@@ -8,15 +8,15 @@ def verify_keycloak_action_effect(self, action_step):
88 """Verify ClickHouse behavior for Keycloak-driven actions."""
99
1010 with Given ("I apply a Keycloak-related action or state change" ):
11- action_step ()
11+ action_step [ 0 ] ()
1212
1313 with When ("I get an OAuth token from the provider" ):
1414 client = self .context .provider_client
1515 token = client .OAuthProvider .get_oauth_token ()
1616
1717 with Then ("I try to access ClickHouse with the token" ):
1818 response = access_clickhouse (token = token )
19- assert response .status_code in ( 200 , 401 ) , error ()
19+ assert response .status_code == action_step [ 1 ] , error ()
2020
2121 with And ("I check that the ClickHouse server is still alive" ):
2222 check_clickhouse_is_alive ()
@@ -38,14 +38,14 @@ def group_actions(self):
3838 client = self .context .provider_client
3939
4040 steps = [
41- client .OAuthProvider .disable_user ,
42- client .OAuthProvider .delete_user ,
43- client .OAuthProvider .add_user_to_group ,
44- client .OAuthProvider .remove_user_from_group ,
45- client .OAuthProvider .delete_group ,
46- client .OAuthProvider .disable_client ,
47- client .OAuthProvider .revoke_consent ,
48- client .OAuthProvider .invalidate_token ,
41+ ( client .OAuthProvider .disable_user , 403 ) ,
42+ ( client .OAuthProvider .delete_user , 403 ) ,
43+ ( client .OAuthProvider .add_user_to_group , 200 ) ,
44+ ( client .OAuthProvider .remove_user_from_group , 403 ) ,
45+ ( client .OAuthProvider .delete_group , 403 ) ,
46+ ( client .OAuthProvider .disable_client , 403 ) ,
47+ ( client .OAuthProvider .revoke_consent , 403 ) ,
48+ ( client .OAuthProvider .invalidate_token , 403 ) ,
4949 ]
5050
5151 for step in steps :
0 commit comments