def test_EWA_6069_validate_groups_schema(self): logger.debug('HR Admin Data: test_validate_get_schema') response = webservice.get(url=base_url + apis.hr_admin_data_endpoint, token=hr_token) logger.debug('HR Admin Data: Validating json schema') utils.assert_valid_schema(response.json(), TestHrAdminData.admin_schema)
def test_EWA_1917_non_admin_token_getGroupList(self): logger.debug('group List: test with non admin authorization token') response = webservice.get(url=base_url + apis.group_list_endpoint, token=setup_test.get_employee_token()) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == groups_data.get('non_admin_token_response').get('responseCode') assert response_data['message'] == groups_data.get('non_admin_token_response').get('message')
def test_1967_Edit_role_description(self, delete_after_add_role): logger.debug('Edit Roles : by changing the Role name') edit_role_url = base_url + apis.edit_role_endpoint + str( delete_after_add_role[0]) edit_role_payload = roles_helper.edit_role_data() response = webservice.put(url=edit_role_url, token=admin_token, data=json.dumps(edit_role_payload)) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == roles_data.get( 'edit_role_response').get('responseCode') assert response_data['message'] == roles_data.get( 'edit_role_response').get('message') group_id = roles_helper.get_group_list()[0] get_roles_list_url = base_url + apis.roles_list_enpoint + "group=" + ( str(group_id['groupId'])) role_list_response = webservice.get(url=get_roles_list_url, token=admin_token) role_list_response = role_list_response.json()['rolesList'] result = utils.get_id_in_list(id=delete_after_add_role[0], lst=role_list_response, id_name="roleId") assert result['roleName'] == edit_role_payload['roleName'] assert result['roleDescription'] == edit_role_payload[ 'roleDescription']
def test_EWA_6070_non_hr_token(self): logger.debug('HR Admin Data: test invalid authorization token') response = webservice.get(url=base_url + apis.hr_admin_data_endpoint, token=admin_token) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == 401 assert response_data['message'] == 'Permission denied'
def test_1980_getAllRoles_passing_empty_token(self): logger.debug( 'get Roles : get all roles accessed by passing Empty Token') group_id = roles_helper.get_group_list()[0] get_roles_url = base_url + apis.roles_list_enpoint + "group=" + (str( group_id['groupId'])) response = webservice.get(url=get_roles_url, token=None) assert response.status_code == 401
def test_1982_pass_null_authorization_token(self): logger.debug( 'get Roles : get all roles accessed by passing Empty Token') group_id = roles_helper.get_group_list()[0] get_roles_url = base_url + apis.roles_list_enpoint + "group=" + (str( group_id['groupId'])) response = webservice.get(url=get_roles_url, token='invalid token') assert response.status_code == 401
def test_EWA_2011_permission_data(self, test_setup, admin_token): logger.debug('Permissions: test_validate_permissions_schema') response = webservice.get(url=test_setup['url'], token=admin_token) response_data = response.json() permissions = utils.encode_to_ascii(response_data['permissions']) logger.debug('Permissions: Validating json data') assert response_data['message'].encode( "ascii", "ignore") == permissions_data.get_all_permisssions.message assert permissions == permissions_data.get_all_permisssions.permissions
def test_1981_passing_non_admin_token(self): logger.debug( 'get Roles : get all roles accessed by passing Empty Token') group_id = roles_helper.get_group_list()[0] get_roles_url = base_url + apis.roles_list_enpoint + "group=" + (str( group_id['groupId'])) response = webservice.get(url=get_roles_url, token=non_admin_token) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == roles_data.get( 'non_admin_token_response').get('responseCode') assert response_data['message'] == roles_data.get( 'non_admin_token_response').get('message')
def test_1965_get_all_roles(self, delete_after_add_role): roles_get_payload = roles_helper.get_roleList() logger.debug('get Roles : get all roles accessed') group_id = roles_helper.get_group_list()[0] get_roles_list_url = base_url + apis.roles_list_enpoint + "group=" + ( str(group_id['groupId'])) role_list_response = webservice.get(url=get_roles_list_url, token=admin_token) role_list_response = role_list_response.json()['rolesList'] result = utils.get_id_in_list(id=delete_after_add_role[0], lst=role_list_response, id_name="roleId") assert result['roleName'] == roles_get_payload['roleName'] assert result['roleDescription'] == roles_get_payload[ 'roleDescription']
def test_EWA_1910_edit_group_info(self, delete_after_add_group): logger.debug('Edit groups : test null authorization token') edit_group_url = base_url + apis.edit_group_info_endpoint + str(delete_after_add_group[0]) edit_group_payload = groups_data.get('edit_group') response = webservice.put(url=edit_group_url, token=admin_token, data=json.dumps(edit_group_payload)) response_data = response.json() assert response.status_code == 200 assert response_data['responseCode'] == groups_data.get('edit_group_response').get('responseCode') assert response_data['message'] == groups_data.get('edit_group_response').get('message') #validate that the value has been edited as expected group_list_response = webservice.get(url=base_url + apis.group_list_endpoint, token=admin_token) group_list_response = group_list_response.json()['groups'] result = utils.get_id_in_list(id=delete_after_add_group[0], lst=group_list_response, id_name="groupId") assert result['groupName'] == edit_group_payload['groupName'] assert result['groupDescription'] == edit_group_payload['groupDescription']
def test_EWA_1898_pass_invalid_authorization_token(self): logger.debug('group List: test invalid authorization token') response = webservice.get(url=base_url + apis.group_list_endpoint, token=admin_token[::-1]) # reverse token assert response.status_code == 401
def test_validate_permissions_schema(self, test_setup, admin_token): logger.debug('Permissions: test_validate_permissions_schema') response = webservice.get(url=test_setup['url'], token=admin_token) logger.debug('Permissions: Validating json schema') utils.assert_valid_schema(response.json(), test_setup['schema'])
def test_EWA_1897_pass_empty_authorization_token(self): logger.debug('Grade List: test invalid authorization token') response = webservice.get(url=base_url + apis.grade_list_endpoint, token='') assert response.status_code == 401
def test_EWA_6071_pass_null_authorization_token(self): logger.debug('HR Admin Data:test_validate_permissions_schema') response = webservice.get(url=base_url + apis.hr_admin_data_endpoint, token=None) assert response.status_code == 401
def test_EWA_2013_pass_invalid_authorization_token(self, test_setup, admin_token): logger.debug('Permissions: test invalid authorization token') response = webservice.get(url=test_setup['url'], token=admin_token[::-1]) # reverse token assert response.status_code == 401
def test_validate_Groups_schema(self): logger.debug('group List: test_validate_Groupss_schema') response = webservice.get(url=base_url + apis.group_list_endpoint, token=admin_token) logger.debug('Groups: Validating json schema') utils.assert_valid_schema(response.json(), TestGroupsApi.group_schema)
def test_EWA_2014_pass_empty_authorization_token(self, test_setup): logger.debug('Permissions: test invalid authorization token') response = webservice.get(url=test_setup['url'], token='') # reverse token assert response.status_code == 401
def test_EWA_2012_pass_null_authorization_token(self, test_setup): logger.debug('Permissions: test_validate_permissions_schema') response = webservice.get(url=test_setup['url'], token=None) assert response.status_code == 401
def test_EWA_1918_null_authorization_getGroupList(self): logger.debug('group List: test_validate_Groups_schema') response = webservice.get(url=base_url + apis.group_list_endpoint, token=None) assert response.status_code == 401
def test_EWA_1916_empty_authorization_token_getGroupList(self): logger.debug('group List: test invalid authorization token') response = webservice.get(url=base_url + apis.group_list_endpoint, token='') assert response.status_code == 401
def test_EWA_6073_pass_empty_authorization_token(self): logger.debug('HR Admin Data: test invalid authorization token') response = webservice.get(url=base_url + apis.hr_admin_data_endpoint, token='') assert response.status_code == 401
def test_EWA_1899_pass_null_authorization_token(self): logger.debug('Grade List: test_validate_Grades_schema') response = webservice.get(url=base_url + apis.grade_list_endpoint, token=None) assert response.status_code == 401