mirror of
https://github.com/django/django.git
synced 2025-08-04 10:59:45 +00:00
Refs #33476 -- Refactored code to strictly match 88 characters line length.
This commit is contained in:
parent
9c19aff7c7
commit
7119f40c98
404 changed files with 5944 additions and 2842 deletions
|
@ -319,7 +319,10 @@ class BasicExpressionsTests(TestCase):
|
|||
|
||||
def test_object_create_with_aggregate(self):
|
||||
# Aggregates are not allowed when inserting new data
|
||||
msg = "Aggregate functions are not allowed in this query (num_employees=Max(Value(1)))."
|
||||
msg = (
|
||||
"Aggregate functions are not allowed in this query "
|
||||
"(num_employees=Max(Value(1)))."
|
||||
)
|
||||
with self.assertRaisesMessage(FieldError, msg):
|
||||
Company.objects.create(
|
||||
name="Company",
|
||||
|
@ -1059,9 +1062,10 @@ class IterableLookupInnerExpressionsTests(TestCase):
|
|||
|
||||
@unittest.skipUnless(
|
||||
connection.vendor == "sqlite",
|
||||
"This defensive test only works on databases that don't validate parameter types",
|
||||
"This defensive test only works on databases that don't validate parameter "
|
||||
"types",
|
||||
)
|
||||
def test_complex_expressions_do_not_introduce_sql_injection_via_untrusted_string_inclusion(
|
||||
def test_expressions_not_introduce_sql_injection_via_untrusted_string_inclusion(
|
||||
self,
|
||||
):
|
||||
"""
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue