mirror of
				https://github.com/zulip/zulip.git
				synced 2025-11-04 05:53:43 +00:00 
			
		
		
		
	python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
    m = re.match(
        r"\x1b\[35mflake8    \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
    )
    if m:
        filename, row_str, col_str, err = m.groups()
        row, col = int(row_str), int(col_str)
        if filename == last_filename:
            assert last_row != row
        else:
            if last_filename is not None:
                with open(last_filename, "w") as f:
                    f.writelines(lines)
            with open(filename) as f:
                lines = f.readlines()
            last_filename = filename
        last_row = row
        line = lines[row - 1]
        if err in ["C812", "C815"]:
            lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
        elif err in ["C819"]:
            assert line[col - 2] == ","
            lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
    with open(last_filename, "w") as f:
        f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
			
			
This commit is contained in:
		
				
					committed by
					
						
						Tim Abbott
					
				
			
			
				
	
			
			
			
						parent
						
							b114eb2f10
						
					
				
				
					commit
					69730a78cc
				
			@@ -467,7 +467,7 @@ class ZulipLDAPAuthBackendBase(ZulipAuthMixin, LDAPBackend):
 | 
			
		||||
            # we want to return. Otherwise, raise an exception.
 | 
			
		||||
            error_message = "No ldap user matching django_to_ldap_username result: {}. Input username: {}"
 | 
			
		||||
            raise ZulipLDAPExceptionNoMatchingLDAPUser(
 | 
			
		||||
                error_message.format(result, username)
 | 
			
		||||
                error_message.format(result, username),
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
        return result
 | 
			
		||||
@@ -870,7 +870,7 @@ def query_ldap(email: str) -> List[str]:
 | 
			
		||||
        ldap_attrs = _LDAPUser(backend, ldap_username).attrs
 | 
			
		||||
 | 
			
		||||
        for django_field, ldap_field in settings.AUTH_LDAP_USER_ATTR_MAP.items():
 | 
			
		||||
            value = ldap_attrs.get(ldap_field, ["LDAP field not present", ])[0]
 | 
			
		||||
            value = ldap_attrs.get(ldap_field, ["LDAP field not present"])[0]
 | 
			
		||||
            if django_field == "avatar":
 | 
			
		||||
                if isinstance(value, bytes):
 | 
			
		||||
                    value = "(An avatar image file)"
 | 
			
		||||
@@ -1316,7 +1316,7 @@ def social_auth_finish(backend: Any,
 | 
			
		||||
        multiuse_object_key=multiuse_object_key,
 | 
			
		||||
        full_name_validated=full_name_validated,
 | 
			
		||||
        mobile_flow_otp=mobile_flow_otp,
 | 
			
		||||
        desktop_flow_otp=desktop_flow_otp
 | 
			
		||||
        desktop_flow_otp=desktop_flow_otp,
 | 
			
		||||
    )
 | 
			
		||||
    if user_profile is None:
 | 
			
		||||
        data_dict.update(dict(full_name=full_name, email=email_address))
 | 
			
		||||
@@ -1461,7 +1461,7 @@ class GitHubAuthBackend(SocialAuthMixin, GithubOAuth2):
 | 
			
		||||
        if team_id is None and org_name is None:
 | 
			
		||||
            # I believe this can't raise AuthFailed, so we don't try to catch it here.
 | 
			
		||||
            return super().user_data(
 | 
			
		||||
                access_token, *args, **kwargs
 | 
			
		||||
                access_token, *args, **kwargs,
 | 
			
		||||
            )
 | 
			
		||||
        elif team_id is not None:
 | 
			
		||||
            backend = GithubTeamOAuth2(self.strategy, self.redirect_uri)
 | 
			
		||||
@@ -1885,7 +1885,7 @@ class SAMLAuthBackend(SocialAuthMixin, SAMLAuth):
 | 
			
		||||
            settings.SOCIAL_AUTH_SAML_ORG_INFO,
 | 
			
		||||
            settings.SOCIAL_AUTH_SAML_TECHNICAL_CONTACT,
 | 
			
		||||
            settings.SOCIAL_AUTH_SAML_SUPPORT_CONTACT,
 | 
			
		||||
            settings.SOCIAL_AUTH_SAML_ENABLED_IDPS
 | 
			
		||||
            settings.SOCIAL_AUTH_SAML_ENABLED_IDPS,
 | 
			
		||||
        ]
 | 
			
		||||
        if any(not setting for setting in obligatory_saml_settings_list):
 | 
			
		||||
            return redirect_to_config_error("saml")
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user