forked from canada-ca/tracker
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathtest_auth_functions.py
More file actions
106 lines (84 loc) · 3.86 KB
/
test_auth_functions.py
File metadata and controls
106 lines (84 loc) · 3.86 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
import pytest
from models import Users, User_affiliations, Organizations
from functions.auth_functions import (
is_super_admin,
is_admin,
is_user_write,
is_user_read,
)
class TestAuthFunctions:
def test_user_read_check_perm_user_read(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": "user_read"}]
org_id = 1
assert is_user_read(user_role, org_id)
def test_user_read_check_perm_user_write(self):
user_role = [{"user_id": 2, "org_id": 1, "permission": "user_write"}]
org_id = 1
assert is_user_read(user_role, org_id)
def test_user_read_check_perm_user_admin(self):
user_role = [{"user_id": 3, "org_id": 1, "permission": "admin"}]
org_id = 1
assert is_user_read(user_role, org_id)
def test_user_read_check_perm_super_admin(self):
user_role = [{"user_id": 4, "org_id": 1, "permission": "super_admin"}]
org_id = 1
assert is_user_read(user_role, org_id)
def test_user_read_check_invalid(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": ""}]
org_id = 1
assert not is_user_read(user_role, org_id)
def test_user_write_check_perm_user_read(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": "user_read"}]
org_id = 1
assert not is_user_write(user_role, org_id)
def test_user_write_check_perm_user_write(self):
user_role = [{"user_id": 2, "org_id": 1, "permission": "user_write"}]
org_id = 1
assert is_user_write(user_role, org_id)
def test_user_write_check_perm_user_admin(self):
user_role = [{"user_id": 3, "org_id": 1, "permission": "admin"}]
org_id = 1
assert is_user_write(user_role, org_id)
def test_user_write_check_perm_super_admin(self):
user_role = [{"user_id": 4, "org_id": 1, "permission": "super_admin"}]
org_id = 1
assert is_user_write(user_role, org_id)
def test_user_write_check_invalid(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": ""}]
org_id = 1
assert not is_user_write(user_role, org_id)
def test_admin_check_perm_user_read(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": "user_read"}]
org_id = 1
assert not is_admin(user_role, org_id)
def test_admin_check_perm_user_write(self):
user_role = [{"user_id": 2, "org_id": 1, "permission": "user_write"}]
org_id = 1
assert not is_admin(user_role, org_id)
def test_admin_check_perm_user_admin(self):
user_role = [{"user_id": 3, "org_id": 1, "permission": "admin"}]
org_id = 1
assert is_admin(user_role, org_id)
def test_admin_check_perm_super_admin(self):
user_role = [{"user_id": 4, "org_id": 1, "permission": "super_admin"}]
org_id = 1
assert is_admin(user_role, org_id)
def test_admin_check_invalid(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": ""}]
org_id = 1
assert not is_admin(user_role, org_id)
def test_super_admin_check_perm_user_read(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": "user_read"}]
assert not is_super_admin(user_role)
def test_super_admin_check_perm_user_write(self):
user_role = [{"user_id": 2, "org_id": 1, "permission": "user_write"}]
assert not is_super_admin(user_role)
def test_super_admin_check_perm_user_admin(self):
user_role = [{"user_id": 3, "org_id": 1, "permission": "admin"}]
assert not is_super_admin(user_role)
def test_super_admin_check_perm_super_admin(self):
user_role = [{"user_id": 4, "org_id": 1, "permission": "super_admin"}]
assert is_super_admin(user_role)
def test_super_admin_check_invalid(self):
user_role = [{"user_id": 1, "org_id": 1, "permission": ""}]
assert not is_super_admin(user_role)