Skip to content

Commit 989bf7b

Browse files
Merge pull request #2271 from VWS-Python/more-kwargs
Use more keyword arguments - better typecheck errors
2 parents 14e4bbb + beb43df commit 989bf7b

18 files changed

+40
-38
lines changed

admin/create_secrets_files.py

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,9 @@
4848
driver = webdriver.Chrome()
4949
file = files_to_create[-1]
5050
sys.stdout.write(f"Creating database {file.name}\n")
51-
time = datetime.datetime.now(tz=datetime.UTC).strftime("%Y-%m-%d-%H-%M-%S")
51+
time = datetime.datetime.now(tz=datetime.UTC).strftime(
52+
format="%Y-%m-%d-%H-%M-%S",
53+
)
5254
license_name = f"my-license-{time}"
5355
database_name = f"my-database-{time}"
5456

@@ -85,7 +87,7 @@
8587
driver = None
8688

8789
file_contents = textwrap.dedent(
88-
f"""\
90+
text=f"""\
8991
VUFORIA_TARGET_MANAGER_DATABASE_NAME={database_details["database_name"]}
9092
VUFORIA_SERVER_ACCESS_KEY={database_details["server_access_key"]}
9193
VUFORIA_SERVER_SECRET_KEY={database_details["server_secret_key"]}

ci/custom_linters.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def _ci_patterns(*, repository_root: Path) -> set[str]:
1515
Return the CI patterns given in the CI configuration file.
1616
"""
1717
ci_file = repository_root / ".github" / "workflows" / "ci.yml"
18-
github_workflow_config = yaml.safe_load(ci_file.read_text())
18+
github_workflow_config = yaml.safe_load(stream=ci_file.read_text())
1919
matrix = github_workflow_config["jobs"]["build"]["strategy"]["matrix"]
2020
ci_pattern_list = matrix["ci_pattern"]
2121
ci_patterns = set(ci_pattern_list)

src/mock_vws/_query_tools.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ def get_query_match_response_text(
5050
parser = MultiPartParser()
5151
fields, files = parser.parse(
5252
stream=io.BytesIO(initial_bytes=request_body),
53-
boundary=boundary.encode("utf-8"),
53+
boundary=boundary.encode(encoding="utf-8"),
5454
content_length=len(request_body),
5555
)
5656

@@ -103,8 +103,8 @@ def get_query_match_response_text(
103103
application_metadata = None
104104
else:
105105
application_metadata = base64.b64encode(
106-
decode_base64(encoded_data=target.application_metadata),
107-
).decode("ascii")
106+
s=decode_base64(encoded_data=target.application_metadata),
107+
).decode(encoding="ascii")
108108
target_data = {
109109
"target_timestamp": int(target_timestamp),
110110
"name": target.name,

src/mock_vws/_query_validators/fields_validators.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ def validate_extra_fields(
3737
parser = MultiPartParser()
3838
fields, files = parser.parse(
3939
stream=io.BytesIO(initial_bytes=request_body),
40-
boundary=boundary.encode("utf-8"),
40+
boundary=boundary.encode(encoding="utf-8"),
4141
content_length=len(request_body),
4242
)
4343
parsed_keys = fields.keys() | files.keys()

src/mock_vws/_query_validators/image_validators.py

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ def validate_image_field_given(
4242
parser = MultiPartParser()
4343
_, files = parser.parse(
4444
stream=io.BytesIO(initial_bytes=request_body),
45-
boundary=boundary.encode("utf-8"),
45+
boundary=boundary.encode(encoding="utf-8"),
4646
content_length=len(request_body),
4747
)
4848
if files.get("image") is not None:
@@ -74,7 +74,7 @@ def validate_image_file_size(
7474
parser = MultiPartParser()
7575
_, files = parser.parse(
7676
stream=io.BytesIO(initial_bytes=request_body),
77-
boundary=boundary.encode("utf-8"),
77+
boundary=boundary.encode(encoding="utf-8"),
7878
content_length=len(request_body),
7979
)
8080
image_part = files["image"]
@@ -116,7 +116,7 @@ def validate_image_dimensions(
116116
parser = MultiPartParser()
117117
_, files = parser.parse(
118118
stream=io.BytesIO(initial_bytes=request_body),
119-
boundary=boundary.encode("utf-8"),
119+
boundary=boundary.encode(encoding="utf-8"),
120120
content_length=len(request_body),
121121
)
122122
image_part = files["image"]
@@ -154,7 +154,7 @@ def validate_image_format(
154154
parser = MultiPartParser()
155155
_, files = parser.parse(
156156
stream=io.BytesIO(initial_bytes=request_body),
157-
boundary=boundary.encode("utf-8"),
157+
boundary=boundary.encode(encoding="utf-8"),
158158
content_length=len(request_body),
159159
)
160160
image_part = files["image"]
@@ -188,7 +188,7 @@ def validate_image_is_image(
188188
parser = MultiPartParser()
189189
_, files = parser.parse(
190190
stream=io.BytesIO(initial_bytes=request_body),
191-
boundary=boundary.encode("utf-8"),
191+
boundary=boundary.encode(encoding="utf-8"),
192192
content_length=len(request_body),
193193
)
194194
image_part = files["image"]

src/mock_vws/_query_validators/include_target_data_validators.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ def validate_include_target_data(
3838
parser = MultiPartParser()
3939
fields, _ = parser.parse(
4040
stream=io.BytesIO(initial_bytes=request_body),
41-
boundary=boundary.encode("utf-8"),
41+
boundary=boundary.encode(encoding="utf-8"),
4242
content_length=len(request_body),
4343
)
4444
include_target_data = fields.get("include_target_data", "top")

src/mock_vws/_query_validators/num_results_validators.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ def validate_max_num_results(
4444
parser = MultiPartParser()
4545
fields, _ = parser.parse(
4646
stream=io.BytesIO(initial_bytes=request_body),
47-
boundary=boundary.encode("utf-8"),
47+
boundary=boundary.encode(encoding="utf-8"),
4848
content_length=len(request_body),
4949
)
5050
max_num_results = fields.get("max_num_results", "1")

src/mock_vws/_services_validators/key_validators.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ def validate_keys(
139139
route
140140
for route in routes
141141
if re.match(
142-
pattern=re.compile(f"{route.path_pattern}$"),
142+
pattern=re.compile(pattern=f"{route.path_pattern}$"),
143143
string=request_path,
144144
)
145145
and request_method in route.http_methods

src/mock_vws/image_matchers.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,12 +98,12 @@ def __call__(
9898
2,
9999
0,
100100
1,
101-
).unsqueeze(0)
101+
).unsqueeze(dim=0)
102102
second_image_tensor_batch_dimension = second_image_tensor.permute(
103103
2,
104104
0,
105105
1,
106-
).unsqueeze(0)
106+
).unsqueeze(dim=0)
107107

108108
ssim = StructuralSimilarityIndexMeasure(data_range=1.0)
109109
ssim_value = ssim(

src/mock_vws/target_raters.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ def _get_brisque_target_tracking_rating(*, image_content: bytes) -> int:
3535
image.size[0],
3636
len(image.getbands()),
3737
)
38-
image_tensor = image_tensor.permute(2, 0, 1).unsqueeze(0)
38+
image_tensor = image_tensor.permute(2, 0, 1).unsqueeze(dim=0)
3939
try:
4040
brisque_score = piq.brisque(x=image_tensor, data_range=255)
4141
except (AssertionError, IndexError):

0 commit comments

Comments
 (0)