reformat Python code with Ruff (#537)
* Reformat Python code with Ruff
1 parent 6b55a9b commit 0327393

File tree

501 files changed

+35029
-41962
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

501 files changed

+35029
-41962
lines changed

.github/workflows/deploy.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ jobs:
3333

3434
- name: Build documentation
3535
run: |
36-
source .venv/bin/activate
36+
source ${GITHUB_WORKSPACE}/.venv/bin/activate
3737
make html
3838
working-directory: doc # Adjust to your Sphinx docs directory
3939

.github/workflows/docs.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ jobs:
4040

4141
- name: Spellcheck docs
4242
run: |
43-
source .venv/bin/activate
43+
source ${GITHUB_WORKSPACE}/.venv/bin/activate
4444
make spelling
4545
working-directory: ./doc
4646

.github/workflows/tests.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
- name: Compile
5656
working-directory: ./src
5757
run: |
58-
source .venv/bin/activate
58+
source ${GITHUB_WORKSPACE}/.venv/bin/activate
5959
make all compress
6060
- name: Run tests
6161
working-directory: ./src

.gitignore

+3-1
Original file line numberDiff line numberDiff line change
@@ -18,18 +18,20 @@ htmlcov/
1818
.ropeproject
1919
__pycache__/
2020
.cache
21+
2122
_static/
2223
static.dist/
24+
src/pretix/static/jsi18n/
2325
build/
2426
_build/
2527
dist/
26-
pretix/static/jsi18n/
2728
node_modules/
2829
.idea
2930
.secret
3031
atlassian-ide-plugin.xml
3132
pretixeu/
3233
local/
34+
3335
.project
3436
.pydevproject
3537
.DS_Store

.pre-commit-config.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ repos:
1010

1111
- repo: https://github.com/astral-sh/ruff-pre-commit
1212
# Ruff version.
13-
rev: v0.9.1
13+
rev: v0.9.4
1414
hooks:
1515
- id: ruff
1616
- id: ruff-format

pyproject.toml

+3-1
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ dependencies = [
109109
memcached = ['pylibmc']
110110

111111
[dependency-groups]
112-
lint = ['djlint>=1.36.4', 'ruff>=0.9.1']
112+
lint = ['djlint>=1.36.4', 'ruff>=0.9.4']
113113
test = [
114114
'pytest-mock>=3.10.0',
115115
'pytest>=7.3.2',
@@ -201,6 +201,8 @@ dummy-variable-rgx = '^(_+|(_+[a-zA-Z0-9_]*[a-zA-Z0-9]+?))$'
201201
# This file uses star import (`import *`) which is not recommended.
202202
'src/tests/settings.py' = ['F403', 'F405']
203203
'src/pretix/testutils/settings.py' = ['F403', 'F405']
204+
# These files are index of models, we can ignore "imported but unused".
205+
'src/**/models/__init__.py' = ['F401']
204206

205207
[tool.ruff.format]
206208
quote-style = 'single'

src/manage.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
import os
33
import sys
44

5-
if __name__ == "__main__":
6-
os.environ.setdefault("DJANGO_SETTINGS_MODULE", "pretix.settings")
5+
if __name__ == '__main__':
6+
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'pretix.settings')
77

88
from django.core.management import execute_from_command_line
99

src/pretix/__init__.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
__version__ = "3.18.0.dev0"
1+
__version__ = '3.18.0.dev0'

src/pretix/__main__.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
import os
22
import sys
33

4-
if __name__ == "__main__":
5-
os.environ.setdefault("DJANGO_SETTINGS_MODULE", "pretix.settings")
4+
if __name__ == '__main__':
5+
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'pretix.settings')
66

77
from django.core.management import execute_from_command_line
88

src/pretix/api/auth/device.py

+2-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
from rest_framework.authentication import TokenAuthentication
55

66
from pretix.api.auth.devicesecurity import (
7-
DEVICE_SECURITY_PROFILES, FullAccessSecurityProfile,
7+
DEVICE_SECURITY_PROFILES,
8+
FullAccessSecurityProfile,
89
)
910
from pretix.base.models import Device
1011

src/pretix/api/auth/devicesecurity.py

+3-2
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class AllowListSecurityProfile:
1313
allowlist = ()
1414

1515
def is_allowed(self, request):
16-
key = (request.method, f"{request.resolver_match.namespace}:{request.resolver_match.url_name}")
16+
key = (request.method, f'{request.resolver_match.namespace}:{request.resolver_match.url_name}')
1717
return key in self.allowlist
1818

1919

@@ -127,7 +127,8 @@ class PretixPosSecurityProfile(AllowListSecurityProfile):
127127

128128

129129
DEVICE_SECURITY_PROFILES = {
130-
k.identifier: k() for k in (
130+
k.identifier: k()
131+
for k in (
131132
FullAccessSecurityProfile,
132133
PretixScanSecurityProfile,
133134
PretixScanNoSyncSecurityProfile,

src/pretix/api/auth/permission.py

+13-12
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,13 @@
55
from pretix.base.models.auth import SuperuserPermissionSet
66
from pretix.base.models.organizer import TeamAPIToken
77
from pretix.helpers.security import (
8-
SessionInvalid, SessionReauthRequired, assert_session_valid,
8+
SessionInvalid,
9+
SessionReauthRequired,
10+
assert_session_valid,
911
)
1012

1113

1214
class EventPermission(BasePermission):
13-
1415
def has_permission(self, request, view):
1516
if not request.user.is_authenticated and not isinstance(request.auth, (Device, TeamAPIToken)):
1617
return False
@@ -31,13 +32,16 @@ def has_permission(self, request, view):
3132
except SessionReauthRequired:
3233
return False
3334

34-
perm_holder = (request.auth if isinstance(request.auth, (Device, TeamAPIToken))
35-
else request.user)
35+
perm_holder = request.auth if isinstance(request.auth, (Device, TeamAPIToken)) else request.user
3636
if 'event' in request.resolver_match.kwargs and 'organizer' in request.resolver_match.kwargs:
37-
request.event = Event.objects.filter(
38-
slug=request.resolver_match.kwargs['event'],
39-
organizer__slug=request.resolver_match.kwargs['organizer'],
40-
).select_related('organizer').first()
37+
request.event = (
38+
Event.objects.filter(
39+
slug=request.resolver_match.kwargs['event'],
40+
organizer__slug=request.resolver_match.kwargs['organizer'],
41+
)
42+
.select_related('organizer')
43+
.first()
44+
)
4145
if not request.event or not perm_holder.has_event_permission(request.event.organizer, request.event, request=request):
4246
return False
4347
request.organizer = request.event.organizer
@@ -87,15 +91,13 @@ def has_permission(self, request, view):
8791
return False
8892
elif view.action == 'destroy' and 'can_change_event_settings' not in request.eventpermset:
8993
return False
90-
elif view.action in ['update', 'partial_update'] \
91-
and 'can_change_event_settings' not in request.eventpermset:
94+
elif view.action in ['update', 'partial_update'] and 'can_change_event_settings' not in request.eventpermset:
9295
return False
9396

9497
return True
9598

9699

97100
class ProfilePermission(BasePermission):
98-
99101
def has_permission(self, request, view):
100102
if not request.user.is_authenticated and not isinstance(request.auth, (Device, TeamAPIToken)):
101103
return False
@@ -117,7 +119,6 @@ def has_permission(self, request, view):
117119

118120

119121
class AnyAuthenticatedClientPermission(BasePermission):
120-
121122
def has_permission(self, request, view):
122123
if not request.user.is_authenticated and not isinstance(request.auth, (Device, TeamAPIToken)):
123124
return False

src/pretix/api/exception.py

+1-5
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,7 @@ def custom_exception_handler(exc, context):
99

1010
if isinstance(exc, LockTimeoutException):
1111
response = Response(
12-
{'detail': 'The server was too busy to process your request. Please try again.'},
13-
status=status.HTTP_409_CONFLICT,
14-
headers={
15-
'Retry-After': 5
16-
}
12+
{'detail': 'The server was too busy to process your request. Please try again.'}, status=status.HTTP_409_CONFLICT, headers={'Retry-After': 5}
1713
)
1814

1915
return response

src/pretix/api/middleware.py

+4-8
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,7 @@ def __call__(self, request: HttpRequest):
2727
if not request.headers.get('X-Idempotency-Key'):
2828
return self.get_response(request)
2929

30-
auth_hash_parts = '{}:{}'.format(
31-
request.headers.get('Authorization', ''),
32-
request.COOKIES.get(settings.SESSION_COOKIE_NAME, '')
33-
)
30+
auth_hash_parts = '{}:{}'.format(request.headers.get('Authorization', ''), request.COOKIES.get(settings.SESSION_COOKIE_NAME, ''))
3431
auth_hash = sha1(auth_hash_parts.encode()).hexdigest()
3532
idempotency_key = request.headers.get('X-Idempotency-Key', '')
3633

@@ -44,8 +41,8 @@ def __call__(self, request: HttpRequest):
4441
'request_path': request.path,
4542
'response_code': 0,
4643
'response_headers': '{}',
47-
'response_body': b''
48-
}
44+
'response_body': b'',
45+
},
4946
)
5047

5148
if created:
@@ -70,8 +67,7 @@ def __call__(self, request: HttpRequest):
7067
call.response_body = repr(resp).encode()
7168
call.response_headers = json.dumps(resp.headers._store)
7269
call.locked = None
73-
call.save(update_fields=['locked', 'response_code', 'response_headers',
74-
'response_body'])
70+
call.save(update_fields=['locked', 'response_code', 'response_headers', 'response_body'])
7571
return resp
7672
else:
7773
if call.locked:

src/pretix/api/migrations/0001_initial.py

+1-3
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,9 @@
88

99

1010
class Migration(migrations.Migration):
11-
1211
initial = True
1312

14-
dependencies = [
15-
]
13+
dependencies = []
1614

1715
operations = [
1816
migrations.CreateModel(

src/pretix/api/migrations/0002_initial.py

+18-7
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66

77

88
class Migration(migrations.Migration):
9-
109
initial = True
1110

1211
dependencies = [
@@ -29,7 +28,9 @@ class Migration(migrations.Migration):
2928
migrations.AddField(
3029
model_name='oauthrefreshtoken',
3130
name='access_token',
32-
field=models.OneToOneField(null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='refresh_token', to=settings.OAUTH2_PROVIDER_ACCESS_TOKEN_MODEL),
31+
field=models.OneToOneField(
32+
null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='refresh_token', to=settings.OAUTH2_PROVIDER_ACCESS_TOKEN_MODEL
33+
),
3334
),
3435
migrations.AddField(
3536
model_name='oauthrefreshtoken',
@@ -54,7 +55,9 @@ class Migration(migrations.Migration):
5455
migrations.AddField(
5556
model_name='oauthidtoken',
5657
name='user',
57-
field=models.ForeignKey(null=True, on_delete=django.db.models.deletion.CASCADE, related_name='%(app_label)s_%(class)s', to=settings.AUTH_USER_MODEL),
58+
field=models.ForeignKey(
59+
null=True, on_delete=django.db.models.deletion.CASCADE, related_name='%(app_label)s_%(class)s', to=settings.AUTH_USER_MODEL
60+
),
5861
),
5962
migrations.AddField(
6063
model_name='oauthgrant',
@@ -74,7 +77,9 @@ class Migration(migrations.Migration):
7477
migrations.AddField(
7578
model_name='oauthapplication',
7679
name='user',
77-
field=models.ForeignKey(null=True, on_delete=django.db.models.deletion.CASCADE, related_name='%(app_label)s_%(class)s', to=settings.AUTH_USER_MODEL),
80+
field=models.ForeignKey(
81+
null=True, on_delete=django.db.models.deletion.CASCADE, related_name='%(app_label)s_%(class)s', to=settings.AUTH_USER_MODEL
82+
),
7883
),
7984
migrations.AddField(
8085
model_name='oauthaccesstoken',
@@ -84,7 +89,9 @@ class Migration(migrations.Migration):
8489
migrations.AddField(
8590
model_name='oauthaccesstoken',
8691
name='id_token',
87-
field=models.OneToOneField(null=True, on_delete=django.db.models.deletion.CASCADE, related_name='access_token', to=settings.OAUTH2_PROVIDER_ID_TOKEN_MODEL),
92+
field=models.OneToOneField(
93+
null=True, on_delete=django.db.models.deletion.CASCADE, related_name='access_token', to=settings.OAUTH2_PROVIDER_ID_TOKEN_MODEL
94+
),
8895
),
8996
migrations.AddField(
9097
model_name='oauthaccesstoken',
@@ -94,12 +101,16 @@ class Migration(migrations.Migration):
94101
migrations.AddField(
95102
model_name='oauthaccesstoken',
96103
name='source_refresh_token',
97-
field=models.OneToOneField(null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='refreshed_access_token', to=settings.OAUTH2_PROVIDER_REFRESH_TOKEN_MODEL),
104+
field=models.OneToOneField(
105+
null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='refreshed_access_token', to=settings.OAUTH2_PROVIDER_REFRESH_TOKEN_MODEL
106+
),
98107
),
99108
migrations.AddField(
100109
model_name='oauthaccesstoken',
101110
name='user',
102-
field=models.ForeignKey(null=True, on_delete=django.db.models.deletion.CASCADE, related_name='%(app_label)s_%(class)s', to=settings.AUTH_USER_MODEL),
111+
field=models.ForeignKey(
112+
null=True, on_delete=django.db.models.deletion.CASCADE, related_name='%(app_label)s_%(class)s', to=settings.AUTH_USER_MODEL
113+
),
103114
),
104115
migrations.AlterUniqueTogether(
105116
name='apicall',

src/pretix/api/migrations/0004_oauthapplication_allowed_origins_and_more.py

-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66

77

88
class Migration(migrations.Migration):
9-
109
dependencies = [
1110
('pretixapi', '0003_oauthapplication_post_logout_redirect_uris_and_more'),
1211
]

0 commit comments

Comments
 (0)