forked from loafle/openapi-generator-original
Fix another batch of spelling typos (#13915)
* Fix typos * Remove repeated words * Minor grammar fixes
This commit is contained in:
@@ -198,7 +198,7 @@ Class | Method | HTTP request | Description
|
||||
*FakeApi* | [**object_model_with_ref_props**](docs/apis/tags/FakeApi.md#object_model_with_ref_props) | **post** /fake/refs/object_model_with_ref_props |
|
||||
*FakeApi* | [**parameter_collisions**](docs/apis/tags/FakeApi.md#parameter_collisions) | **post** /fake/parameterCollisions/{1}/{aB}/{Ab}/{self}/{A-B}/ | parameter collision case
|
||||
*FakeApi* | [**query_param_with_json_content_type**](docs/apis/tags/FakeApi.md#query_param_with_json_content_type) | **get** /fake/queryParamWithJsonContentType | query param with json content-type
|
||||
*FakeApi* | [**query_parameter_collection_format**](docs/apis/tags/FakeApi.md#query_parameter_collection_format) | **put** /fake/test-query-paramters |
|
||||
*FakeApi* | [**query_parameter_collection_format**](docs/apis/tags/FakeApi.md#query_parameter_collection_format) | **put** /fake/test-query-parameters |
|
||||
*FakeApi* | [**ref_object_in_query**](docs/apis/tags/FakeApi.md#ref_object_in_query) | **get** /fake/refObjInQuery | user list
|
||||
*FakeApi* | [**response_without_schema**](docs/apis/tags/FakeApi.md#response_without_schema) | **get** /fake/responseWithoutSchema | receives a response without schema
|
||||
*FakeApi* | [**string**](docs/apis/tags/FakeApi.md#string) | **post** /fake/refs/string |
|
||||
|
||||
@@ -30,7 +30,7 @@ Method | HTTP request | Description
|
||||
[**object_model_with_ref_props**](#object_model_with_ref_props) | **post** /fake/refs/object_model_with_ref_props |
|
||||
[**parameter_collisions**](#parameter_collisions) | **post** /fake/parameterCollisions/{1}/{aB}/{Ab}/{self}/{A-B}/ | parameter collision case
|
||||
[**query_param_with_json_content_type**](#query_param_with_json_content_type) | **get** /fake/queryParamWithJsonContentType | query param with json content-type
|
||||
[**query_parameter_collection_format**](#query_parameter_collection_format) | **put** /fake/test-query-paramters |
|
||||
[**query_parameter_collection_format**](#query_parameter_collection_format) | **put** /fake/test-query-parameters |
|
||||
[**ref_object_in_query**](#ref_object_in_query) | **get** /fake/refObjInQuery | user list
|
||||
[**response_without_schema**](#response_without_schema) | **get** /fake/responseWithoutSchema | receives a response without schema
|
||||
[**string**](#string) | **post** /fake/refs/string |
|
||||
@@ -561,7 +561,7 @@ No authorization required
|
||||
|
||||
|
||||
|
||||
Ensures that original naming is used in endpoint params, that way we on't have collisions
|
||||
Ensures that original naming is used in endpoint params, that way we won't have collisions
|
||||
|
||||
### Example
|
||||
|
||||
|
||||
@@ -183,7 +183,7 @@ Key | Input Type | Accessed Type | Description | Notes
|
||||
|
||||
Find purchase order by ID
|
||||
|
||||
For valid response try integer IDs with value <= 5 or > 10. Other values will generated exceptions
|
||||
For valid response try integer IDs with value <= 5 or > 10. Other values will generate exceptions
|
||||
|
||||
### Example
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
#!/bin/sh
|
||||
# ref: https://help.github.com/articles/adding-an-existing-project-to-github-using-the-command-line/
|
||||
#
|
||||
# Usage example: /bin/sh ./git_push.sh wing328 openapi-pestore-perl "minor update" "gitlab.com"
|
||||
# Usage example: /bin/sh ./git_push.sh wing328 openapi-petstore-perl "minor update" "gitlab.com"
|
||||
|
||||
git_user_id=$1
|
||||
git_repo_id=$2
|
||||
|
||||
@@ -1250,9 +1250,9 @@ class ApiClient:
|
||||
# The HTTP signature scheme requires multiple HTTP headers
|
||||
# that are calculated dynamically.
|
||||
signing_info = self.configuration.signing_info
|
||||
querys = tuple()
|
||||
queries = tuple()
|
||||
auth_headers = signing_info.get_http_signature_headers(
|
||||
resource_path, method, headers, body, querys)
|
||||
resource_path, method, headers, body, queries)
|
||||
for key, value in auth_headers.items():
|
||||
headers.add(key, value)
|
||||
elif auth_setting['in'] == 'query':
|
||||
|
||||
@@ -34,7 +34,7 @@ from petstore_api.apis.paths.fake_body_with_query_params import FakeBodyWithQuer
|
||||
from petstore_api.apis.paths.another_fake_dummy import AnotherFakeDummy
|
||||
from petstore_api.apis.paths.fake_body_with_file_schema import FakeBodyWithFileSchema
|
||||
from petstore_api.apis.paths.fake_case_sensitive_params import FakeCaseSensitiveParams
|
||||
from petstore_api.apis.paths.fake_test_query_paramters import FakeTestQueryParamters
|
||||
from petstore_api.apis.paths.fake_test_query_parameters import FakeTestQueryParameters
|
||||
from petstore_api.apis.paths.fake_pet_id_upload_image_with_required_file import FakePetIdUploadImageWithRequiredFile
|
||||
from petstore_api.apis.paths.fake_parameter_collisions_1_a_b_ab_self_a_b_ import FakeParameterCollisions1ABAbSelfAB
|
||||
from petstore_api.apis.paths.fake_upload_file import FakeUploadFile
|
||||
@@ -86,7 +86,7 @@ PathToApi = typing_extensions.TypedDict(
|
||||
PathValues.ANOTHERFAKE_DUMMY: AnotherFakeDummy,
|
||||
PathValues.FAKE_BODYWITHFILESCHEMA: FakeBodyWithFileSchema,
|
||||
PathValues.FAKE_CASESENSITIVEPARAMS: FakeCaseSensitiveParams,
|
||||
PathValues.FAKE_TESTQUERYPARAMTERS: FakeTestQueryParamters,
|
||||
PathValues.FAKE_TESTQUERYPARAMETERS: FakeTestQueryParameters,
|
||||
PathValues.FAKE_PET_ID_UPLOAD_IMAGE_WITH_REQUIRED_FILE: FakePetIdUploadImageWithRequiredFile,
|
||||
PathValues.FAKE_PARAMETER_COLLISIONS_1_A_B_AB_SELF_AB_: FakeParameterCollisions1ABAbSelfAB,
|
||||
PathValues.FAKE_UPLOAD_FILE: FakeUploadFile,
|
||||
@@ -139,7 +139,7 @@ path_to_api = PathToApi(
|
||||
PathValues.ANOTHERFAKE_DUMMY: AnotherFakeDummy,
|
||||
PathValues.FAKE_BODYWITHFILESCHEMA: FakeBodyWithFileSchema,
|
||||
PathValues.FAKE_CASESENSITIVEPARAMS: FakeCaseSensitiveParams,
|
||||
PathValues.FAKE_TESTQUERYPARAMTERS: FakeTestQueryParamters,
|
||||
PathValues.FAKE_TESTQUERYPARAMETERS: FakeTestQueryParameters,
|
||||
PathValues.FAKE_PET_ID_UPLOAD_IMAGE_WITH_REQUIRED_FILE: FakePetIdUploadImageWithRequiredFile,
|
||||
PathValues.FAKE_PARAMETER_COLLISIONS_1_A_B_AB_SELF_AB_: FakeParameterCollisions1ABAbSelfAB,
|
||||
PathValues.FAKE_UPLOAD_FILE: FakeUploadFile,
|
||||
|
||||
@@ -0,0 +1,7 @@
|
||||
from petstore_api.paths.fake_test_query_parameters.put import ApiForput
|
||||
|
||||
|
||||
class FakeTestQueryParameters(
|
||||
ApiForput,
|
||||
):
|
||||
pass
|
||||
@@ -1,7 +0,0 @@
|
||||
from petstore_api.paths.fake_test_query_paramters.put import ApiForput
|
||||
|
||||
|
||||
class FakeTestQueryParamters(
|
||||
ApiForput,
|
||||
):
|
||||
pass
|
||||
@@ -34,7 +34,7 @@ from petstore_api.paths.fake_obj_in_query.get import ObjectInQuery
|
||||
from petstore_api.paths.fake_refs_object_model_with_ref_props.post import ObjectModelWithRefProps
|
||||
from petstore_api.paths.fake_parameter_collisions_1_a_b_ab_self_a_b_.post import ParameterCollisions
|
||||
from petstore_api.paths.fake_query_param_with_json_content_type.get import QueryParamWithJsonContentType
|
||||
from petstore_api.paths.fake_test_query_paramters.put import QueryParameterCollectionFormat
|
||||
from petstore_api.paths.fake_test_query_parameters.put import QueryParameterCollectionFormat
|
||||
from petstore_api.paths.fake_ref_obj_in_query.get import RefObjectInQuery
|
||||
from petstore_api.paths.fake_response_without_schema.get import ResponseWithoutSchema
|
||||
from petstore_api.paths.fake_refs_string.post import String
|
||||
|
||||
@@ -131,7 +131,7 @@ conf = petstore_api.Configuration(
|
||||
'Authorization' header, which is used to carry the signature.
|
||||
|
||||
One may be tempted to sign all headers by default, but in practice it rarely works.
|
||||
This is beccause explicit proxies, transparent proxies, TLS termination endpoints or
|
||||
This is because explicit proxies, transparent proxies, TLS termination endpoints or
|
||||
load balancers may add/modify/remove headers. Include the HTTP headers that you know
|
||||
are not going to be modified in transit.
|
||||
|
||||
@@ -301,7 +301,7 @@ conf = petstore_api.Configuration(
|
||||
"Invalid keyword: '{0}''".format(v))
|
||||
self._disabled_client_side_validations = s
|
||||
if name == "signing_info" and value is not None:
|
||||
# Ensure the host paramater from signing info is the same as
|
||||
# Ensure the host parameter from signing info is the same as
|
||||
# Configuration.host.
|
||||
value.host = self.host
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@
|
||||
# if you have many models here with many references from one model to another this may
|
||||
# raise a RecursionError
|
||||
# to avoid this, import only the models that you directly need like:
|
||||
# from from petstore_api.model.pet import Pet
|
||||
# from petstore_api.model.pet import Pet
|
||||
# or import this package, but before doing it, use:
|
||||
# import sys
|
||||
# sys.setrecursionlimit(n)
|
||||
|
||||
@@ -39,7 +39,7 @@ class PathValues(str, enum.Enum):
|
||||
ANOTHERFAKE_DUMMY = "/another-fake/dummy"
|
||||
FAKE_BODYWITHFILESCHEMA = "/fake/body-with-file-schema"
|
||||
FAKE_CASESENSITIVEPARAMS = "/fake/case-sensitive-params"
|
||||
FAKE_TESTQUERYPARAMTERS = "/fake/test-query-paramters"
|
||||
FAKE_TESTQUERYPARAMETERS = "/fake/test-query-parameters"
|
||||
FAKE_PET_ID_UPLOAD_IMAGE_WITH_REQUIRED_FILE = "/fake/{petId}/uploadImageWithRequiredFile"
|
||||
FAKE_PARAMETER_COLLISIONS_1_A_B_AB_SELF_AB_ = "/fake/parameterCollisions/{1}/{aB}/{Ab}/{self}/{A-B}/"
|
||||
FAKE_UPLOAD_FILE = "/fake/uploadFile"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
# do not import all endpoints into this module because that uses a lot of memory and stack frames
|
||||
# if you need the ability to import all endpoints from this module, import them with
|
||||
# from petstore_api.paths.fake_test_query_paramters import Api
|
||||
# from petstore_api.paths.fake_test_query_parameters import Api
|
||||
|
||||
from petstore_api.paths import PathValues
|
||||
|
||||
path = PathValues.FAKE_TESTQUERYPARAMTERS
|
||||
path = PathValues.FAKE_TESTQUERYPARAMETERS
|
||||
@@ -385,7 +385,7 @@ class Schema:
|
||||
_validate_oapg returns a key value pair
|
||||
where the key is the path to the item, and the value will be the required manufactured class
|
||||
made out of the matching schemas
|
||||
2. value is an instance of the the correct schema type
|
||||
2. value is an instance of the correct schema type
|
||||
the value is NOT validated by _validate_oapg, _validate_oapg only checks that the instance is of the correct schema type
|
||||
for this value, _validate_oapg does NOT return an entry for it in _path_to_schemas
|
||||
and in list/dict _get_items_oapg,_get_properties_oapg the value will be directly assigned
|
||||
@@ -868,7 +868,7 @@ class ValidatorBase:
|
||||
schema_keyword not in configuration._disabled_client_side_validations)
|
||||
|
||||
@staticmethod
|
||||
def _raise_validation_errror_message_oapg(value, constraint_msg, constraint_value, path_to_item, additional_txt=""):
|
||||
def _raise_validation_error_message_oapg(value, constraint_msg, constraint_value, path_to_item, additional_txt=""):
|
||||
raise ApiValueError(
|
||||
"Invalid value `{value}`, {constraint_msg} `{constraint_value}`{additional_txt} at {path_to_item}".format(
|
||||
value=value,
|
||||
@@ -963,7 +963,7 @@ class StrBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('maxLength', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'max_length') and
|
||||
len(arg) > cls.MetaOapg.max_length):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="length must be less than or equal to",
|
||||
constraint_value=cls.MetaOapg.max_length,
|
||||
@@ -973,7 +973,7 @@ class StrBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('minLength', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'min_length') and
|
||||
len(arg) < cls.MetaOapg.min_length):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="length must be greater than or equal to",
|
||||
constraint_value=cls.MetaOapg.min_length,
|
||||
@@ -988,14 +988,14 @@ class StrBase(ValidatorBase):
|
||||
if flags != 0:
|
||||
# Don't print the regex flags if the flags are not
|
||||
# specified in the OAS document.
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="must match regular expression",
|
||||
constraint_value=regex_dict['pattern'],
|
||||
path_to_item=validation_metadata.path_to_item,
|
||||
additional_txt=" with flags=`{}`".format(flags)
|
||||
)
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="must match regular expression",
|
||||
constraint_value=regex_dict['pattern'],
|
||||
@@ -1211,7 +1211,7 @@ class NumberBase(ValidatorBase):
|
||||
return self._as_float
|
||||
except AttributeError:
|
||||
if self.as_tuple().exponent >= 0:
|
||||
raise ApiValueError(f'{self} is not an float')
|
||||
raise ApiValueError(f'{self} is not a float')
|
||||
self._as_float = float(self)
|
||||
return self._as_float
|
||||
|
||||
@@ -1228,7 +1228,7 @@ class NumberBase(ValidatorBase):
|
||||
multiple_of_value = cls.MetaOapg.multiple_of
|
||||
if (not (float(arg) / multiple_of_value).is_integer()):
|
||||
# Note 'multipleOf' will be as good as the floating point arithmetic.
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="value must be a multiple of",
|
||||
constraint_value=multiple_of_value,
|
||||
@@ -1249,7 +1249,7 @@ class NumberBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('exclusiveMaximum', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'exclusive_maximum') and
|
||||
arg >= cls.MetaOapg.exclusive_maximum):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="must be a value less than",
|
||||
constraint_value=cls.MetaOapg.exclusive_maximum,
|
||||
@@ -1259,7 +1259,7 @@ class NumberBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('maximum', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'inclusive_maximum') and
|
||||
arg > cls.MetaOapg.inclusive_maximum):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="must be a value less than or equal to",
|
||||
constraint_value=cls.MetaOapg.inclusive_maximum,
|
||||
@@ -1269,7 +1269,7 @@ class NumberBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('exclusiveMinimum', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'exclusive_minimum') and
|
||||
arg <= cls.MetaOapg.exclusive_minimum):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="must be a value greater than",
|
||||
constraint_value=cls.MetaOapg.exclusive_maximum,
|
||||
@@ -1279,7 +1279,7 @@ class NumberBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('minimum', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'inclusive_minimum') and
|
||||
arg < cls.MetaOapg.inclusive_minimum):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="must be a value greater than or equal to",
|
||||
constraint_value=cls.MetaOapg.inclusive_minimum,
|
||||
@@ -1347,7 +1347,7 @@ class ListBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('maxItems', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'max_items') and
|
||||
len(arg) > cls.MetaOapg.max_items):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="number of items must be less than or equal to",
|
||||
constraint_value=cls.MetaOapg.max_items,
|
||||
@@ -1357,7 +1357,7 @@ class ListBase(ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('minItems', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'min_items') and
|
||||
len(arg) < cls.MetaOapg.min_items):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="number of items must be greater than or equal to",
|
||||
constraint_value=cls.MetaOapg.min_items,
|
||||
@@ -1368,7 +1368,7 @@ class ListBase(ValidatorBase):
|
||||
hasattr(cls.MetaOapg, 'unique_items') and cls.MetaOapg.unique_items and arg):
|
||||
unique_items = set(arg)
|
||||
if len(arg) > len(unique_items):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="duplicate items were found, and the tuple must not contain duplicates because",
|
||||
constraint_value='unique_items==True',
|
||||
@@ -1611,7 +1611,7 @@ class DictBase(Discriminable, ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('maxProperties', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'max_properties') and
|
||||
len(arg) > cls.MetaOapg.max_properties):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="number of properties must be less than or equal to",
|
||||
constraint_value=cls.MetaOapg.max_properties,
|
||||
@@ -1621,7 +1621,7 @@ class DictBase(Discriminable, ValidatorBase):
|
||||
if (cls._is_json_validation_enabled_oapg('minProperties', validation_metadata.configuration) and
|
||||
hasattr(cls.MetaOapg, 'min_properties') and
|
||||
len(arg) < cls.MetaOapg.min_properties):
|
||||
cls._raise_validation_errror_message_oapg(
|
||||
cls._raise_validation_error_message_oapg(
|
||||
value=arg,
|
||||
constraint_msg="number of properties must be greater than or equal to",
|
||||
constraint_value=cls.MetaOapg.min_properties,
|
||||
|
||||
@@ -341,7 +341,7 @@ class HttpSigningConfiguration(object):
|
||||
:return: A tuple of (digest, prefix).
|
||||
The digest is a hashing object that contains the cryptographic digest of
|
||||
the HTTP request.
|
||||
The prefix is a string that identifies the cryptographc hash. It is used
|
||||
The prefix is a string that identifies the cryptographic hash. It is used
|
||||
to generate the 'Digest' header as specified in RFC 3230.
|
||||
"""
|
||||
if self.hash_algorithm == HASH_SHA512:
|
||||
|
||||
@@ -12,15 +12,15 @@ from unittest.mock import patch
|
||||
import urllib3
|
||||
|
||||
import petstore_api
|
||||
from petstore_api.paths.fake_test_query_paramters import put # noqa: E501
|
||||
from petstore_api.paths.fake_test_query_parameters import put # noqa: E501
|
||||
from petstore_api import configuration, schemas, api_client
|
||||
|
||||
from .. import ApiTestMixin
|
||||
|
||||
|
||||
class TestFakeTestQueryParamters(ApiTestMixin, unittest.TestCase):
|
||||
class TestFakeTestQueryParameters(ApiTestMixin, unittest.TestCase):
|
||||
"""
|
||||
FakeTestQueryParamters unit test stubs
|
||||
FakeTestQueryParameters unit test stubs
|
||||
"""
|
||||
_configuration = configuration.Configuration()
|
||||
|
||||
@@ -83,7 +83,7 @@ class DeserializationTests(unittest.TestCase):
|
||||
"""
|
||||
deserialize Animal to a Dog instance
|
||||
Animal uses a discriminator which has a map built of child classes
|
||||
that inherrit from Animal
|
||||
that inherit from Animal
|
||||
This is the swagger (v2) way of doing something like oneOf composition
|
||||
"""
|
||||
from petstore_api.model import animal, dog
|
||||
|
||||
@@ -279,7 +279,7 @@
|
||||
# ]
|
||||
# )
|
||||
# config = Configuration(host=HOST, signing_info=signing_cfg)
|
||||
# # Set the OAuth2 acces_token to None. Here we are interested in testing
|
||||
# # Set the OAuth2 access_token to None. Here we are interested in testing
|
||||
# # the HTTP signature scheme.
|
||||
# config.access_token = None
|
||||
#
|
||||
@@ -310,7 +310,7 @@
|
||||
# private_key_passphrase=self.private_key_passphrase,
|
||||
# )
|
||||
# config = Configuration(host=HOST, signing_info=signing_cfg)
|
||||
# # Set the OAuth2 acces_token to None. Here we are interested in testing
|
||||
# # Set the OAuth2 access_token to None. Here we are interested in testing
|
||||
# # the HTTP signature scheme.
|
||||
# config.access_token = None
|
||||
#
|
||||
@@ -346,7 +346,7 @@
|
||||
# ]
|
||||
# )
|
||||
# config = Configuration(host=HOST, signing_info=signing_cfg)
|
||||
# # Set the OAuth2 acces_token to None. Here we are interested in testing
|
||||
# # Set the OAuth2 access_token to None. Here we are interested in testing
|
||||
# # the HTTP signature scheme.
|
||||
# config.access_token = None
|
||||
#
|
||||
@@ -382,7 +382,7 @@
|
||||
# ]
|
||||
# )
|
||||
# config = Configuration(host=HOST, signing_info=signing_cfg)
|
||||
# # Set the OAuth2 acces_token to None. Here we are interested in testing
|
||||
# # Set the OAuth2 access_token to None. Here we are interested in testing
|
||||
# # the HTTP signature scheme.
|
||||
# config.access_token = None
|
||||
#
|
||||
@@ -418,7 +418,7 @@
|
||||
# ]
|
||||
# )
|
||||
# config = Configuration(host=HOST, signing_info=signing_cfg)
|
||||
# # Set the OAuth2 acces_token to None. Here we are interested in testing
|
||||
# # Set the OAuth2 access_token to None. Here we are interested in testing
|
||||
# # the HTTP signature scheme.
|
||||
# config.access_token = None
|
||||
#
|
||||
|
||||
@@ -23,7 +23,7 @@ class TestObjectWithAllOfWithReqTestPropFromUnsetAddProp(unittest.TestCase):
|
||||
)
|
||||
assert inst == {'test': 'a'}
|
||||
|
||||
# without the required test property an execption is thrown
|
||||
# without the required test property an exception is thrown
|
||||
with self.assertRaises(petstore_api.exceptions.ApiTypeError):
|
||||
ObjectWithAllOfWithReqTestPropFromUnsetAddProp(
|
||||
name='a'
|
||||
|
||||
@@ -122,7 +122,7 @@ class TestParameter(unittest.TestCase):
|
||||
)
|
||||
)
|
||||
|
||||
def test_throws_error_for_nonexistant_content_type(self):
|
||||
def test_throws_error_for_nonexistent_content_type(self):
|
||||
request_body = api_client.RequestBody(
|
||||
content={'application/json': api_client.MediaType(schema=schemas.AnyTypeSchema)}
|
||||
)
|
||||
|
||||
Reference in New Issue
Block a user