def test_EWA_1941_delete_group_with_deleted_id(self, delete_after_add_group): logger.debug('Delete Groups : test deleted group with deleted id') group_delete_url = base_url + apis.delete_group_endpoint + str(len(delete_after_add_group) - 1) response = webservice.delete(url=group_delete_url, token=admin_token) assert response.status_code == 200 response = webservice.delete(url=group_delete_url, token=admin_token) response_data = response.json() assert response_data['responseCode'] == groups_data.get('delete_group_with_deleted_id_response').get('responseCode') assert response_data['message'] == groups_data.get('delete_group_with_deleted_id_response').get('message')
def test_EWA_1987_delete_rol_with_deleted_id(self, delete_after_add_role): logger.debug('Delete roless : test deleted role with deleted id') role_delete_url = base_url + apis.delete_role_endpoint + str( len(delete_after_add_role) - 1) response = webservice.delete(url=role_delete_url, token=admin_token) assert response.status_code == 200 response = webservice.delete(url=role_delete_url, token=admin_token) response_data = response.json() assert response_data['responseCode'] == roles_data.get( 'delete_role_with_deleted_id_response').get('responseCode') assert response_data['message'] == roles_data.get( 'delete_role_with_deleted_id_response').get('message')
def test_EWA_1966_pass_null_authorization_token_deleterole( self, delete_after_add_role): logger.debug('Delete roles : test invalid authorization token') role_delete_url = base_url + apis.delete_role_endpoint + str( len(delete_after_add_role) - 1) response = webservice.delete(url=role_delete_url, token=None) assert response.status_code == 401
def test_EWA_1902_empty_authorization_token_deleteGrade( self, delete_after_add_grade): logger.debug('Delete Grades : test empty authorization token') grade_delete_url = base_url + apis.delete_grade_endpoint + str( delete_after_add_grade[0]) response = webservice.delete(url=grade_delete_url, token=None) assert response.status_code == 401
def test_EWA_1905_invalid_authorization_token_deleteGrade( self, delete_after_add_grade): logger.debug('Delete Grades : test invalid authorization token') grade_delete_url = base_url + apis.delete_grade_endpoint + str( len(delete_after_add_grade) - 1) response = webservice.delete(url=grade_delete_url, token=admin_token[::-1]) assert response.status_code == 401
def test_EWA_1935_pass_deleted_group_id_toedit(self, delete_after_add_group): logger.debug('Edit groups : test null authorization token') #taking the last group from the group list which has to be deleted and deleting it in this test case edit_group_url = base_url + apis.edit_group_info_endpoint + str(len(delete_after_add_group)-1) #deleting the group which has to be edited, before editing it group_delete_url = base_url + apis.delete_group_endpoint + str(len(delete_after_add_group)-1) response = webservice.delete(url=group_delete_url, token=admin_token) assert response.status_code == 200 edit_group_payload = groups_data.get('edit_group') response = webservice.put(url=edit_group_url, token=admin_token, data=json.dumps(edit_group_payload)) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == groups_data.get('edit_group_with_deleted_id_response').get('responseCode') assert response_data['message'] == groups_data.get('edit_group_with_deleted_id_response').get('message')
def test_1984_pass_deletedID_to_editRole(self, delete_after_add_role): logger.debug('Edit roless : test null authorization token') # taking the last role from the role list which has to be deleted and deleting it in this test case edit_role_url = base_url + apis.edit_role_endpoint + str( len(delete_after_add_role) - 1) # deleting the roles which has to be edited, before editing it role_delete_url = base_url + apis.delete_role_endpoint + str( len(delete_after_add_role) - 1) response = webservice.delete(url=role_delete_url, token=admin_token) assert response.status_code == 200 edit_role_payload = roles_data.get('edit_role') response = webservice.put(url=edit_role_url, token=admin_token, data=json.dumps(edit_role_payload)) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == roles_data.get( 'edit_role_with_deleted_id_response').get('responseCode') assert response_data['message'] == roles_data.get( 'edit_role_with_deleted_id_response').get('message')
def cleanup(): for roles_id in roles_added: role_delete_url = base_url + apis.delete_role_endpoint + str( roles_id) webservice.delete(url=role_delete_url, token=admin_token) print " Role Deleted ..."
def test_EWA_1978_delete_role_id(self, delete_after_add_role): logger.debug('Delete Groups : Test delete group') role_delete_url = base_url + apis.delete_role_endpoint + str( len(delete_after_add_role) - 1) response = webservice.delete(url=role_delete_url, token=admin_token) assert response.status_code == 200
def cleanup(): for email in users_added: remove_user = apis.remove_user_endpoint + email webservice.delete(url=base_url + remove_user, token=admin_token) logger.debug(" User Deleted ..." + email)
def cleanup(): for group_id in groups_added: group_delete_url = base_url + apis.delete_group_endpoint + str(group_id) webservice.delete(url=group_delete_url, token=admin_token) print " Group Deleted ..."
def test_EWA_1919_null_authorization_token_deleteGroup(self, delete_after_add_group): logger.debug('Delete Groups : test null authorization token') group_delete_url = base_url + apis.delete_group_endpoint + str(len(delete_after_add_group) - 1) response = webservice.delete(url=group_delete_url, token=None) assert response.status_code == 401
def test_EWA_1939_1995_delete_grade_id(self, delete_after_add_grade): logger.debug('Delete Grades : Test delete grade') grade_delete_url = base_url + apis.delete_grade_endpoint + str( len(delete_after_add_grade) - 1) response = webservice.delete(url=grade_delete_url, token=admin_token) assert response.status_code == 200