From 66f76120d524651427f63139a3780cd8aab94fea Mon Sep 17 00:00:00 2001 From: Cole Higgins Date: Thu, 9 Jan 2025 16:41:06 -0500 Subject: [PATCH] pre-commit --- tests/foreman/ui/test_activationkey.py | 60 ++++++++++++++++++++------ 1 file changed, 48 insertions(+), 12 deletions(-) diff --git a/tests/foreman/ui/test_activationkey.py b/tests/foreman/ui/test_activationkey.py index 314f7d7a9b6..4aac9d70de7 100644 --- a/tests/foreman/ui/test_activationkey.py +++ b/tests/foreman/ui/test_activationkey.py @@ -172,7 +172,9 @@ def test_positive_search_scoped(session, module_org, target_sat): @pytest.mark.tier2 @pytest.mark.upgrade -def test_positive_create_with_host_collection(session, module_org, module_target_sat, module_lce, module_promoted_cv): +def test_positive_create_with_host_collection( + session, module_org, module_target_sat, module_lce, module_promoted_cv +): """Create Activation key with Host Collection :id: 0e4ad2b4-47a7-4087-828f-2b0535a97b69 @@ -182,7 +184,9 @@ def test_positive_create_with_host_collection(session, module_org, module_target name = gen_string('alpha') hc = module_target_sat.api.HostCollection(organization=module_org).create() with session: - session.activationkey.create({'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}) + session.activationkey.create( + {'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name} + ) assert session.activationkey.search(name)[0]['Name'] == name session.activationkey.add_host_collection(name, hc.name) ak = session.activationkey.read(name, widget_names='host_collections') @@ -215,7 +219,9 @@ def test_positive_create_with_envs(session, module_org, target_sat): @pytest.mark.tier2 -def test_positive_add_host_collection_non_admin(module_org, test_name, target_sat, module_lce, module_promoted_cv): +def test_positive_add_host_collection_non_admin( + module_org, test_name, target_sat, module_lce, module_promoted_cv +): """Test that host collection can be associated to Activation Keys by non-admin user. @@ -242,7 +248,13 @@ def test_positive_add_host_collection_non_admin(module_org, test_name, target_sa admin=False, role=roles, password=password, organization=[module_org] ).create() with target_sat.ui_session(test_name, user=user.login, password=password) as session: - session.activationkey.create({'name': ak_name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}) + session.activationkey.create( + { + 'name': ak_name, + 'lce': {module_lce.name: True}, + 'content_view': module_promoted_cv.name, + } + ) assert session.activationkey.search(ak_name)[0]['Name'] == ak_name session.activationkey.add_host_collection(ak_name, hc.name) ak = session.activationkey.read(ak_name, widget_names='host_collections') @@ -251,7 +263,9 @@ def test_positive_add_host_collection_non_admin(module_org, test_name, target_sa @pytest.mark.tier2 @pytest.mark.upgrade -def test_positive_remove_host_collection_non_admin(module_org, test_name, target_sat, module_lce, module_promoted_cv): +def test_positive_remove_host_collection_non_admin( + module_org, test_name, target_sat, module_lce, module_promoted_cv +): """Test that host collection can be removed from Activation Keys by non-admin user. @@ -276,7 +290,13 @@ def test_positive_remove_host_collection_non_admin(module_org, test_name, target admin=False, role=roles, password=password, organization=[module_org] ).create() with target_sat.ui_session(test_name, user=user.login, password=password) as session: - session.activationkey.create({'name': ak_name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}) + session.activationkey.create( + { + 'name': ak_name, + 'lce': {module_lce.name: True}, + 'content_view': module_promoted_cv.name, + } + ) assert session.activationkey.search(ak_name)[0]['Name'] == ak_name session.activationkey.add_host_collection(ak_name, hc.name) ak = session.activationkey.read(ak_name, widget_names='host_collections') @@ -302,7 +322,9 @@ def test_positive_delete_with_env(session, module_org, target_sat): repo_id = target_sat.api_factory.create_sync_custom_repo(module_org.id) target_sat.api_factory.cv_publish_promote(cv_name, env_name, repo_id, module_org.id) with session: - session.activationkey.create({'name': name, 'lce': {env_name: True}, 'content_view': cv_name}) + session.activationkey.create( + {'name': name, 'lce': {env_name: True}, 'content_view': cv_name} + ) assert session.activationkey.search(name)[0]['Name'] == name session.activationkey.delete(name) assert session.activationkey.search(name)[0]['Name'] != name @@ -348,7 +370,9 @@ def test_positive_update_env(session, module_org, target_sat): repo_id = target_sat.api_factory.create_sync_custom_repo(module_org.id) target_sat.api_factory.cv_publish_promote(cv_name, env_name, repo_id, module_org.id) with session: - session.activationkey.create({'name': name, 'lce': {constants.ENVIRONMENT: True}, 'content_view': cv_name}) + session.activationkey.create( + {'name': name, 'lce': {constants.ENVIRONMENT: True}, 'content_view': cv_name} + ) assert session.activationkey.search(name)[0]['Name'] == name ak = session.activationkey.read(name, widget_names='details') assert ak['details']['lce'][env_name][constants.ENVIRONMENT] @@ -713,7 +737,9 @@ def test_positive_access_non_admin_user(session, test_name, target_sat): @pytest.mark.tier2 -def test_positive_remove_user(session, module_org, test_name, module_target_sat, module_lce, module_promoted_cv): +def test_positive_remove_user( + session, module_org, test_name, module_target_sat, module_lce, module_promoted_cv +): """Delete any user who has previously created an activation key and check that activation key still exists @@ -731,7 +757,13 @@ def test_positive_remove_user(session, module_org, test_name, module_target_sat, ).create() # Create Activation Key using new user credentials with module_target_sat.ui_session(test_name, user.login, password) as non_admin_session: - non_admin_session.activationkey.create({'name': ak_name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}) + non_admin_session.activationkey.create( + { + 'name': ak_name, + 'lce': {module_lce.name: True}, + 'content_view': module_promoted_cv.name, + } + ) assert non_admin_session.activationkey.search(ak_name)[0]['Name'] == ak_name # Remove user and check that AK still exists user.delete() @@ -815,7 +847,9 @@ def test_positive_add_docker_repo_ccv(session, module_org, module_target_sat): @pytest.mark.tier3 -def test_positive_add_host(session, module_org, rhel_contenthost, target_sat, module_promoted_cv, module_lce): +def test_positive_add_host( + session, module_org, rhel_contenthost, target_sat, module_promoted_cv, module_lce +): """Test that hosts can be associated to Activation Keys :id: 886e9ea5-d917-40e0-a3b1-41254c4bf5bf @@ -901,7 +935,9 @@ def test_negative_usage_limit(session, module_org, target_sat, module_promoted_c name = gen_string('alpha') hosts_limit = '1' with session: - session.activationkey.create({'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name}) + session.activationkey.create( + {'name': name, 'lce': {module_lce.name: True}, 'content_view': module_promoted_cv.name} + ) assert session.activationkey.search(name)[0]['Name'] == name session.activationkey.update(name, {'details.hosts_limit': hosts_limit}) ak = session.activationkey.read(name, widget_names='details')