@@ -301,7 +301,9 @@ async def test_group_access_rights(
301301 if not data :
302302 # role cannot create a group so stop here
303303 return
304+
304305 assigned_group = data
306+ group_id = assigned_group ["gid" ]
305307
306308 async with AsyncExitStack () as users_stack :
307309 # 1. have 2 users
@@ -310,44 +312,42 @@ async def test_group_access_rights(
310312 for _ in range (2 )
311313 ]
312314
313- # 2. add the users to the group
315+ # 2. ADD the users to the group
314316 add_group_user_url = client .app .router ["add_group_user" ].url_for (
315- gid = f"{ assigned_group ['gid' ]} "
316- )
317- assert (
318- f"{ add_group_user_url } "
319- == f"/{ API_VTAG } /groups/{ assigned_group ['gid' ]} /users"
317+ gid = f"{ group_id } "
320318 )
321- for i , user in enumerate (users ):
319+ assert f"{ add_group_user_url } " == f"/{ API_VTAG } /groups/{ group_id } /users"
320+ for user in users :
322321 resp = await client .post (f"{ add_group_user_url } " , json = {"uid" : user ["id" ]})
323- data , error = await assert_status (resp , expected .no_content )
322+ await assert_status (resp , expected .no_content )
324323
325- # 3. user 1 shall be a manager
324+ # 3. PATCH: user 1 shall be a manager
326325 patch_group_user_url = client .app .router ["update_group_user" ].url_for (
327- gid = f"{ assigned_group [ 'gid' ] } " , uid = f"{ users [0 ]['id' ]} "
326+ gid = f"{ group_id } " , uid = f"{ users [0 ]['id' ]} "
328327 )
329328 assert (
330329 f"{ patch_group_user_url } "
331- == f"/{ API_VTAG } /groups/{ assigned_group [ 'gid' ] } /users/{ users [0 ]['id' ]} "
330+ == f"/{ API_VTAG } /groups/{ group_id } /users/{ users [0 ]['id' ]} "
332331 )
333332 params = {"accessRights" : {"read" : True , "write" : True , "delete" : False }}
334333 resp = await client .patch (f"{ patch_group_user_url } " , json = params )
335- data , error = await assert_status (resp , expected .ok )
334+ await assert_status (resp , expected .ok )
336335
337- # 4. user 2 shall be a member
336+ # 4. PATCH user 2 shall be a member
338337 patch_group_user_url = client .app .router ["update_group_user" ].url_for (
339- gid = f"{ assigned_group [ 'gid' ] } " , uid = f"{ users [1 ]['id' ]} "
338+ gid = f"{ group_id } " , uid = f"{ users [1 ]['id' ]} "
340339 )
341340 assert (
342341 f"{ patch_group_user_url } "
343- == f"/{ API_VTAG } /groups/{ assigned_group [ 'gid' ] } /users/{ users [1 ]['id' ]} "
342+ == f"/{ API_VTAG } /groups/{ group_id } /users/{ users [1 ]['id' ]} "
344343 )
345- params = {"accessRights" : {"read" : True , "write" : False , "delete" : False }}
346- resp = await client .patch (f"{ patch_group_user_url } " , json = params )
347- data , error = await assert_status (resp , expected .ok )
344+ resp = await client .patch (
345+ f"{ patch_group_user_url } " ,
346+ json = {"accessRights" : {"read" : True , "write" : False , "delete" : False }},
347+ )
348+ await assert_status (resp , expected .ok )
348349
349- # let's login as user 1
350- # login
350+ # let's LOGIN as user 1
351351 url = client .app .router ["auth_login" ].url_for ()
352352 resp = await client .post (
353353 f"{ url } " ,
@@ -358,28 +358,28 @@ async def test_group_access_rights(
358358 )
359359 await assert_status (resp , expected .ok )
360360
361- # check as a manager I can remove user 2
361+ # check as a manager I can REMOVE user 2
362362 delete_group_user_url = client .app .router ["delete_group_user" ].url_for (
363- gid = f"{ assigned_group [ 'gid' ] } " , uid = f"{ users [1 ]['id' ]} "
363+ gid = f"{ group_id } " , uid = f"{ users [1 ]['id' ]} "
364364 )
365365 assert (
366366 f"{ delete_group_user_url } "
367- == f"/{ API_VTAG } /groups/{ assigned_group [ 'gid' ] } /users/{ users [1 ]['id' ]} "
367+ == f"/{ API_VTAG } /groups/{ group_id } /users/{ users [1 ]['id' ]} "
368368 )
369369 resp = await client .delete (f"{ delete_group_user_url } " )
370- data , error = await assert_status (resp , expected .no_content )
370+ await assert_status (resp , expected .no_content )
371371
372- # as a manager I can add user 2 again
372+ # as a manager I can ADD user 2 again
373373 resp = await client .post (f"{ add_group_user_url } " , json = {"uid" : users [1 ]["id" ]})
374- data , error = await assert_status (resp , expected .no_content )
374+ await assert_status (resp , expected .no_content )
375375
376- # as a manager I cannot delete the group
377- url = client .app .router ["delete_group" ].url_for (gid = f"{ assigned_group [ 'gid' ] } " )
376+ # as a manager I cannot DELETE the group
377+ url = client .app .router ["delete_group" ].url_for (gid = f"{ group_id } " )
378378 resp = await client .delete (f"{ url } " )
379- data , error = await assert_status (resp , status .HTTP_403_FORBIDDEN )
379+ await assert_status (resp , status .HTTP_403_FORBIDDEN )
380380
381381 # now log in as user 2
382- # login
382+ # LOGIN
383383 url = client .app .router ["auth_login" ].url_for ()
384384 resp = await client .post (
385385 f"{ url } " ,
@@ -390,25 +390,25 @@ async def test_group_access_rights(
390390 )
391391 await assert_status (resp , expected .ok )
392392
393- # as a member I cannot remove user 1
393+ # as a member I cannot REMOVE user 1
394394 delete_group_user_url = client .app .router ["delete_group_user" ].url_for (
395- gid = f"{ assigned_group [ 'gid' ] } " , uid = f"{ users [0 ]['id' ]} "
395+ gid = f"{ group_id } " , uid = f"{ users [0 ]['id' ]} "
396396 )
397397 assert (
398398 f"{ delete_group_user_url } "
399- == f"/{ API_VTAG } /groups/{ assigned_group [ 'gid' ] } /users/{ users [0 ]['id' ]} "
399+ == f"/{ API_VTAG } /groups/{ group_id } /users/{ users [0 ]['id' ]} "
400400 )
401401 resp = await client .delete (f"{ delete_group_user_url } " )
402- data , error = await assert_status (resp , status .HTTP_403_FORBIDDEN )
402+ await assert_status (resp , status .HTTP_403_FORBIDDEN )
403403
404- # as a member I cannot add user 1
404+ # as a member I cannot ADD user 1
405405 resp = await client .post (f"{ add_group_user_url } " , json = {"uid" : users [0 ]["id" ]})
406- data , error = await assert_status (resp , status .HTTP_403_FORBIDDEN )
406+ await assert_status (resp , status .HTTP_403_FORBIDDEN )
407407
408- # as a member I cannot delete the grouop
409- url = client .app .router ["delete_group" ].url_for (gid = f"{ assigned_group [ 'gid' ] } " )
408+ # as a member I cannot DELETE the grouop
409+ url = client .app .router ["delete_group" ].url_for (gid = f"{ group_id } " )
410410 resp = await client .delete (f"{ url } " )
411- data , error = await assert_status (resp , status .HTTP_403_FORBIDDEN )
411+ await assert_status (resp , status .HTTP_403_FORBIDDEN )
412412
413413
414414@pytest .mark .parametrize (* standard_role_response ())
0 commit comments