Conversation
|
How would the team feel about my deprecating |
|
The leading underscore indicates that symbol is private to the implementation. If that's the case, no objections here. |
|
Then again, if it's an implementation detail, then we don't have to deprecate it. We can just remove it. |
|
Ready for review. |
|
Spotted this in the type checking workflow. |
korydraughn
left a comment
There was a problem hiding this comment.
Looking good so far.
|
Sorry for the forced push... just put some ruff changes through and added a structure that maps all permission keys to their respective codes - including all synonyms. It will help someone that say wants to do this: which would sort the whole list of retrieved permissions and new applicable ACLOperations together, ordering by increasing numeric permission code. Yes, I know - very niche. But it affords the customer some pretty good flexibility. |
|
linters and tests are queued up. Code is ready for final review, I think. |
alanking
left a comment
There was a problem hiding this comment.
Looks like we're rounding the corner. Still see a couple unresolved comments
… casual corruption. RUF012 points out that instances of the class can casually modify an unmutable class variable, eg.: class A: value = [] def f(self,*y): self.value += [*y]
|
I think it's ready for final eyes.... Squashing. |
korydraughn
left a comment
There was a problem hiding this comment.
We're in the final stretch.
4c99900 to
968d9cd
Compare
… use as dict keys and/or set members.
|
Now ready for "final" final review. Will put off addressing remaining lint reports since it seems the NOQA mechanism is not adequate for suppression of individual ruff complaints. |
No test yet, will undraft when I have one.
Exercised now with this script: