Skip to content

Commit

Permalink
pre-commit
Browse files Browse the repository at this point in the history
  • Loading branch information
ColeHiggins2 committed Jan 9, 2025
1 parent 69dcc96 commit 66f7612
Showing 1 changed file with 48 additions and 12 deletions.
60 changes: 48 additions & 12 deletions tests/foreman/ui/test_activationkey.py
Original file line number Diff line number Diff line change
Expand Up @@ -172,7 +172,9 @@ def test_positive_search_scoped(session, module_org, target_sat):

@pytest.mark.tier2
@pytest.mark.upgrade
def test_positive_create_with_host_collection(session, module_org, module_target_sat, module_lce, module_promoted_cv):
def test_positive_create_with_host_collection(
session, module_org, module_target_sat, module_lce, module_promoted_cv
):
"""Create Activation key with Host Collection
:id: 0e4ad2b4-47a7-4087-828f-2b0535a97b69
Expand All @@ -182,7 +184,9 @@ def test_positive_create_with_host_collection(session, module_org, module_target
name = gen_string('alpha')
hc = module_target_sat.api.HostCollection(organization=module_org).create()
with session:
session.activationkey.create({'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name})
session.activationkey.create(
{'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}
)
assert session.activationkey.search(name)[0]['Name'] == name
session.activationkey.add_host_collection(name, hc.name)
ak = session.activationkey.read(name, widget_names='host_collections')
Expand Down Expand Up @@ -215,7 +219,9 @@ def test_positive_create_with_envs(session, module_org, target_sat):


@pytest.mark.tier2
def test_positive_add_host_collection_non_admin(module_org, test_name, target_sat, module_lce, module_promoted_cv):
def test_positive_add_host_collection_non_admin(
module_org, test_name, target_sat, module_lce, module_promoted_cv
):
"""Test that host collection can be associated to Activation Keys by
non-admin user.
Expand All @@ -242,7 +248,13 @@ def test_positive_add_host_collection_non_admin(module_org, test_name, target_sa
admin=False, role=roles, password=password, organization=[module_org]
).create()
with target_sat.ui_session(test_name, user=user.login, password=password) as session:
session.activationkey.create({'name': ak_name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name})
session.activationkey.create(
{
'name': ak_name,
'lce': {module_lce.name: True},
'content_view': module_promoted_cv.name,
}
)
assert session.activationkey.search(ak_name)[0]['Name'] == ak_name
session.activationkey.add_host_collection(ak_name, hc.name)
ak = session.activationkey.read(ak_name, widget_names='host_collections')
Expand All @@ -251,7 +263,9 @@ def test_positive_add_host_collection_non_admin(module_org, test_name, target_sa

@pytest.mark.tier2
@pytest.mark.upgrade
def test_positive_remove_host_collection_non_admin(module_org, test_name, target_sat, module_lce, module_promoted_cv):
def test_positive_remove_host_collection_non_admin(
module_org, test_name, target_sat, module_lce, module_promoted_cv
):
"""Test that host collection can be removed from Activation Keys by
non-admin user.
Expand All @@ -276,7 +290,13 @@ def test_positive_remove_host_collection_non_admin(module_org, test_name, target
admin=False, role=roles, password=password, organization=[module_org]
).create()
with target_sat.ui_session(test_name, user=user.login, password=password) as session:
session.activationkey.create({'name': ak_name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name})
session.activationkey.create(
{
'name': ak_name,
'lce': {module_lce.name: True},
'content_view': module_promoted_cv.name,
}
)
assert session.activationkey.search(ak_name)[0]['Name'] == ak_name
session.activationkey.add_host_collection(ak_name, hc.name)
ak = session.activationkey.read(ak_name, widget_names='host_collections')
Expand All @@ -302,7 +322,9 @@ def test_positive_delete_with_env(session, module_org, target_sat):
repo_id = target_sat.api_factory.create_sync_custom_repo(module_org.id)
target_sat.api_factory.cv_publish_promote(cv_name, env_name, repo_id, module_org.id)
with session:
session.activationkey.create({'name': name, 'lce': {env_name: True}, 'content_view': cv_name})
session.activationkey.create(
{'name': name, 'lce': {env_name: True}, 'content_view': cv_name}
)
assert session.activationkey.search(name)[0]['Name'] == name
session.activationkey.delete(name)
assert session.activationkey.search(name)[0]['Name'] != name
Expand Down Expand Up @@ -348,7 +370,9 @@ def test_positive_update_env(session, module_org, target_sat):
repo_id = target_sat.api_factory.create_sync_custom_repo(module_org.id)
target_sat.api_factory.cv_publish_promote(cv_name, env_name, repo_id, module_org.id)
with session:
session.activationkey.create({'name': name, 'lce': {constants.ENVIRONMENT: True}, 'content_view': cv_name})
session.activationkey.create(
{'name': name, 'lce': {constants.ENVIRONMENT: True}, 'content_view': cv_name}
)
assert session.activationkey.search(name)[0]['Name'] == name
ak = session.activationkey.read(name, widget_names='details')
assert ak['details']['lce'][env_name][constants.ENVIRONMENT]
Expand Down Expand Up @@ -713,7 +737,9 @@ def test_positive_access_non_admin_user(session, test_name, target_sat):


@pytest.mark.tier2
def test_positive_remove_user(session, module_org, test_name, module_target_sat, module_lce, module_promoted_cv):
def test_positive_remove_user(
session, module_org, test_name, module_target_sat, module_lce, module_promoted_cv
):
"""Delete any user who has previously created an activation key
and check that activation key still exists
Expand All @@ -731,7 +757,13 @@ def test_positive_remove_user(session, module_org, test_name, module_target_sat,
).create()
# Create Activation Key using new user credentials
with module_target_sat.ui_session(test_name, user.login, password) as non_admin_session:
non_admin_session.activationkey.create({'name': ak_name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name})
non_admin_session.activationkey.create(
{
'name': ak_name,
'lce': {module_lce.name: True},
'content_view': module_promoted_cv.name,
}
)
assert non_admin_session.activationkey.search(ak_name)[0]['Name'] == ak_name
# Remove user and check that AK still exists
user.delete()
Expand Down Expand Up @@ -815,7 +847,9 @@ def test_positive_add_docker_repo_ccv(session, module_org, module_target_sat):


@pytest.mark.tier3
def test_positive_add_host(session, module_org, rhel_contenthost, target_sat, module_promoted_cv, module_lce):
def test_positive_add_host(
session, module_org, rhel_contenthost, target_sat, module_promoted_cv, module_lce
):
"""Test that hosts can be associated to Activation Keys
:id: 886e9ea5-d917-40e0-a3b1-41254c4bf5bf
Expand Down Expand Up @@ -901,7 +935,9 @@ def test_negative_usage_limit(session, module_org, target_sat, module_promoted_c
name = gen_string('alpha')
hosts_limit = '1'
with session:
session.activationkey.create({'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name})
session.activationkey.create(
{'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}
)
assert session.activationkey.search(name)[0]['Name'] == name
session.activationkey.update(name, {'details.hosts_limit': hosts_limit})
ak = session.activationkey.read(name, widget_names='details')
Expand Down

0 comments on commit 66f7612

Please sign in to comment.