Skip to content

Commit 740c711

Browse files
committed
cleanup tests
1 parent d53b4db commit 740c711

File tree

1 file changed

+39
-39
lines changed

1 file changed

+39
-39
lines changed

services/web/server/tests/unit/with_dbs/01/groups/test_groups_handlers_users.py

Lines changed: 39 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,9 @@ async def test_group_access_rights(
301301
if not data:
302302
# role cannot create a group so stop here
303303
return
304+
304305
assigned_group = data
306+
group_id = assigned_group["gid"]
305307

306308
async with AsyncExitStack() as users_stack:
307309
# 1. have 2 users
@@ -310,44 +312,42 @@ async def test_group_access_rights(
310312
for _ in range(2)
311313
]
312314

313-
# 2. add the users to the group
315+
# 2. ADD the users to the group
314316
add_group_user_url = client.app.router["add_group_user"].url_for(
315-
gid=f"{assigned_group['gid']}"
316-
)
317-
assert (
318-
f"{add_group_user_url}"
319-
== f"/{API_VTAG}/groups/{assigned_group['gid']}/users"
317+
gid=f"{group_id}"
320318
)
321-
for i, user in enumerate(users):
319+
assert f"{add_group_user_url}" == f"/{API_VTAG}/groups/{group_id}/users"
320+
for user in users:
322321
resp = await client.post(f"{add_group_user_url}", json={"uid": user["id"]})
323-
data, error = await assert_status(resp, expected.no_content)
322+
await assert_status(resp, expected.no_content)
324323

325-
# 3. user 1 shall be a manager
324+
# 3. PATCH: user 1 shall be a manager
326325
patch_group_user_url = client.app.router["update_group_user"].url_for(
327-
gid=f"{assigned_group['gid']}", uid=f"{users[0]['id']}"
326+
gid=f"{group_id}", uid=f"{users[0]['id']}"
328327
)
329328
assert (
330329
f"{patch_group_user_url}"
331-
== f"/{API_VTAG}/groups/{assigned_group['gid']}/users/{users[0]['id']}"
330+
== f"/{API_VTAG}/groups/{group_id}/users/{users[0]['id']}"
332331
)
333332
params = {"accessRights": {"read": True, "write": True, "delete": False}}
334333
resp = await client.patch(f"{patch_group_user_url}", json=params)
335-
data, error = await assert_status(resp, expected.ok)
334+
await assert_status(resp, expected.ok)
336335

337-
# 4. user 2 shall be a member
336+
# 4. PATCH user 2 shall be a member
338337
patch_group_user_url = client.app.router["update_group_user"].url_for(
339-
gid=f"{assigned_group['gid']}", uid=f"{users[1]['id']}"
338+
gid=f"{group_id}", uid=f"{users[1]['id']}"
340339
)
341340
assert (
342341
f"{patch_group_user_url}"
343-
== f"/{API_VTAG}/groups/{assigned_group['gid']}/users/{users[1]['id']}"
342+
== f"/{API_VTAG}/groups/{group_id}/users/{users[1]['id']}"
344343
)
345-
params = {"accessRights": {"read": True, "write": False, "delete": False}}
346-
resp = await client.patch(f"{patch_group_user_url}", json=params)
347-
data, error = await assert_status(resp, expected.ok)
344+
resp = await client.patch(
345+
f"{patch_group_user_url}",
346+
json={"accessRights": {"read": True, "write": False, "delete": False}},
347+
)
348+
await assert_status(resp, expected.ok)
348349

349-
# let's login as user 1
350-
# login
350+
# let's LOGIN as user 1
351351
url = client.app.router["auth_login"].url_for()
352352
resp = await client.post(
353353
f"{url}",
@@ -358,28 +358,28 @@ async def test_group_access_rights(
358358
)
359359
await assert_status(resp, expected.ok)
360360

361-
# check as a manager I can remove user 2
361+
# check as a manager I can REMOVE user 2
362362
delete_group_user_url = client.app.router["delete_group_user"].url_for(
363-
gid=f"{assigned_group['gid']}", uid=f"{users[1]['id']}"
363+
gid=f"{group_id}", uid=f"{users[1]['id']}"
364364
)
365365
assert (
366366
f"{delete_group_user_url}"
367-
== f"/{API_VTAG}/groups/{assigned_group['gid']}/users/{users[1]['id']}"
367+
== f"/{API_VTAG}/groups/{group_id}/users/{users[1]['id']}"
368368
)
369369
resp = await client.delete(f"{delete_group_user_url}")
370-
data, error = await assert_status(resp, expected.no_content)
370+
await assert_status(resp, expected.no_content)
371371

372-
# as a manager I can add user 2 again
372+
# as a manager I can ADD user 2 again
373373
resp = await client.post(f"{add_group_user_url}", json={"uid": users[1]["id"]})
374-
data, error = await assert_status(resp, expected.no_content)
374+
await assert_status(resp, expected.no_content)
375375

376-
# as a manager I cannot delete the group
377-
url = client.app.router["delete_group"].url_for(gid=f"{assigned_group['gid']}")
376+
# as a manager I cannot DELETE the group
377+
url = client.app.router["delete_group"].url_for(gid=f"{group_id}")
378378
resp = await client.delete(f"{url}")
379-
data, error = await assert_status(resp, status.HTTP_403_FORBIDDEN)
379+
await assert_status(resp, status.HTTP_403_FORBIDDEN)
380380

381381
# now log in as user 2
382-
# login
382+
# LOGIN
383383
url = client.app.router["auth_login"].url_for()
384384
resp = await client.post(
385385
f"{url}",
@@ -390,25 +390,25 @@ async def test_group_access_rights(
390390
)
391391
await assert_status(resp, expected.ok)
392392

393-
# as a member I cannot remove user 1
393+
# as a member I cannot REMOVE user 1
394394
delete_group_user_url = client.app.router["delete_group_user"].url_for(
395-
gid=f"{assigned_group['gid']}", uid=f"{users[0]['id']}"
395+
gid=f"{group_id}", uid=f"{users[0]['id']}"
396396
)
397397
assert (
398398
f"{delete_group_user_url}"
399-
== f"/{API_VTAG}/groups/{assigned_group['gid']}/users/{users[0]['id']}"
399+
== f"/{API_VTAG}/groups/{group_id}/users/{users[0]['id']}"
400400
)
401401
resp = await client.delete(f"{delete_group_user_url}")
402-
data, error = await assert_status(resp, status.HTTP_403_FORBIDDEN)
402+
await assert_status(resp, status.HTTP_403_FORBIDDEN)
403403

404-
# as a member I cannot add user 1
404+
# as a member I cannot ADD user 1
405405
resp = await client.post(f"{add_group_user_url}", json={"uid": users[0]["id"]})
406-
data, error = await assert_status(resp, status.HTTP_403_FORBIDDEN)
406+
await assert_status(resp, status.HTTP_403_FORBIDDEN)
407407

408-
# as a member I cannot delete the grouop
409-
url = client.app.router["delete_group"].url_for(gid=f"{assigned_group['gid']}")
408+
# as a member I cannot DELETE the grouop
409+
url = client.app.router["delete_group"].url_for(gid=f"{group_id}")
410410
resp = await client.delete(f"{url}")
411-
data, error = await assert_status(resp, status.HTTP_403_FORBIDDEN)
411+
await assert_status(resp, status.HTTP_403_FORBIDDEN)
412412

413413

414414
@pytest.mark.parametrize(*standard_role_response())

0 commit comments

Comments
 (0)