@@ -35,7 +35,7 @@ async def test_developer_plus_can_copy_connection_without_remove_source(
3535 new_connection = (await session .scalars (new_connection_query )).one_or_none ()
3636 assert not new_connection
3737
38- result = await client .post (
38+ response = await client .post (
3939 f"v1/connections/{ group_connection .id } /copy_connection" ,
4040 headers = {"Authorization" : f"Bearer { user .token } " },
4141 json = {
@@ -44,12 +44,12 @@ async def test_developer_plus_can_copy_connection_without_remove_source(
4444 },
4545 )
4646
47- assert result .status_code == 200 , result . json ()
47+ assert response .status_code == 200 , response . text
4848
4949 # new connection with new name exist in target group
5050 new_connection = (await session .scalars (new_connection_query )).one ()
5151
52- assert result .json () == {
52+ assert response .json () == {
5353 "id" : new_connection .id ,
5454 "group_id" : empty_group .group .id ,
5555 "name" : old_connection .name ,
@@ -101,7 +101,7 @@ async def test_developer_plus_can_copy_connection_with_new_connection_name(
101101 new_connection = (await session .scalars (new_connection_query )).one_or_none ()
102102 assert not new_connection
103103
104- result = await client .post (
104+ response = await client .post (
105105 f"v1/connections/{ group_connection .id } /copy_connection" ,
106106 headers = {"Authorization" : f"Bearer { user .token } " },
107107 json = {
@@ -110,12 +110,12 @@ async def test_developer_plus_can_copy_connection_with_new_connection_name(
110110 },
111111 )
112112
113- assert result .status_code == 200 , result . json ()
113+ assert response .status_code == 200 , response . text
114114
115115 # new connection with new name exist in target group
116116 new_connection = (await session .scalars (new_connection_query )).one ()
117117
118- assert result .json () == {
118+ assert response .json () == {
119119 "id" : new_connection .id ,
120120 "group_id" : empty_group .group .id ,
121121 "name" : new_name ,
@@ -153,7 +153,7 @@ async def test_developer_below_can_not_copy_connection_with_remove_source(
153153 role = group_connection_and_group_developer_or_below
154154 user = group_connection .owner_group .get_member_of_role (role )
155155
156- result = await client .post (
156+ response = await client .post (
157157 f"v1/connections/{ group_connection .id } /copy_connection" ,
158158 headers = {"Authorization" : f"Bearer { user .token } " },
159159 json = {
@@ -162,14 +162,14 @@ async def test_developer_below_can_not_copy_connection_with_remove_source(
162162 },
163163 )
164164
165- assert result .json () == {
165+ assert response .json () == {
166166 "error" : {
167167 "code" : "forbidden" ,
168168 "message" : "You have no power here" ,
169169 "details" : None ,
170170 },
171171 }
172- assert result .status_code == 403 , result . json ()
172+ assert response .status_code == 403 , response . text
173173
174174
175175async def test_maintainer_plus_can_copy_connection_and_delete_source (
@@ -192,7 +192,7 @@ async def test_maintainer_plus_can_copy_connection_and_delete_source(
192192 new_connection = (await session .scalars (new_connection_query )).one_or_none ()
193193 assert not new_connection
194194
195- result = await client .post (
195+ response = await client .post (
196196 f"v1/connections/{ group_connection .id } /copy_connection" ,
197197 headers = {"Authorization" : f"Bearer { user .token } " },
198198 json = {
@@ -201,12 +201,12 @@ async def test_maintainer_plus_can_copy_connection_and_delete_source(
201201 },
202202 )
203203
204- assert result .status_code == 200 , result . json ()
204+ assert response .status_code == 200 , response . text
205205
206206 # new connection with new name exist in target group
207207 new_connection = (await session .scalars (new_connection_query )).one ()
208208
209- assert result .json () == {
209+ assert response .json () == {
210210 "id" : new_connection .id ,
211211 "group_id" : empty_group .group .id ,
212212 "name" : old_connection .name ,
@@ -244,15 +244,15 @@ async def test_maintainer_plus_cannot_copy_connection_with_same_name_in_new_grou
244244 role = group_connection_with_same_name_maintainer_plus
245245 user = group_connection .owner_group .get_member_of_role (role )
246246
247- result = await client .post (
247+ response = await client .post (
248248 f"v1/connections/{ group_connection .id } /copy_connection" ,
249249 headers = {"Authorization" : f"Bearer { user .token } " },
250250 json = {
251251 "new_group_id" : empty_group .id ,
252252 },
253253 )
254254
255- assert result .json () == {
255+ assert response .json () == {
256256 "error" : {
257257 "code" : "conflict" ,
258258 "message" : "The connection name already exists in the target group, please specify a new one" ,
@@ -299,13 +299,13 @@ async def test_check_new_name_field_validation_on_copy_connection(
299299 role = group_connection_and_group_developer_plus
300300 user = group_connection .owner_group .get_member_of_role (role )
301301
302- result = await client .post (
302+ response = await client .post (
303303 f"v1/connections/{ group_connection .id } /copy_connection" ,
304304 headers = {"Authorization" : f"Bearer { user .token } " },
305305 json = {"new_group_id" : empty_group .id , "new_name" : name },
306306 )
307307
308- assert result .json () == {
308+ assert response .json () == {
309309 "error" : {
310310 "code" : "invalid_request" ,
311311 "message" : "Invalid request" ,
@@ -333,7 +333,7 @@ async def test_superuser_can_copy_connection_without_deleting_source(
333333 new_connection = (await session .scalars (new_connection_query )).one_or_none ()
334334 assert not new_connection
335335
336- result = await client .post (
336+ response = await client .post (
337337 f"v1/connections/{ group_connection .id } /copy_connection" ,
338338 headers = {"Authorization" : f"Bearer { superuser .token } " },
339339 json = {
@@ -342,12 +342,12 @@ async def test_superuser_can_copy_connection_without_deleting_source(
342342 },
343343 )
344344
345- assert result .status_code == 200 , result . json ()
345+ assert response .status_code == 200 , response . text
346346
347347 # new connection with new name exist in target group
348348 new_connection = (await session .scalars (new_connection_query )).one ()
349349
350- assert result .json () == {
350+ assert response .json () == {
351351 "id" : new_connection .id ,
352352 "group_id" : empty_group .group .id ,
353353 "name" : old_connection .name ,
@@ -393,7 +393,7 @@ async def test_superuser_can_copy_connection_and_delete_source(
393393 new_connection = (await session .scalars (new_connection_query )).one_or_none ()
394394 assert not new_connection
395395
396- result = await client .post (
396+ response = await client .post (
397397 f"v1/connections/{ group_connection .id } /copy_connection" ,
398398 headers = {"Authorization" : f"Bearer { superuser .token } " },
399399 json = {
@@ -402,12 +402,12 @@ async def test_superuser_can_copy_connection_and_delete_source(
402402 },
403403 )
404404
405- assert result .status_code == 200 , result . json ()
405+ assert response .status_code == 200 , response . text
406406
407407 # new connection with new name exist in target group
408408 new_connection = (await session .scalars (new_connection_query )).one ()
409409
410- assert result .json () == {
410+ assert response .json () == {
411411 "id" : new_connection .id ,
412412 "group_id" : empty_group .group .id ,
413413 "name" : old_connection .name ,
@@ -441,14 +441,14 @@ async def test_unauthorized_user_cannot_copy_connection(
441441 empty_group : MockGroup ,
442442 group_connection : MockConnection ,
443443):
444- result = await client .post (
444+ response = await client .post (
445445 f"v1/connections/{ group_connection .id } /copy_connection" ,
446446 json = {
447447 "new_group_id" : empty_group .id ,
448448 },
449449 )
450- assert result .status_code == 401 , result . json ()
451- assert result .json () == {
450+ assert response .status_code == 401 , response . text
451+ assert response .json () == {
452452 "error" : {
453453 "code" : "unauthorized" ,
454454 "message" : "Not authenticated" ,
@@ -463,15 +463,15 @@ async def test_groupless_user_cannot_copy_connection(
463463 empty_group : MockGroup ,
464464 simple_user : MockUser ,
465465):
466- result = await client .post (
466+ response = await client .post (
467467 f"v1/connections/{ group_connection .id } /copy_connection" ,
468468 headers = {"Authorization" : f"Bearer { simple_user .token } " },
469469 json = {
470470 "new_group_id" : empty_group .id ,
471471 },
472472 )
473- assert result .status_code == 404 , result . json ()
474- assert result .json () == {
473+ assert response .status_code == 404 , response . text
474+ assert response .json () == {
475475 "error" : {
476476 "code" : "not_found" ,
477477 "message" : "Connection not found" ,
@@ -488,15 +488,15 @@ async def test_other_group_member_cannot_copy_connection(
488488):
489489 user = group .get_member_of_role (role_guest_plus )
490490
491- result = await client .post (
491+ response = await client .post (
492492 f"v1/connections/{ group_connection .id } /copy_connection" ,
493493 headers = {"Authorization" : f"Bearer { user .token } " },
494494 json = {
495495 "new_group_id" : group .group .id ,
496496 },
497497 )
498- assert result .status_code == 404 , result . json ()
499- assert result .json () == {
498+ assert response .status_code == 404 , response . text
499+ assert response .json () == {
500500 "error" : {
501501 "code" : "not_found" ,
502502 "message" : "Connection not found" ,
@@ -513,22 +513,22 @@ async def test_not_in_both_groups_user_can_not_copy_connection(
513513):
514514 user = group_connection .owner_group .get_member_of_role (role_developer_plus )
515515
516- result = await client .post (
516+ response = await client .post (
517517 f"v1/connections/{ group_connection .id } /copy_connection" ,
518518 headers = {"Authorization" : f"Bearer { user .token } " },
519519 json = {
520520 "new_group_id" : empty_group .id ,
521521 },
522522 )
523523
524- assert result .json () == {
524+ assert response .json () == {
525525 "error" : {
526526 "code" : "not_found" ,
527527 "message" : "Group not found" ,
528528 "details" : None ,
529529 },
530530 }
531- assert result .status_code == 404 , result . json ()
531+ assert response .status_code == 404 , response . text
532532
533533
534534async def test_cannot_copy_connection_with_unknown_connection_error (
@@ -540,45 +540,45 @@ async def test_cannot_copy_connection_with_unknown_connection_error(
540540 role = group_connection_and_group_developer_plus
541541 user = group_connection .owner_group .get_member_of_role (role )
542542
543- result = await client .post (
543+ response = await client .post (
544544 "v1/connections/-1/copy_connection" ,
545545 headers = {"Authorization" : f"Bearer { user .token } " },
546546 json = {
547547 "new_group_id" : empty_group .id ,
548548 },
549549 )
550550
551- assert result .json () == {
551+ assert response .json () == {
552552 "error" : {
553553 "code" : "not_found" ,
554554 "message" : "Connection not found" ,
555555 "details" : None ,
556556 },
557557 }
558- assert result .status_code == 404 , result . json ()
558+ assert response .status_code == 404 , response . text
559559
560560
561561async def test_superuser_cannot_copy_unknown_connection_error (
562562 client : AsyncClient ,
563563 superuser : MockUser ,
564564 empty_group : MockGroup ,
565565):
566- result = await client .post (
566+ response = await client .post (
567567 "v1/connections/-1/copy_connection" ,
568568 headers = {"Authorization" : f"Bearer { superuser .token } " },
569569 json = {
570570 "new_group_id" : empty_group .id ,
571571 },
572572 )
573573
574- assert result .json () == {
574+ assert response .json () == {
575575 "error" : {
576576 "code" : "not_found" ,
577577 "message" : "Connection not found" ,
578578 "details" : None ,
579579 },
580580 }
581- assert result .status_code == 404 , result . json ()
581+ assert response .status_code == 404 , response . text
582582
583583
584584async def test_cannot_copy_connection_with_unknown_new_group_id_error (
@@ -589,42 +589,42 @@ async def test_cannot_copy_connection_with_unknown_new_group_id_error(
589589 role = group_connection_and_group_developer_plus
590590 user = group_connection .owner_group .get_member_of_role (role )
591591
592- result = await client .post (
592+ response = await client .post (
593593 f"v1/connections/{ group_connection .connection .id } /copy_connection" ,
594594 headers = {"Authorization" : f"Bearer { user .token } " },
595595 json = {
596596 "new_group_id" : - 1 ,
597597 },
598598 )
599599
600- assert result .json () == {
600+ assert response .json () == {
601601 "error" : {
602602 "code" : "not_found" ,
603603 "message" : "Group not found" ,
604604 "details" : None ,
605605 },
606606 }
607- assert result .status_code == 404 , result . json ()
607+ assert response .status_code == 404 , response . text
608608
609609
610610async def test_superuser_cannot_copy_connection_with_unknown_new_group_id_error (
611611 client : AsyncClient ,
612612 superuser : MockUser ,
613613 group_connection : MockConnection ,
614614):
615- result = await client .post (
615+ response = await client .post (
616616 f"v1/connections/{ group_connection .connection .id } /copy_connection" ,
617617 headers = {"Authorization" : f"Bearer { superuser .token } " },
618618 json = {
619619 "new_group_id" : - 1 ,
620620 },
621621 )
622622
623- assert result .json () == {
623+ assert response .json () == {
624624 "error" : {
625625 "code" : "not_found" ,
626626 "message" : "Group not found" ,
627627 "details" : None ,
628628 },
629629 }
630- assert result .status_code == 404 , result . json ()
630+ assert response .status_code == 404 , response . text
0 commit comments