Skip to content

Commit f80ccf3

Browse files
committed
🎨 Black format all
1 parent b3847b4 commit f80ccf3

File tree

7 files changed

+67
-27
lines changed

7 files changed

+67
-27
lines changed

{{cookiecutter.project_slug}}/backend/app/app/api/api_v1/endpoints/role.py

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,14 @@
1313
from app.core import config
1414
from app.db.flask_session import db_session
1515
from app.core.celery_app import celery_app
16-
from app.db.utils import (check_if_user_is_active, check_if_user_is_superuser, get_role_by_name, create_role, get_roles, get_user_roles)
16+
from app.db.utils import (
17+
check_if_user_is_active,
18+
check_if_user_is_superuser,
19+
get_role_by_name,
20+
create_role,
21+
get_roles,
22+
get_user_roles,
23+
)
1724

1825
# Import Schemas
1926
from app.schemas.role import RoleSchema

{{cookiecutter.project_slug}}/backend/app/app/api/api_v1/endpoints/user.py

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,16 @@
1313
from app.core.security import pwd_context
1414
from app.db.flask_session import db_session
1515
from app.core.celery_app import celery_app
16-
from app.db.utils import check_if_user_is_active, check_if_user_is_superuser, get_users, get_user_by_username, create_user, get_user_by_id, get_role_by_id, assign_role_to_user
16+
from app.db.utils import (
17+
check_if_user_is_active,
18+
check_if_user_is_superuser,
19+
get_users,
20+
get_user_by_username,
21+
create_user,
22+
get_user_by_id,
23+
get_role_by_id,
24+
assign_role_to_user,
25+
)
1726

1827
from app.main import app
1928

@@ -26,11 +35,7 @@
2635

2736

2837
@docs.register
29-
@doc(
30-
description="Retrieve the users",
31-
security=security_params,
32-
tags=["users"],
33-
)
38+
@doc(description="Retrieve the users", security=security_params, tags=["users"])
3439
@app.route(f"{config.API_V1_STR}/users/", methods=["GET"])
3540
@marshal_with(UserSchema(many=True))
3641
@jwt_required
@@ -61,9 +66,7 @@ def route_users_get():
6166
)
6267
@marshal_with(UserSchema())
6368
@jwt_required
64-
def route_users_post(
65-
email=None, password=None, first_name=None, last_name=None,
66-
):
69+
def route_users_post(email=None, password=None, first_name=None, last_name=None):
6770
current_user = get_current_user()
6871

6972
if not current_user:
@@ -79,9 +82,10 @@ def route_users_post(
7982
return abort(
8083
400, f"The user with this email already exists in the system: {email}"
8184
)
82-
user = create_user(db_session, email, password, first_name, last_name )
85+
user = create_user(db_session, email, password, first_name, last_name)
8386
return user
8487

88+
8589
@docs.register
8690
@doc(description="Create new user without the need to be logged in", tags=["users"])
8791
@app.route(f"{config.API_V1_STR}/users/open", methods=["POST"])
@@ -94,12 +98,10 @@ def route_users_post(
9498
}
9599
)
96100
@marshal_with(UserSchema())
97-
def route_users_post_open(
98-
email=None, password=None, first_name=None, last_name=None,
99-
):
101+
def route_users_post_open(email=None, password=None, first_name=None, last_name=None):
100102
if not config.USERS_OPEN_REGISTRATION:
101103
abort(403, "Open user resgistration is forbidden on this server")
102-
104+
103105
user = get_user_by_username(email, db_session)
104106

105107
if user:
@@ -149,11 +151,13 @@ def route_users_id_get(user_id):
149151

150152

151153
@docs.register
152-
@doc(description="Assign a role to a user by ID", security=security_params, tags=["users"])
154+
@doc(
155+
description="Assign a role to a user by ID",
156+
security=security_params,
157+
tags=["users"],
158+
)
153159
@app.route(f"{config.API_V1_STR}/users/<int:user_id>/roles/", methods=["POST"])
154-
@use_kwargs({
155-
"role_id": fields.Int(required=True),
156-
})
160+
@use_kwargs({"role_id": fields.Int(required=True)})
157161
@marshal_with(UserSchema())
158162
@jwt_required
159163
def route_users_assign_role_post(user_id, role_id):
@@ -169,10 +173,10 @@ def route_users_assign_role_post(user_id, role_id):
169173
user = get_user_by_id(user_id, db_session)
170174
if not user:
171175
return abort(400, f"The user with id: {user_id} does not exists")
172-
176+
173177
role = get_role_by_id(role_id, db_session)
174178
if not role:
175179
return abort(400, f"The role does not exist")
176-
180+
177181
updated_user = assign_role_to_user(role, user, db_session)
178182
return updated_user

{{cookiecutter.project_slug}}/backend/app/app/core/security.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,10 @@
22

33
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
44

5+
56
def verify_password(plain_password, hashed_password):
67
return pwd_context.verify(plain_password, hashed_password)
78

9+
810
def get_password_hash(password):
911
return pwd_context.hash(password)

{{cookiecutter.project_slug}}/backend/app/app/db/init_db.py

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,19 @@
11
from app.core import config
22
from app.core.security import pwd_context
33

4-
from app.db.utils import get_role_by_name, create_role, get_user_by_username, create_user, assign_role_to_user
4+
from app.db.utils import (
5+
get_role_by_name,
6+
create_role,
7+
get_user_by_username,
8+
create_user,
9+
assign_role_to_user,
10+
)
511
from app.core.security import get_password_hash
612

713
from app.models.user import User
814
from app.models.role import Role
915

16+
1017
def init_db(db_session):
1118
# Tables should be created with Alembic migrations
1219
# But if you don't want to use migrations, create
@@ -19,5 +26,10 @@ def init_db(db_session):
1926

2027
user = get_user_by_username(config.FIRST_SUPERUSER, db_session)
2128
if not user:
22-
user = create_user(db_session, config.FIRST_SUPERUSER, config.FIRST_SUPERUSER_PASSWORD, is_superuser=True)
29+
user = create_user(
30+
db_session,
31+
config.FIRST_SUPERUSER,
32+
config.FIRST_SUPERUSER_PASSWORD,
33+
is_superuser=True,
34+
)
2335
assign_role_to_user(role, user, db_session)

{{cookiecutter.project_slug}}/backend/app/app/db/utils.py

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,36 +2,45 @@
22
from app.models.role import Role
33
from app.core.security import get_password_hash
44

5+
56
def get_user(username, db_session):
67
return db_session.query(User).filter(User.id == username).first()
78

9+
810
def check_if_user_is_active(user):
911
return user.is_active
1012

13+
1114
def check_if_user_is_superuser(user):
1215
return user.is_superuser
1316

17+
1418
def check_if_username_is_active(username, db_session):
1519
user = get_user(username, db_session)
1620
return check_if_user_is_active(user)
1721

22+
1823
def get_role_by_name(name, db_session):
1924
role = db_session.query(Role).filter(Role.name == name).first()
2025
return role
2126

27+
2228
def get_role_by_id(role_id, db_session):
2329
role = db_session.query(Role).filter(Role.id == role_id).first()
2430
return role
2531

32+
2633
def create_role(name, db_session):
2734
role = Role(name=name)
2835
db_session.add(role)
2936
db_session.commit()
3037
return role
3138

39+
3240
def get_roles(db_session):
3341
return db_session.query(Role).all()
3442

43+
3544
def get_user_roles(user):
3645
return user.roles
3746

@@ -40,21 +49,27 @@ def get_user_by_username(username, db_session) -> User:
4049
user = db_session.query(User).filter(User.email == username).first() # type: User
4150
return user
4251

52+
4353
def get_user_by_id(user_id, db_session):
4454
user = db_session.query(User).filter(User.id == user_id).first() # type: User
4555
return user
4656

57+
4758
def get_user_hashed_password(user):
4859
return user.password
4960

5061

5162
def get_user_id(user):
5263
return user.id
5364

65+
5466
def get_users(db_session):
5567
return db_session.query(User).all()
5668

57-
def create_user(db_session, username, password, first_name=None, last_name=None, is_superuser=False):
69+
70+
def create_user(
71+
db_session, username, password, first_name=None, last_name=None, is_superuser=False
72+
):
5873
user = User(
5974
email=username,
6075
password=get_password_hash(password),
@@ -67,6 +82,7 @@ def create_user(db_session, username, password, first_name=None, last_name=None,
6782
db_session.refresh(user)
6883
return user
6984

85+
7086
def assign_role_to_user(role: Role, user: User, db_session):
7187
user.roles.append(role)
7288
db_session.add(user)

{{cookiecutter.project_slug}}/backend/app/app/models/role.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,4 @@ class Role(Base):
1616
created_at = Column(DateTime, default=datetime.utcnow(), index=True)
1717
name = Column(String, index=True)
1818
# Relationships
19-
users = relationship(
20-
"User", secondary=users_roles, back_populates="roles"
21-
)
19+
users = relationship("User", secondary=users_roles, back_populates="roles")

{{cookiecutter.project_slug}}/backend/app/app/tests/api/api_v1/user/test_user.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ def test_get_users_superuser_me(superuser_token_headers):
2020
assert current_user["email"] == config.FIRST_SUPERUSER
2121
assert current_user["is_superuser"] is True
2222

23+
2324
def test_create_user_new_email(superuser_token_headers):
2425
server_api = get_server_api()
2526
username = random_lower_string()

0 commit comments

Comments
 (0)