Skip to content
This repository was archived by the owner on Oct 23, 2023. It is now read-only.

Commit 0793a92

Browse files
committed
fix assert equals and types for basic tests
1 parent 97cd6a0 commit 0793a92

2 files changed

Lines changed: 44 additions & 29 deletions

File tree

tests/test_basic.py

Lines changed: 43 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -147,8 +147,11 @@ def test_access_resolution_base(self):
147147
request = PARAMS
148148
token = mock_token(False, [], False)
149149
host = 'localhost'
150-
result = access_resolution(request, token, host, [1, 2], [3, 4], [5, 6])
151-
assert result == (['PUBLIC'], [1, 2])
150+
result = access_resolution(request, token, host, ["1", "2"], ["3", "4"], ["5", "6"])
151+
self.assertListEqual(result[0], ['PUBLIC'])
152+
intermediate_list = result[1]
153+
intermediate_list.sort()
154+
self.assertListEqual(["1", "2"], intermediate_list)
152155

153156
def test_access_resolution_no_controlled(self):
154157
"""Test assumptions for access resolution for token but no controlled datasets.
@@ -158,8 +161,11 @@ def test_access_resolution_no_controlled(self):
158161
request = PARAMS
159162
token = mock_token(False, [], True)
160163
host = 'localhost'
161-
result = access_resolution(request, token, host, [1, 2], [3, 4], [5, 6])
162-
assert result == (['PUBLIC'], [1, 2])
164+
result = access_resolution(request, token, host, ["1", "2"], ["3", "4"], ["5", "6"])
165+
self.assertListEqual(result[0], ['PUBLIC'])
166+
intermediate_list = result[1]
167+
intermediate_list.sort()
168+
self.assertListEqual(["1", "2"], intermediate_list)
163169

164170
def test_access_resolution_registered(self):
165171
"""Test assumptions for access resolution for token with just bona_fide.
@@ -169,30 +175,39 @@ def test_access_resolution_registered(self):
169175
request = PARAMS
170176
token = mock_token(True, [], True)
171177
host = 'localhost'
172-
result = access_resolution(request, token, host, [1, 2], [3, 4], [5, 6])
173-
assert result == (['PUBLIC', 'REGISTERED'], [1, 2, 3, 4])
178+
result = access_resolution(request, token, host, ["1", "2"], ["3", "4"], ["5", "6"])
179+
self.assertListEqual(result[0], ['PUBLIC', 'REGISTERED'])
180+
intermediate_list = result[1]
181+
intermediate_list.sort()
182+
self.assertListEqual(["1", "2", "3", "4"], intermediate_list)
174183

175184
def test_access_resolution_controlled_no_registered(self):
176185
"""Test assumptions for access resolution for token and no bona_fide.
177186
178187
It is based on the result of fetch_datasets_access function.
179188
"""
180189
request = PARAMS
181-
token = mock_token(False, [5, 6], True)
190+
token = mock_token(False, ["5", "6"], True)
182191
host = 'localhost'
183-
result = access_resolution(request, token, host, [1, 2], [3, 4], [5, 6])
184-
assert result == (['PUBLIC', 'CONTROLLED'], [1, 2, 5, 6])
192+
result = access_resolution(request, token, host, ["1", "2"], ["3", "4"], ["5", "6"])
193+
self.assertListEqual(result[0], ['PUBLIC', 'CONTROLLED'])
194+
intermediate_list = result[1]
195+
intermediate_list.sort()
196+
self.assertListEqual(["1", "2", "5", "6"], intermediate_list)
185197

186198
def test_access_resolution_controlled_registered(self):
187199
"""Test assumptions for access resolution for token and bona_fide.
188200
189201
It is based on the result of fetch_datasets_access function.
190202
"""
191203
request = PARAMS
192-
token = mock_token(True, [5, 6], True)
204+
token = mock_token(True, ["5", "6"], True)
193205
host = 'localhost'
194-
result = access_resolution(request, token, host, [1, 2], [3, 4], [5, 6])
195-
assert result == (['PUBLIC', 'REGISTERED', 'CONTROLLED'], [1, 2, 3, 4, 5, 6])
206+
result = access_resolution(request, token, host, ["1", "2"], ["3", "4"], ["5", "6"])
207+
self.assertListEqual(result[0], ['PUBLIC', 'REGISTERED' ,'CONTROLLED'])
208+
intermediate_list = result[1]
209+
intermediate_list.sort()
210+
self.assertListEqual(["1", "2", "3", "4", "5", "6"], intermediate_list)
196211

197212
def test_access_resolution_bad_registered(self):
198213
"""Test assumptions for access resolution for requested registered Unauthorized.
@@ -203,7 +218,7 @@ def test_access_resolution_bad_registered(self):
203218
token = mock_token(False, [], False)
204219
host = 'localhost'
205220
with self.assertRaises(aiohttp.web_exceptions.HTTPUnauthorized):
206-
access_resolution(request, token, host, [], [3], [])
221+
access_resolution(request, token, host, [], ["3"], [])
207222

208223
def test_access_resolution_no_registered2(self):
209224
"""Test assumptions for access resolution for requested registered Forbidden.
@@ -214,7 +229,7 @@ def test_access_resolution_no_registered2(self):
214229
token = mock_token(False, [], True)
215230
host = 'localhost'
216231
with self.assertRaises(aiohttp.web_exceptions.HTTPForbidden):
217-
access_resolution(request, token, host, [], [4], [])
232+
access_resolution(request, token, host, [], ["4"], [])
218233

219234
def test_access_resolution_controlled_forbidden(self):
220235
"""Test assumptions for access resolution for requested controlled Forbidden.
@@ -225,7 +240,7 @@ def test_access_resolution_controlled_forbidden(self):
225240
token = mock_token(False, [7], True)
226241
host = 'localhost'
227242
with self.assertRaises(aiohttp.web_exceptions.HTTPForbidden):
228-
access_resolution(request, token, host, [], [6], [])
243+
access_resolution(request, token, host, [], ["6"], [])
229244

230245
def test_access_resolution_controlled_unauthorized(self):
231246
"""Test assumptions for access resolution for requested controlled Unauthorized.
@@ -236,29 +251,29 @@ def test_access_resolution_controlled_unauthorized(self):
236251
token = mock_token(False, [], False)
237252
host = 'localhost'
238253
with self.assertRaises(aiohttp.web_exceptions.HTTPUnauthorized):
239-
access_resolution(request, token, host, [], [5], [])
254+
access_resolution(request, token, host, [], ["5"], [])
240255

241256
def test_access_resolution_controlled_no_perms(self):
242257
"""Test assumptions for access resolution for requested controlled Forbidden.
243258
244259
It is based on the result of fetch_datasets_access function.
245260
"""
246261
request = PARAMS
247-
token = mock_token(False, [7], True)
262+
token = mock_token(False, ["7"], True)
248263
host = 'localhost'
249-
result = access_resolution(request, token, host, [2], [6], [])
250-
assert result == (['PUBLIC'], [2])
264+
result = access_resolution(request, token, host, ["2"], ["6"], [])
265+
self.assertEqual(result, (['PUBLIC'], ["2"]))
251266

252267
def test_access_resolution_controlled_some(self):
253268
"""Test assumptions for access resolution for requested controlled some datasets.
254269
255270
It is based on the result of fetch_datasets_access function.
256271
"""
257272
request = PARAMS
258-
token = mock_token(False, [5], True)
273+
token = mock_token(False, ["5"], True)
259274
host = 'localhost'
260-
result = access_resolution(request, token, host, [], [], [5, 6])
261-
assert result == (['CONTROLLED'], [5])
275+
result = access_resolution(request, token, host, [], [], ["5", "6"])
276+
self.assertEqual(result, (['CONTROLLED'], ["5"]))
262277

263278
def test_access_resolution_controlled_no_perms_public(self):
264279
"""Test assumptions for access resolution for requested controlled and public, returning public only.
@@ -268,8 +283,8 @@ def test_access_resolution_controlled_no_perms_public(self):
268283
request = PARAMS
269284
token = mock_token(False, [], False)
270285
host = 'localhost'
271-
result = access_resolution(request, token, host, [1], [], [5])
272-
assert result == (['PUBLIC'], [1])
286+
result = access_resolution(request, token, host, ["1"], [], ["5"])
287+
self.assertEqual(result, (['PUBLIC'], ["1"]))
273288

274289
def test_access_resolution_controlled_no_perms_bonafide(self):
275290
"""Test assumptions for access resolution for requested controlled and registered, returning registered only.
@@ -279,8 +294,8 @@ def test_access_resolution_controlled_no_perms_bonafide(self):
279294
request = PARAMS
280295
token = mock_token(True, [], True)
281296
host = 'localhost'
282-
result = access_resolution(request, token, host, [], [4], [7])
283-
assert result == (['REGISTERED'], [4])
297+
result = access_resolution(request, token, host, [], ["4"], ["7"])
298+
self.assertEqual(result, (['REGISTERED'], ["4"]))
284299

285300
def test_access_resolution_controlled_never_reached(self):
286301
"""Test assumptions for access resolution for requested controlled unauthorized.
@@ -292,7 +307,7 @@ def test_access_resolution_controlled_never_reached(self):
292307
token = mock_token(False, None, False)
293308
host = 'localhost'
294309
with self.assertRaises(aiohttp.web_exceptions.HTTPUnauthorized):
295-
access_resolution(request, token, host, [], [], [8])
310+
access_resolution(request, token, host, [], [], ["8"])
296311

297312
def test_access_resolution_controlled_never_reached2(self):
298313
"""Test assumptions for access resolution for requested controlled forbidden.
@@ -304,7 +319,7 @@ def test_access_resolution_controlled_never_reached2(self):
304319
token = mock_token(False, None, True)
305320
host = 'localhost'
306321
with self.assertRaises(aiohttp.web_exceptions.HTTPForbidden):
307-
access_resolution(request, token, host, [], [], [8])
322+
access_resolution(request, token, host, [], [], ["8"])
308323

309324
@asynctest.mock.patch('beacon_api.permissions.ga4gh.validate_passport')
310325
async def test_ga4gh_controlled(self, m_validation):

tests/test_db_load.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ async def test_check_tables(self, db_mock):
225225
db_mock.assert_called()
226226
result = await self._db.check_tables(['DATATSET1', 'DATATSET2'])
227227
# No Missing tables
228-
assert result == []
228+
self.assertEqual(result, [])
229229

230230
@asynctest.mock.patch('beacon_api.utils.db_load.LOG')
231231
@asynctest.mock.patch('beacon_api.utils.db_load.asyncpg.connect')

0 commit comments

Comments
 (0)