Browse Source

Update test names

pull/1654/head
Hironsan 2 years ago
parent
commit
04049adecd
1 changed files with 22 additions and 22 deletions
  1. 44
      backend/members/tests.py

44
backend/members/tests.py

@ -19,30 +19,30 @@ class TestMemberListAPI(CRUDMixin):
self.data = {'user': self.non_member.id, 'role': admin_role.id, 'project': self.project.item.id}
self.url = reverse(viewname='member_list', args=[self.project.item.id])
def test_allows_project_admin_to_get_mappings(self):
def test_allows_project_admin_to_know_members(self):
self.assert_fetch(self.project.users[0], status.HTTP_200_OK)
def test_denies_non_project_admin_to_get_mappings(self):
def test_denies_non_project_admin_to_know_members(self):
for member in self.project.users[1:]:
self.assert_fetch(member, status.HTTP_403_FORBIDDEN)
def test_denies_non_project_member_to_get_mappings(self):
def test_denies_non_project_member_to_know_members(self):
self.assert_fetch(self.non_member, status.HTTP_403_FORBIDDEN)
def test_denies_unauthenticated_user_to_get_mappings(self):
def test_denies_unauthenticated_user_to_known_members(self):
self.assert_fetch(expected=status.HTTP_403_FORBIDDEN)
def test_allows_project_admin_to_create_mapping(self):
def test_allows_project_admin_to_add_member(self):
self.assert_create(self.project.users[0], status.HTTP_201_CREATED)
def test_denies_non_project_admin_to_create_mapping(self):
def test_denies_non_project_admin_to_add_member(self):
for member in self.project.users[1:]:
self.assert_create(member, status.HTTP_403_FORBIDDEN)
def test_denies_non_project_member_to_create_mapping(self):
def test_denies_non_project_member_to_add_member(self):
self.assert_create(self.non_member, status.HTTP_403_FORBIDDEN)
def test_denies_unauthenticated_user_to_create_mapping(self):
def test_denies_unauthenticated_user_to_add_member(self):
self.assert_create(expected=status.HTTP_403_FORBIDDEN)
def assert_bulk_delete(self, user=None, expected=status.HTTP_403_FORBIDDEN):
@ -52,19 +52,19 @@ class TestMemberListAPI(CRUDMixin):
response = self.client.delete(self.url, data={'ids': ids}, format='json')
self.assertEqual(response.status_code, expected)
def test_allows_project_admin_to_bulk_delete(self):
def test_allows_project_admin_to_remove_members(self):
self.assert_bulk_delete(self.project.users[0], status.HTTP_204_NO_CONTENT)
response = self.client.get(self.url)
self.assertEqual(len(response.data), 1)
def test_denies_non_project_admin_to_bulk_delete(self):
def test_denies_non_project_admin_to_remove_members(self):
for member in self.project.users[1:]:
self.assert_bulk_delete(member, status.HTTP_403_FORBIDDEN)
def test_denies_non_project_member_to_bulk_delete(self):
def test_denies_non_project_member_to_remove_members(self):
self.assert_bulk_delete(self.non_member, status.HTTP_403_FORBIDDEN)
def test_denies_unauthenticated_user_to_bulk_delete(self):
def test_denies_unauthenticated_user_to_remove_members(self):
self.assert_bulk_delete(expected=status.HTTP_403_FORBIDDEN)
@ -74,34 +74,34 @@ class TestMemberRoleDetailAPI(CRUDMixin):
self.project = prepare_project()
self.non_member = make_user()
admin_role = Role.objects.get(name=settings.ROLE_PROJECT_ADMIN)
mapping = Member.objects.get(user=self.project.users[1])
self.url = reverse(viewname='member_detail', args=[self.project.item.id, mapping.id])
member = Member.objects.get(user=self.project.users[1])
self.url = reverse(viewname='member_detail', args=[self.project.item.id, member.id])
self.data = {'role': admin_role.id}
def test_allows_project_admin_to_get_mapping(self):
def test_allows_project_admin_to_known_member(self):
self.assert_fetch(self.project.users[0], status.HTTP_200_OK)
def test_denies_non_project_admin_to_get_mapping(self):
def test_denies_non_project_admin_to_know_member(self):
for member in self.project.users[1:]:
self.assert_fetch(member, status.HTTP_403_FORBIDDEN)
def test_denies_non_project_member_to_get_mapping(self):
def test_denies_non_project_member_to_know_member(self):
self.assert_fetch(self.non_member, status.HTTP_403_FORBIDDEN)
def test_denies_unauthenticated_user_to_get_mapping(self):
def test_denies_unauthenticated_user_to_know_member(self):
self.assert_fetch(expected=status.HTTP_403_FORBIDDEN)
def test_allows_project_admin_to_update_mapping(self):
def test_allows_project_admin_to_change_member_role(self):
self.assert_update(self.project.users[0], status.HTTP_200_OK)
def test_denies_non_project_admin_to_update_mapping(self):
def test_denies_non_project_admin_to_change_member_role(self):
for member in self.project.users[1:]:
self.assert_update(member, status.HTTP_403_FORBIDDEN)
def test_denies_non_project_member_to_update_mapping(self):
def test_denies_non_project_member_to_change_member_role(self):
self.assert_update(self.non_member, status.HTTP_403_FORBIDDEN)
def test_denies_unauthenticated_user_to_update_mapping(self):
def test_denies_unauthenticated_user_to_change_member_role(self):
self.assert_update(expected=status.HTTP_403_FORBIDDEN)

Loading…
Cancel
Save