Skip to content

Commit edc0c26

Browse files
committed
chore: pytestify test_database
1 parent 9b84601 commit edc0c26

File tree

1 file changed

+107
-106
lines changed

1 file changed

+107
-106
lines changed

test/test_database.py

Lines changed: 107 additions & 106 deletions
Original file line numberDiff line numberDiff line change
@@ -1,113 +1,114 @@
1+
from pathlib import Path
12
import unittest
23

4+
import pytest
35
import requests_mock
46

57
import tableauserverclient as TSC
68
from ._utils import read_xml_asset, asset
79

8-
GET_XML = "database_get.xml"
9-
POPULATE_PERMISSIONS_XML = "database_populate_permissions.xml"
10-
UPDATE_XML = "database_update.xml"
11-
GET_DQW_BY_CONTENT = "dqw_by_content_type.xml"
12-
13-
14-
class DatabaseTests(unittest.TestCase):
15-
def setUp(self):
16-
self.server = TSC.Server("http://test", False)
17-
# Fake signin
18-
self.server._site_id = "dad65087-b08b-4603-af4e-2887b8aafc67"
19-
self.server._auth_token = "j80k54ll2lfMZ0tv97mlPvvSCRyD0DOM"
20-
self.server.version = "3.5"
21-
22-
self.baseurl = self.server.databases.baseurl
23-
24-
def test_get(self):
25-
response_xml = read_xml_asset(GET_XML)
26-
with requests_mock.mock() as m:
27-
m.get(self.baseurl, text=response_xml)
28-
all_databases, pagination_item = self.server.databases.get()
29-
30-
self.assertEqual(5, pagination_item.total_available)
31-
self.assertEqual("5ea59b45-e497-4827-8809-bfe213236f75", all_databases[0].id)
32-
self.assertEqual("hyper", all_databases[0].connection_type)
33-
self.assertEqual("hyper_0.hyper", all_databases[0].name)
34-
35-
self.assertEqual("23591f2c-4802-4d6a-9e28-574a8ea9bc4c", all_databases[1].id)
36-
self.assertEqual("sqlserver", all_databases[1].connection_type)
37-
self.assertEqual("testv1", all_databases[1].name)
38-
self.assertEqual("9324cf6b-ba72-4b8e-b895-ac3f28d2f0e0", all_databases[1].contact_id)
39-
self.assertEqual(True, all_databases[1].certified)
40-
41-
def test_update(self):
42-
response_xml = read_xml_asset(UPDATE_XML)
43-
with requests_mock.mock() as m:
44-
m.put(self.baseurl + "/23591f2c-4802-4d6a-9e28-574a8ea9bc4c", text=response_xml)
45-
single_database = TSC.DatabaseItem("test")
46-
single_database.contact_id = "9324cf6b-ba72-4b8e-b895-ac3f28d2f0e0"
47-
single_database._id = "23591f2c-4802-4d6a-9e28-574a8ea9bc4c"
48-
single_database.certified = True
49-
single_database.certification_note = "Test"
50-
single_database = self.server.databases.update(single_database)
51-
52-
self.assertEqual("23591f2c-4802-4d6a-9e28-574a8ea9bc4c", single_database.id)
53-
self.assertEqual("9324cf6b-ba72-4b8e-b895-ac3f28d2f0e0", single_database.contact_id)
54-
self.assertEqual(True, single_database.certified)
55-
self.assertEqual("Test", single_database.certification_note)
56-
57-
def test_populate_permissions(self):
58-
with open(asset(POPULATE_PERMISSIONS_XML), "rb") as f:
59-
response_xml = f.read().decode("utf-8")
60-
with requests_mock.mock() as m:
61-
m.get(self.baseurl + "/0448d2ed-590d-4fa0-b272-a2a8a24555b5/permissions", text=response_xml)
62-
single_database = TSC.DatabaseItem("test")
63-
single_database._id = "0448d2ed-590d-4fa0-b272-a2a8a24555b5"
64-
65-
self.server.databases.populate_permissions(single_database)
66-
permissions = single_database.permissions
67-
68-
self.assertEqual(permissions[0].grantee.tag_name, "group")
69-
self.assertEqual(permissions[0].grantee.id, "5e5e1978-71fa-11e4-87dd-7382f5c437af")
70-
self.assertDictEqual(
71-
permissions[0].capabilities,
72-
{
73-
TSC.Permission.Capability.ChangePermissions: TSC.Permission.Mode.Deny,
74-
TSC.Permission.Capability.Read: TSC.Permission.Mode.Allow,
75-
},
76-
)
77-
78-
self.assertEqual(permissions[1].grantee.tag_name, "user")
79-
self.assertEqual(permissions[1].grantee.id, "7c37ee24-c4b1-42b6-a154-eaeab7ee330a")
80-
self.assertDictEqual(
81-
permissions[1].capabilities,
82-
{
83-
TSC.Permission.Capability.Write: TSC.Permission.Mode.Allow,
84-
},
85-
)
86-
87-
def test_populate_data_quality_warning(self):
88-
with open(asset(GET_DQW_BY_CONTENT), "rb") as f:
89-
response_xml = f.read().decode("utf-8")
90-
with requests_mock.mock() as m:
91-
m.get(
92-
self.server.databases._data_quality_warnings.baseurl + "/94441d26-9a52-4a42-b0fb-3f94792d1aac",
93-
text=response_xml,
94-
)
95-
single_database = TSC.DatabaseItem("test")
96-
single_database._id = "94441d26-9a52-4a42-b0fb-3f94792d1aac"
97-
98-
self.server.databases.populate_dqw(single_database)
99-
dqws = single_database.dqws
100-
first_dqw = dqws.pop()
101-
self.assertEqual(first_dqw.id, "c2e0e406-84fb-4f4e-9998-f20dd9306710")
102-
self.assertEqual(first_dqw.warning_type, "WARNING")
103-
self.assertEqual(first_dqw.message, "Hello, World!")
104-
self.assertEqual(first_dqw.owner_id, "eddc8c5f-6af0-40be-b6b0-2c790290a43f")
105-
self.assertEqual(first_dqw.active, True)
106-
self.assertEqual(first_dqw.severe, True)
107-
self.assertEqual(str(first_dqw.created_at), "2021-04-09 18:39:54+00:00")
108-
self.assertEqual(str(first_dqw.updated_at), "2021-04-09 18:39:54+00:00")
109-
110-
def test_delete(self):
111-
with requests_mock.mock() as m:
112-
m.delete(self.baseurl + "/0448d2ed-590d-4fa0-b272-a2a8a24555b5", status_code=204)
113-
self.server.databases.delete("0448d2ed-590d-4fa0-b272-a2a8a24555b5")
10+
TEST_ASSET_DIR = Path(__file__).parent / "assets"
11+
12+
GET_XML = TEST_ASSET_DIR / "database_get.xml"
13+
POPULATE_PERMISSIONS_XML = TEST_ASSET_DIR / "database_populate_permissions.xml"
14+
UPDATE_XML = TEST_ASSET_DIR / "database_update.xml"
15+
GET_DQW_BY_CONTENT = TEST_ASSET_DIR / "dqw_by_content_type.xml"
16+
17+
18+
@pytest.fixture(scope="function")
19+
def server() -> TSC.Server:
20+
server = TSC.Server("http://test", False)
21+
# Fake signin
22+
server._site_id = "dad65087-b08b-4603-af4e-2887b8aafc67"
23+
server._auth_token = "j80k54ll2lfMZ0tv97mlPvvSCRyD0DOM"
24+
server.version = "3.5"
25+
26+
return server
27+
28+
29+
def test_get(server):
30+
response_xml = GET_XML.read_text()
31+
with requests_mock.mock() as m:
32+
m.get(server.databases.baseurl, text=response_xml)
33+
all_databases, pagination_item = server.databases.get()
34+
35+
assert 5 == pagination_item.total_available
36+
assert "5ea59b45-e497-4827-8809-bfe213236f75" == all_databases[0].id
37+
assert "hyper" == all_databases[0].connection_type
38+
assert "hyper_0.hyper" == all_databases[0].name
39+
40+
assert "23591f2c-4802-4d6a-9e28-574a8ea9bc4c" == all_databases[1].id
41+
assert "sqlserver" == all_databases[1].connection_type
42+
assert "testv1" == all_databases[1].name
43+
assert "9324cf6b-ba72-4b8e-b895-ac3f28d2f0e0" == all_databases[1].contact_id
44+
assert all_databases[1].certified
45+
46+
47+
def test_update(server):
48+
response_xml = UPDATE_XML.read_text()
49+
with requests_mock.mock() as m:
50+
m.put(server.databases.baseurl + "/23591f2c-4802-4d6a-9e28-574a8ea9bc4c", text=response_xml)
51+
single_database = TSC.DatabaseItem("test")
52+
single_database.contact_id = "9324cf6b-ba72-4b8e-b895-ac3f28d2f0e0"
53+
single_database._id = "23591f2c-4802-4d6a-9e28-574a8ea9bc4c"
54+
single_database.certified = True
55+
single_database.certification_note = "Test"
56+
single_database = server.databases.update(single_database)
57+
58+
assert "23591f2c-4802-4d6a-9e28-574a8ea9bc4c" == single_database.id
59+
assert "9324cf6b-ba72-4b8e-b895-ac3f28d2f0e0" == single_database.contact_id
60+
assert single_database.certified
61+
assert "Test" == single_database.certification_note
62+
63+
64+
def test_populate_permissions(server):
65+
response_xml = POPULATE_PERMISSIONS_XML.read_text()
66+
with requests_mock.mock() as m:
67+
m.get(server.databases.baseurl + "/0448d2ed-590d-4fa0-b272-a2a8a24555b5/permissions", text=response_xml)
68+
single_database = TSC.DatabaseItem("test")
69+
single_database._id = "0448d2ed-590d-4fa0-b272-a2a8a24555b5"
70+
71+
server.databases.populate_permissions(single_database)
72+
permissions = single_database.permissions
73+
74+
assert permissions[0].grantee.tag_name == "group"
75+
assert permissions[0].grantee.id == "5e5e1978-71fa-11e4-87dd-7382f5c437af"
76+
assert permissions[0].capabilities == {
77+
TSC.Permission.Capability.ChangePermissions: TSC.Permission.Mode.Deny,
78+
TSC.Permission.Capability.Read: TSC.Permission.Mode.Allow,
79+
}
80+
81+
assert permissions[1].grantee.tag_name == "user"
82+
assert permissions[1].grantee.id == "7c37ee24-c4b1-42b6-a154-eaeab7ee330a"
83+
assert permissions[1].capabilities == {
84+
TSC.Permission.Capability.Write: TSC.Permission.Mode.Allow,
85+
}
86+
87+
88+
def test_populate_data_quality_warning(server):
89+
response_xml = GET_DQW_BY_CONTENT.read_text()
90+
with requests_mock.mock() as m:
91+
m.get(
92+
server.databases._data_quality_warnings.baseurl + "/94441d26-9a52-4a42-b0fb-3f94792d1aac",
93+
text=response_xml,
94+
)
95+
single_database = TSC.DatabaseItem("test")
96+
single_database._id = "94441d26-9a52-4a42-b0fb-3f94792d1aac"
97+
98+
server.databases.populate_dqw(single_database)
99+
dqws = single_database.dqws
100+
first_dqw = dqws.pop()
101+
assert first_dqw.id == "c2e0e406-84fb-4f4e-9998-f20dd9306710"
102+
assert first_dqw.warning_type == "WARNING"
103+
assert first_dqw.message, "Hello == World!"
104+
assert first_dqw.owner_id == "eddc8c5f-6af0-40be-b6b0-2c790290a43f"
105+
assert first_dqw.active
106+
assert first_dqw.severe
107+
assert str(first_dqw.created_at) == "2021-04-09 18:39:54+00:00"
108+
assert str(first_dqw.updated_at) == "2021-04-09 18:39:54+00:00"
109+
110+
111+
def test_delete(server):
112+
with requests_mock.mock() as m:
113+
m.delete(server.databases.baseurl + "/0448d2ed-590d-4fa0-b272-a2a8a24555b5", status_code=204)
114+
server.databases.delete("0448d2ed-590d-4fa0-b272-a2a8a24555b5")

0 commit comments

Comments
 (0)