Loading django/contrib/admin/options.py +1 −1 Original line number Diff line number Diff line Loading @@ -328,7 +328,7 @@ class BaseModelAdmin(six.with_metaclass(forms.MediaDefiningClass)): """ # We access the property and check if it triggers a warning. # If it does, then it's ours and we can safely ignore it, but if # it doesn't then it has been overriden so we must warn about the # it doesn't then it has been overridden so we must warn about the # deprecation. with warnings.catch_warnings(record=True) as w: warnings.simplefilter("always") Loading django/contrib/auth/tests/test_decorators.py +2 −2 Original line number Diff line number Diff line Loading @@ -89,7 +89,7 @@ class PermissionsRequiredDecoratorTest(TestCase): def test_permissioned_denied_redirect(self): @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existant-permission']) @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existent-permission']) def a_view(request): return HttpResponse() request = self.factory.get('/rand') Loading @@ -99,7 +99,7 @@ class PermissionsRequiredDecoratorTest(TestCase): def test_permissioned_denied_exception_raised(self): @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existant-permission'], raise_exception=True) @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existent-permission'], raise_exception=True) def a_view(request): return HttpResponse() request = self.factory.get('/rand') Loading django/contrib/auth/tests/test_forms.py +1 −1 Original line number Diff line number Diff line Loading @@ -388,7 +388,7 @@ class PasswordResetFormTest(TestCase): def test_nonexistant_email(self): """ Test nonexistant email address. This should not fail because it would Test nonexistent email address. This should not fail because it would expose information about registered users. """ data = {'email': 'foo@bar.com'} Loading django/contrib/auth/tests/test_views.py +1 −1 Original line number Diff line number Diff line Loading @@ -231,7 +231,7 @@ class PasswordResetTest(AuthViewsTestCase): self.assertContains(response, "The password reset link was invalid") def test_confirm_invalid_user(self): # Ensure that we get a 200 response for a non-existant user, not a 404 # Ensure that we get a 200 response for a non-existent user, not a 404 response = self.client.get('/reset/123456/1-1/') self.assertContains(response, "The password reset link was invalid") Loading django/contrib/formtools/tests/tests.py +1 −1 Original line number Diff line number Diff line Loading @@ -94,7 +94,7 @@ class PreviewTests(TestCase): Use the client library to POST to the form with stage set to 3 to see if our forms done() method is called. Check first without the security hash, verify failure, retry with security hash and verify sucess. hash and verify success. """ # Pass strings for form submittal and add stage variable to Loading Loading
django/contrib/admin/options.py +1 −1 Original line number Diff line number Diff line Loading @@ -328,7 +328,7 @@ class BaseModelAdmin(six.with_metaclass(forms.MediaDefiningClass)): """ # We access the property and check if it triggers a warning. # If it does, then it's ours and we can safely ignore it, but if # it doesn't then it has been overriden so we must warn about the # it doesn't then it has been overridden so we must warn about the # deprecation. with warnings.catch_warnings(record=True) as w: warnings.simplefilter("always") Loading
django/contrib/auth/tests/test_decorators.py +2 −2 Original line number Diff line number Diff line Loading @@ -89,7 +89,7 @@ class PermissionsRequiredDecoratorTest(TestCase): def test_permissioned_denied_redirect(self): @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existant-permission']) @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existent-permission']) def a_view(request): return HttpResponse() request = self.factory.get('/rand') Loading @@ -99,7 +99,7 @@ class PermissionsRequiredDecoratorTest(TestCase): def test_permissioned_denied_exception_raised(self): @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existant-permission'], raise_exception=True) @permission_required(['auth.add_customuser', 'auth.change_customuser', 'non-existent-permission'], raise_exception=True) def a_view(request): return HttpResponse() request = self.factory.get('/rand') Loading
django/contrib/auth/tests/test_forms.py +1 −1 Original line number Diff line number Diff line Loading @@ -388,7 +388,7 @@ class PasswordResetFormTest(TestCase): def test_nonexistant_email(self): """ Test nonexistant email address. This should not fail because it would Test nonexistent email address. This should not fail because it would expose information about registered users. """ data = {'email': 'foo@bar.com'} Loading
django/contrib/auth/tests/test_views.py +1 −1 Original line number Diff line number Diff line Loading @@ -231,7 +231,7 @@ class PasswordResetTest(AuthViewsTestCase): self.assertContains(response, "The password reset link was invalid") def test_confirm_invalid_user(self): # Ensure that we get a 200 response for a non-existant user, not a 404 # Ensure that we get a 200 response for a non-existent user, not a 404 response = self.client.get('/reset/123456/1-1/') self.assertContains(response, "The password reset link was invalid") Loading
django/contrib/formtools/tests/tests.py +1 −1 Original line number Diff line number Diff line Loading @@ -94,7 +94,7 @@ class PreviewTests(TestCase): Use the client library to POST to the form with stage set to 3 to see if our forms done() method is called. Check first without the security hash, verify failure, retry with security hash and verify sucess. hash and verify success. """ # Pass strings for form submittal and add stage variable to Loading