#158 Fix failing tests
Merged 2 years ago by humaton. Opened 2 years ago by lenkaseg.
lenkaseg/pagure-dist-git fix_tests  into  master

file modified
+3 -3
@@ -17,7 +17,7 @@ 

  

  

  class AnityaForm(pagure.forms.PagureForm):

-     """ Form to configure taiga for a project. """

+     """Form to configure taiga for a project."""

  

      anitya_status = wtforms.SelectField(

          "Monitoring status of the package in anitya",
@@ -35,7 +35,7 @@ 

  

  

  class OrphanReasonForm(pagure.forms.PagureForm):

-     """ Form for orphaning reason. """

+     """Form for orphaning reason."""

  

      orphan_reason = wtforms.SelectField(

          "Reason for orphaning package",
@@ -58,7 +58,7 @@ 

  

  

  class BZOverrideForm(pagure.forms.PagureForm):

-     """ Form to configure the Fedora/EPEL maintainer for a project. """

+     """Form to configure the Fedora/EPEL maintainer for a project."""

  

      fedora_assignee = wtforms.StringField(

          "Maintainer name", [wtforms.validators.optional(strip_whitespace=True)]

file modified
+36 -47
@@ -136,11 +136,9 @@ 

          "rpms": "rpm",

          "modules": "module",

          "container": "container",

-         "flatpaks": "flatpak"

+         "flatpaks": "flatpak",

      }

-     to_pdc_namespace = (

-         flask.current_app.config.get("PDC_NAMESPACES") or to_pdc_namespace

-     )

+     to_pdc_namespace = flask.current_app.config.get("PDC_NAMESPACES") or to_pdc_namespace

  

      try:

          pdc_namespace = to_pdc_namespace[namespace]
@@ -148,8 +146,7 @@ 

          raise pagure.exceptions.APIError(

              500,

              error_code=APIERROR.ENOCODE,

-             error="Namespace: %s could not be converted to a PDC namespace"

-             % namespace,

+             error="Namespace: %s could not be converted to a PDC namespace" % namespace,

          )

  

      branch = "master"
@@ -184,9 +181,7 @@ 

              error="The output of %s could not be converted to JSON" % req.url,

          )

  

-     _log.info(

-         "%s/%s is active: %s", namespace, name, data["results"][0]["active"]

-     )

+     _log.info("%s/%s is active: %s", namespace, name, data["results"][0]["active"])

      return data["results"][0]["active"] is True

  

  
@@ -221,7 +216,11 @@ 

          output["orphan"] = True

          if repo.orphan_reason:

              output["reason"] = repo.orphan_reason.reason

-             output["reason_info"] = repo.orphan_reason.reason_info

+             output["reason_info"] = (

+                 ""

+                 if repo.orphan_reason.reason_info is None

+                 else repo.orphan_reason.reason_info

+             )

      return flask.jsonify(output)

  

  
@@ -267,9 +266,7 @@ 

      repo = _get_repo(repo, namespace=namespace)

      _check_token(repo, project_token=False)

  

-     user_obj = pagure.lib.query.get_user(

-         flask.g.session, flask.g.fas_user.username

-     )

+     user_obj = pagure.lib.query.get_user(flask.g.session, flask.g.fas_user.username)

      if not user_obj:

          raise pagure.exceptions.APIError(404, error_code=APIERROR.ENOUSER)

  
@@ -278,8 +275,7 @@ 

              401, error_code=APIERROR.EMODIFYPROJECTNOTALLOWED

          )

  

-     if repo.user.user != flask.g.fas_user.username \

-             and not pagure.utils.is_admin():

+     if repo.user.user != flask.g.fas_user.username and not pagure.utils.is_admin():

          raise pagure.exceptions.APIError(

              401, error_code=APIERROR.EMODIFYPROJECTNOTALLOWED

          )
@@ -299,9 +295,7 @@ 

                  reason_info=form.orphan_reason_info.data,

              )

              flask.g.session.add(reason)

-             pagure.lib.query.set_project_owner(

-                 flask.g.session, repo, orphan_user_obj

-             )

+             pagure.lib.query.set_project_owner(flask.g.session, repo, orphan_user_obj)

              if user_obj in repo.users:

                  pagure.lib.query.remove_user_of_project(

                      flask.g.session, user_obj, repo, user_obj.user
@@ -343,9 +337,7 @@ 

      repo = _get_repo(repo, namespace=namespace)

      _check_token(repo, project_token=False)

  

-     user_obj = pagure.lib.query.get_user(

-         flask.g.session, flask.g.fas_user.username

-     )

+     user_obj = pagure.lib.query.get_user(flask.g.session, flask.g.fas_user.username)

      if not user_obj:

          raise pagure.exceptions.APIError(404, error_code=APIERROR.ENOUSER)

  
@@ -398,7 +390,8 @@ 

  def query_oraculum_versions(package):

      """

      Receives package versions from oraculum

-     Returns triplet: fedora-releases, updates-for-package, F%number-of-current-rawhide

+     Returns triplet: fedora-releases, updates-for-package,

+     F%number-of-current-rawhide

      """

  

      oraculum_base_url = "https://packager-dashboard.fedoraproject.org/api/"
@@ -412,8 +405,8 @@ 

          raise pagure.exceptions.APIError(

              500,

              error_code=APIERROR.ENOCODE,

-             error="This pagure instance has no ORACULUM_URL configured, please "

-             "inform your pagure administrators",

+             error="This pagure instance has no ORACULUM_URL configured,"

+             "please inform your pagure administrators",

          )

  

      _log.debug("Based ORACULUM url: %s", oraculum_url)
@@ -422,17 +415,17 @@ 

  

      if not req_releases.ok:

          raise pagure.exceptions.APIError(

-                 400,

-                 error_code=APIERROR.EINVALIDREQ,

-                 errors=["Could not call oraculum to query current Fedora Releases."],

-             )

+             400,

+             error_code=APIERROR.EINVALIDREQ,

+             errors=["Could not call oraculum to query current Fedora Releases."],

+         )

  

      if not req_versions.ok:

          raise pagure.exceptions.APIError(

-                 400,

-                 error_code=APIERROR.EINVALIDREQ,

-                 errors=["Could not call oraculum to query current package versions."],

-             )

+             400,

+             error_code=APIERROR.EINVALIDREQ,

+             errors=["Could not call oraculum to query current package versions."],

+         )

  

      versions_resp = req_versions.json()

      releases_resp = req_releases.json()
@@ -466,10 +459,12 @@ 

  

      return releases, versions, rawhide

  

+ 

  def query_bodhi_versions(repo):

      """

      Receives package versions from bodhi

-     Returns triplet: fedora-releases, updates-for-package, F%number-of-current-rawhide

+     Returns triplet: fedora-releases, updates-for-package,

+     F%number-of-current-rawhide

      """

      bodhi_base_url = "https://bodhi.fedoraproject.org/"

  
@@ -559,6 +554,7 @@ 

  

      return releases, updates, rawhide

  

+ 

  @DISTGIT_NS.route("/bodhi_updates/<namespace>/<repo>", methods=["GET"])

  @api_method

  def bodhi_updates_endpoint(namespace, repo):
@@ -570,9 +566,7 @@ 

              errors=["Namespace not supported"],

          )

  

-     _log.info(

-         "Received request for the bodhi updates of: %s/%s", namespace, repo

-     )

+     _log.info("Received request for the bodhi updates of: %s/%s", namespace, repo)

  

      repo = _get_repo(repo, namespace=namespace)

      html = pagure.utils.is_true(flask.request.args.get("html", False))
@@ -604,7 +598,8 @@ 

              else:

                  # This makes things a little slower but is needed for builds

                  # that do not go through bodhi, for example, via releng-managed

-                 # side tags (like for Fedora mass rebuilds), which bypass bodhi.

+                 # side tags (like for Fedora mass rebuilds),

+                 # which bypass bodhi.

                  if release == rawhide:

                      mdapi_release = "rawhide"

                  else:
@@ -625,9 +620,7 @@ 

                      )

                      stable = (

                          "<a href='https://koji.fedoraproject.org/koji/search?"

-                         "terms={0}&type=build&match=exact'>{0}</a>".format(

-                             build

-                         )

+                         "terms={0}&type=build&match=exact'>{0}</a>".format(build)

                      )

              testing = ""

              if updates.get(release, {}).get("testing"):
@@ -637,9 +630,7 @@ 

                          updates[release].get("testing")

                      )

                  )

-             row = row.format(

-                 release=releases[release], stable=stable, testing=testing

-             )

+             row = row.format(release=releases[release], stable=stable, testing=testing)

              html_output += row

          html_output += "</table>"

          return html_output
@@ -673,7 +664,7 @@ 

      """Updates the default assignees of this package."""

  

      def _validate_input(inputname):

-         """ Validate if the input is either an username or a group name. """

+         """Validate if the input is either an username or a group name."""

          valid = False

          if inputname.startswith("@"):

              group = pagure.lib.query.search_groups(
@@ -683,9 +674,7 @@ 

                  valid = True

  

          else:

-             user_obj = pagure.lib.query.search_user(

-                 flask.g.session, username=inputname

-             )

+             user_obj = pagure.lib.query.search_user(flask.g.session, username=inputname)

              if user_obj:

                  valid = True

  

@@ -1,20 +1,21 @@ 

  from __future__ import print_function

  

- import os

  import json

+ import os

  

  

  import pagure.lib.query

  

- import tests

  from pagure_distgit import plugin

  

+ import tests

+ 

  

  class PagureFlaskApiProjectBZOverrideTests(tests.Modeltests):

-     """ Tests the bugzilla override endpoints added in pagure-dist-git. """

+     """Tests the bugzilla override endpoints added in pagure-dist-git."""

  

      def setUp(self):

-         """ Set up the environnment, ran before every tests. """

+         """Set up the environnment, ran before every tests."""

          super(PagureFlaskApiProjectBZOverrideTests, self).setUp()

          self.session.flush()

          tests.create_projects(self.session)
@@ -24,7 +25,7 @@ 

          self._app.register_blueprint(plugin.DISTGIT_NS)

  

      def test_default_values(self):

-         """Test the default values returned by the bz overrides endpoint. """

+         """Test the default values returned by the bz overrides endpoint."""

  

          expected_result = {

              "epel_assignee": "pingou",
@@ -36,16 +37,16 @@ 

          self.assertDictEqual(data, expected_result)

  

      def test_token_missing_ACL(self):

-         """Test the bz endpoint with an API token missing the `modify_project` ACL."""

+         """Test the bz endpoint with an API token missing the `modify_project`

+         ACL.

+         """

          headers = {"Authorization": "token foo_token"}

-         output = self.app.post(

-             "/_dg/bzoverrides/somenamespace/test3", headers=headers

-         )

+         output = self.app.post("/_dg/bzoverrides/somenamespace/test3", headers=headers)

          # invalid token

          self.assertEqual(output.status_code, 401)

  

      def test_invalid_token(self):

-         """Test the bz endpoint with an invalid API token. """

+         """Test the bz endpoint with an invalid API token."""

          headers = {"Authorization": "token BBBZZZOOO"}

          datainput = {}

          output = self.app.post(
@@ -56,7 +57,7 @@ 

          self.assertEqual(output.status_code, 401)

  

      def test_change_both_assignee(self):

-         """Test the bz endpoint when changing both assignee at once. """

+         """Test the bz endpoint when changing both assignee at once."""

          headers = {"Authorization": "token aaabbbcccddd"}

          datainput = {"epel_assignee": "foo", "fedora_assignee": "foo"}

          output = self.app.post(
@@ -193,9 +194,7 @@ 

          )

          self.assertEqual(output.status_code, 200)

          data = json.loads(output.get_data(as_text=True))

-         self.assertDictEqual(

-             data, {"epel_assignee": "pingou", "fedora_assignee": "foo"}

-         )

+         self.assertDictEqual(data, {"epel_assignee": "pingou", "fedora_assignee": "foo"})

          repo = pagure.lib.query.get_authorized_project(

              self.session,

              "test3",
@@ -298,9 +297,7 @@ 

          with tests.user_set(self.app.application, user):

              # change one assignee

              datainput = {"epel_assignee": "foo"}

-             output = self.app.post(

-                 "/_dg/bzoverrides/somenamespace/test3", data=datainput

-             )

+             output = self.app.post("/_dg/bzoverrides/somenamespace/test3", data=datainput)

              self.assertEqual(output.status_code, 200)

              data = json.loads(output.get_data(as_text=True))

              self.assertDictEqual(
@@ -308,16 +305,14 @@ 

              )

  

      def test_change_fedora_assignee_logged_in(self):

-         """Test the bz endpoint when changing the Fedora assignee when logged in

-         the UI.

+         """Test the bz endpoint when changing the Fedora assignee when logged

+         in the UI.

          """

          user = tests.FakeUser(username="pingou")

          with tests.user_set(self.app.application, user):

              # change one assignee

              datainput = {"fedora_assignee": "foo"}

-             output = self.app.post(

-                 "/_dg/bzoverrides/somenamespace/test3", data=datainput

-             )

+             output = self.app.post("/_dg/bzoverrides/somenamespace/test3", data=datainput)

              self.assertEqual(output.status_code, 200)

              data = json.loads(output.get_data(as_text=True))

              self.assertDictEqual(
@@ -331,24 +326,19 @@ 

          user = tests.FakeUser(username="pingou")

          with tests.user_set(self.app.application, user):

              datainput = {"epel_assignee": "foo", "fedora_assignee": "foo"}

-             output = self.app.post(

-                 "/_dg/bzoverrides/somenamespace/test3", data=datainput

-             )

+             output = self.app.post("/_dg/bzoverrides/somenamespace/test3", data=datainput)

              self.assertEqual(output.status_code, 200)

              data = json.loads(output.get_data(as_text=True))

-             self.assertDictEqual(

-                 data, {"epel_assignee": "foo", "fedora_assignee": "foo"}

-             )

+             self.assertDictEqual(data, {"epel_assignee": "foo", "fedora_assignee": "foo"})

  

      def test_resetting_assignees_logged_in(self):

-         """Test the bz endpoint when resetting assignees when logged in the UI."""

+         """Test the bz endpoint when resetting assignees when logged

+         in the UI."""

          user = tests.FakeUser(username="pingou")

          with tests.user_set(self.app.application, user):

              # Changing one of them before the reset

              datainput = {"epel_assignee": "foo"}

-             output = self.app.post(

-                 "/_dg/bzoverrides/somenamespace/test3", data=datainput

-             )

+             output = self.app.post("/_dg/bzoverrides/somenamespace/test3", data=datainput)

              self.assertEqual(output.status_code, 200)

              data = json.loads(output.get_data(as_text=True))

              self.assertDictEqual(

@@ -1,5 +1,7 @@ 

  from __future__ import print_function

  

+ import dist_git_auth

+ 

  from mock import Mock, patch

  

  import pagure.config
@@ -17,16 +19,14 @@ 

  

  import tests

  

- import dist_git_auth

- 

  

  class DistGitAuthTests(tests.Modeltests):

-     """ Test DistGitAuth ACLs with Fedora config. """

+     """Test DistGitAuth ACLs with Fedora config."""

  

      maxDiff = None

  

      def setUp(self):

-         """ Set up the environment in which to run the tests. """

+         """Set up the environment in which to run the tests."""

          super(DistGitAuthTests, self).setUp()

  

          pagure.config.config["ACL_DEBUG"] = True
@@ -59,7 +59,7 @@ 

          self.session.commit()

  

      def tearDown(self):

-         """ Tear down the environment in which the tests ran. """

+         """Tear down the environment in which the tests ran."""

          self.dga = None

          super(DistGitAuthTests, self).tearDown()

  
@@ -99,9 +99,7 @@ 

              if msg == expect_msg:

                  found = True

          if not found:

-             raise AssertionError(

-                 "Info message '%s' expected but not found" % expect_msg

-             )

+             raise AssertionError("Info message '%s' expected but not found" % expect_msg)

  

  

  class DistGitAuthTestsGeneric(DistGitAuthTests):
@@ -357,9 +355,7 @@ 

  

      def test_unprotected_pr_required_repo_pr_only_no_pr(self):

          settings = {"pull_request_access_only": True}

-         project = self.create_namespaced_project(

-             "unprotected", "test", settings=settings

-         )

+         project = self.create_namespaced_project("unprotected", "test", settings=settings)

  

          self.assertFalse(

              self.dga.check_acl(
@@ -380,9 +376,7 @@ 

  

      def test_unprotected_pr_required_repo_pr_only(self):

          settings = {"pull_request_access_only": True}

-         project = self.create_namespaced_project(

-             "unprotected", "test", settings=settings

-         )

+         project = self.create_namespaced_project("unprotected", "test", settings=settings)

          self.assertTrue(

              self.dga.check_acl(

                  self.session,
@@ -554,9 +548,7 @@ 

          self.expect_info_msg("Unspecified ref refs/heads/f28 is blocked")

  

      @patch("dist_git_auth.requests")

-     def test_protected_unspecified_branch_normal_committer(

-         self, mock_requests

-     ):

+     def test_protected_unspecified_branch_normal_committer(self, mock_requests):

          project = self.create_namespaced_project("rpms", "test")

          res = Mock()

          res.ok = True
@@ -581,9 +573,7 @@ 

          self.expect_info_msg("Unspecified branch push")

  

      @patch("dist_git_auth.requests")

-     def test_protected_unspecified_branch_normal_non_committer(

-         self, mock_requests

-     ):

+     def test_protected_unspecified_branch_normal_non_committer(self, mock_requests):

          project = self.create_namespaced_project("rpms", "test")

          res = Mock()

          res.ok = True
@@ -665,9 +655,7 @@ 

          self.expect_info_msg("Fall-through deny")

  

      @patch("dist_git_auth.requests")

-     def test_protected_unspecified_branch_collaborator_valid_branch(

-         self, mock_requests

-     ):

+     def test_protected_unspecified_branch_collaborator_valid_branch(self, mock_requests):

          project = get_project(self.session, name="test", namespace="rpms")

          res = Mock()

          res.ok = True
@@ -869,9 +857,7 @@ 

          "RCM_BRANCHES": ["refs/heads/f[0-9]+"],

          "ACL_PROTECTED_NAMESPACES": ["rpms", "modules", "container"],

          "PDC_URL": "invalid://",

-         "PDC_BRANCH_OVERRIDES": {

-             "rpms": {"refs/heads/main": "refs/heads/rawhide"}

-         },

+         "PDC_BRANCH_OVERRIDES": {"rpms": {"refs/heads/main": "refs/heads/rawhide"}},

      }

  

      def setUp(self):
@@ -957,9 +943,7 @@ 

  

      @patch("dist_git_auth.requests")

      def test_pushing_to_containers_calls_pdc_correctly(self, mock_requests):

-         project = get_project(

-             self.session, name="cockpit", namespace="container"

-         )

+         project = get_project(self.session, name="cockpit", namespace="container")

          res = Mock()

          res.ok = True

          res.json.return_value = {"results": []}

@@ -1,31 +1,30 @@ 

  import json

  import os

- from unittest.mock import patch, MagicMock

+ from unittest.mock import MagicMock, patch

  

  import pagure.lib.model

  import pagure.lib.query

- import pygit2

  

  from pagure_distgit import model

  from pagure_distgit import plugin

  

+ import pygit2

+ 

  import tests

  

  

  class PagureFlaskApiOrphanEndpointTests(tests.Modeltests):

-     """ Tests the orphan endpoint added in pagure-dist-git. """

+     """Tests the orphan endpoint added in pagure-dist-git."""

  

      def setUp(self):

-         """ Set up the environnment, ran before every tests. """

+         """Set up the environnment, ran before every tests."""

          super(PagureFlaskApiOrphanEndpointTests, self).setUp()

          self.session.flush()

          tests.create_projects(self.session)

          tests.create_projects_git(os.path.join(self.path, "repos"), bare=True)

          tests.create_tokens(self.session)

          tests.create_tokens_acl(self.session)

-         tests.create_user(

-             self.session, "orphan", "orphan", ["orphan@fedoraproject.org"]

-         )

+         tests.create_user(self.session, "orphan", "orphan", ["orphan@fedoraproject.org"])

          repo = pagure.lib.query.get_authorized_project(

              self.session,

              "test3",
@@ -38,16 +37,16 @@ 

          self._app.register_blueprint(plugin.DISTGIT_NS)

  

      def test_token_missing_ACL(self):

-         """Test the orphan endpoint with an API token missing the `modify_project` ACL."""

+         """Test the orphan endpoint with an API token missing the

+         `modify_project` ACL.

+         """

          headers = {"Authorization": "token foo_token"}

-         output = self.app.post(

-             "/_dg/orphan/somenamespace/test3", headers=headers

-         )

+         output = self.app.post("/_dg/orphan/somenamespace/test3", headers=headers)

          # invalid token

          assert output.status_code == 401

  

      def test_invalid_token(self):

-         """Test the orphan endpoint with an invalid API token. """

+         """Test the orphan endpoint with an invalid API token."""

          headers = {"Authorization": "token BBBZZZOOO"}

          datainput = {}

          output = self.app.post(
@@ -187,19 +186,17 @@ 

  

  

  class PagureFlaskApiOrphanGetEndpointTests(tests.Modeltests):

-     """ Tests the orphan get endpoint added in pagure-dist-git. """

+     """Tests the orphan get endpoint added in pagure-dist-git."""

  

      def setUp(self):

-         """ Set up the environnment, ran before every tests. """

+         """Set up the environnment, ran before every tests."""

          super(PagureFlaskApiOrphanGetEndpointTests, self).setUp()

          self.session.flush()

          tests.create_projects(self.session)

          tests.create_projects_git(os.path.join(self.path, "repos"), bare=True)

          tests.create_tokens(self.session)

          tests.create_tokens_acl(self.session)

-         tests.create_user(

-             self.session, "orphan", "orphan", ["orphan@fedoraproject.org"]

-         )

+         tests.create_user(self.session, "orphan", "orphan", ["orphan@fedoraproject.org"])

          repo = pagure.lib.query.get_authorized_project(

              self.session,

              "test3",
@@ -274,19 +271,17 @@ 

  

  

  class PagureFlaskApiTakeOrphanEndpointTests(tests.Modeltests):

-     """ Tests the take orphan endpoint added in pagure-dist-git. """

+     """Tests the take orphan endpoint added in pagure-dist-git."""

  

      def setUp(self):

-         """ Set up the environnment, ran before every tests. """

+         """Set up the environnment, ran before every tests."""

          super(PagureFlaskApiTakeOrphanEndpointTests, self).setUp()

          self.session.flush()

          tests.create_projects(self.session)

          tests.create_projects_git(os.path.join(self.path, "repos"), bare=True)

          tests.create_tokens(self.session)

          tests.create_tokens_acl(self.session)

-         tests.create_user(

-             self.session, "orphan", "orphan", ["orphan@fedoraproject.org"]

-         )

+         tests.create_user(self.session, "orphan", "orphan", ["orphan@fedoraproject.org"])

          pagure.lib.query.add_group(

              self.session,

              "packager",
@@ -353,7 +348,7 @@ 

          assert output.status_code == 401

  

      def test_invalid_token(self):

-         """Test the take orphan endpoint with an invalid API token. """

+         """Test the take orphan endpoint with an invalid API token."""

          headers = {"Authorization": "token BBBZZZOOO"}

          output = self.app.post(

              "/_dg/take_orphan/somenamespace/test3",

@@ -11,7 +11,7 @@ 

  

  """

  

- from __future__ import unicode_literals, absolute_import

+ from __future__ import absolute_import, unicode_literals

  

  import os

  import subprocess
@@ -35,13 +35,14 @@ 

          This test runs flake8 on the code, and will fail if it returns a

          non-zero exit code.

          """

-         # We ignore E712, which disallows non-identity comparisons with True and False

+         # We ignore E712, which disallows non-identity comparisons with True

+         # and False

          # We ignore W503, which disallows line break before binary operator

          flake8_command = [

              sys.executable,

              "-m",

              "flake8",

-             "--ignore=E712,W503,E203",

+             "--ignore=E501,E712,W503,E203",

              REPO_PATH,

          ]

  
@@ -60,9 +61,7 @@ 

          if old_flake:

              raise unittest.SkipTest("Flake8 version too old to be useful")

  

-         proc = subprocess.Popen(

-             flake8_command, stdout=subprocess.PIPE, cwd=REPO_PATH

-         )

+         proc = subprocess.Popen(flake8_command, stdout=subprocess.PIPE, cwd=REPO_PATH)

          print(proc.communicate())

  

          self.assertEqual(proc.returncode, 0)
@@ -82,10 +81,10 @@ 

              "-m",

              "black",

              "-l",

-             "79",

+             "90",

              "--check",

              "--exclude",

-             '"/(\.eggs|\.git|\.hg|\.mypy_cache|\.nox|\.tox|\.venv|'

+             r'"/(\.eggs|\.git|\.hg|\.mypy_cache|\.nox|\.tox|\.venv|'

              '_build|buck-out|build|dist)/"',  # noqa

              REPO_PATH,

              TESTS_PATH,

Some tests were failing in master branch.

  • Fix tests failing on style changes (black and flake8)
  • Fix tests failing on empty reason_info in orphaning packages

Now all the tests are passing.

Pull-Request has been merged by humaton

2 years ago