From b44892a6e06e26edc289707b3d5b6b2f469ef148 Mon Sep 17 00:00:00 2001 From: Valbou Date: Sat, 7 Oct 2023 17:57:37 +0200 Subject: [PATCH] #11 fix black --- .../services/test_permissions_service.py | 22 +++++++++++-------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/tests/users/services/test_permissions_service.py b/tests/users/services/test_permissions_service.py index 81186d55..c4b8d6ff 100644 --- a/tests/users/services/test_permissions_service.py +++ b/tests/users/services/test_permissions_service.py @@ -184,7 +184,7 @@ def test_all_tenants_with_read_access_to_group_and_shared(self): read_roletype_tenant_ids = self.permissions_service.all_tenants_with_access( permission=Permissions.READ, user_id=self.user.id, - resource=Resources.ROLETYPE + resource=Resources.ROLETYPE, ) self.assertNotIn(self.first_group, read_roletype_tenant_ids) @@ -194,10 +194,12 @@ def test_all_tenants_with_read_access_to_group_and_shared(self): def test_all_tenants_with_create_access_to_private_group_only(self): with self.app.sql.get_session() as session: self.permissions_service = PermissionControl(session=session) - create_roletype_tenant_ids = self.permissions_service.all_tenants_with_access( - permission=Permissions.CREATE, - user_id=self.user.id, - resource=Resources.ROLETYPE + create_roletype_tenant_ids = ( + self.permissions_service.all_tenants_with_access( + permission=Permissions.CREATE, + user_id=self.user.id, + resource=Resources.ROLETYPE, + ) ) self.assertNotIn(self.first_group, create_roletype_tenant_ids) @@ -207,10 +209,12 @@ def test_all_tenants_with_create_access_to_private_group_only(self): def test_all_tenants_with_read_access_on_group_to_private_group_only(self): with self.app.sql.get_session() as session: self.permissions_service = PermissionControl(session=session) - create_roletype_tenant_ids = self.permissions_service.all_tenants_with_access( - permission=Permissions.READ, - user_id=self.user.id, - resource=Resources.GROUP + create_roletype_tenant_ids = ( + self.permissions_service.all_tenants_with_access( + permission=Permissions.READ, + user_id=self.user.id, + resource=Resources.GROUP, + ) ) self.assertNotIn(self.first_group, create_roletype_tenant_ids)