Files
centurion_erp/app/access/tests/test_model_app_structure.py
Jon 0edfba604a refactor: rename app from itsm -> app
used app as this is a root application and not a django project app

!1
2024-05-13 17:46:58 +09:30

192 lines
5.0 KiB
Python

from django.test import TestCase
import pytest
import requests
import unittest
from django.contrib.auth import get_user_model
from django.core.exceptions import ValidationError
from access.models import Organization, Team
# @pytest.fixture
# def organization() -> Organization:
# return Organization.objects.create(
# name='Test org',
# )
# @pytest.fixture
# def team() -> Team:
# return Team.objects.create(
# name='Team one',
# organization = Organization.objects.create(
# name='Test org',
# ),
# )
######################################################################
# SoF for loop for tests
# for test in ['organization','team', 'users']
#
# permissions for each item as per the action plus view of the parent item
######################################################################
@pytest.mark.skip(reason="to be written")
def test_authorization_organization_view(user):
"""User of organization can view
user requires permissions organization view
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_organization_no_view(user):
"""User not part of organization cant view
user requires permissions organization view
"""
pass
###################################################################
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_view(user):
""" Ensure team can be viewed when user has correct permissions
user requires permissions organization view and team view
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_no_view(user):
""" Ensure team can't be viewed when user is missing permissions
user requires permissions organization view and team view
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_add(user):
"""Ensure team can be added when user has correct permissions
user requires permissions organization view and team add
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_no_view(user):
"""Ensure team can't be added when user is missing permissions
user requires permissions organization view and team add
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_change(user):
"""Ensure team can be changed when user has correct permissions
user requires permissions organization view and team change
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_no_change(user):
"""Ensure team can't be change when user is missing permissions
user requires permissions organization view and team change
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_delete(user):
"""Ensure team can be deleted when user has correct permissions
user requires permissions organization view and team delete
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_team_permission_no_delete(user):
"""Ensure team can't be deleted when user is missing permissions
user requires permissions organization view and team delete
"""
pass
###################################################################
@pytest.mark.skip(reason="to be written")
def test_authorization_user_permission_add(user):
"""Ensure user can be added when user has correct permissions
user requires permissions team view and user add
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_user_permission_no_view(user):
"""Ensure user can't be added when user is missing permissions
user requires permissions team view and user add
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_user_permission_change(user):
"""Ensure user can be changed when user has correct permissions
user requires permissions team view and user change
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_user_permission_no_change(user):
"""Ensure user can't be change when user is missing permissions
user requires permissions team view and user change
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_user_permission_delete(user):
"""Ensure user can be deleted when user has correct permissions
user requires permissions team view and user delete
"""
pass
@pytest.mark.skip(reason="to be written")
def test_authorization_user_permission_no_delete(user):
"""Ensure user can't be deleted when user is missing permissions
user requires permissions team view and user delete
"""
pass
######################################################################
# EoF for loop for tests
# for test in ['organization','team']
######################################################################
# is_superuser to be able to view, add, change, delete for all objects