Implement divisions
This commit is contained in:
@@ -6,6 +6,7 @@ from sqlmodel import Session
|
||||
|
||||
from app.core.config import settings
|
||||
from app.tests.utils.association import create_random_association
|
||||
from app.tests.utils.division import create_random_division
|
||||
|
||||
|
||||
def test_create_association(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
@@ -182,3 +183,40 @@ def test_delete_association_no_permissions(client: TestClient, normal_user_token
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
assert response.json()["detail"] == "Not enough permissions"
|
||||
|
||||
|
||||
def test_read_association_divisions(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
association = create_random_association(db)
|
||||
create_random_division(db, association=association)
|
||||
create_random_division(db, association=association)
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/associations/{association.id}/divisions",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
content = response.json()
|
||||
assert "count" in content
|
||||
assert content["count"] == 2
|
||||
assert "data" in content
|
||||
assert isinstance(content["data"], list)
|
||||
assert len(content["data"]) <= content["count"]
|
||||
|
||||
|
||||
def test_read_association_divisions_not_found(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/associations/{uuid.uuid4()}/divisions",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_404_NOT_FOUND
|
||||
assert response.json()["detail"] == "Association not found"
|
||||
|
||||
|
||||
def test_read_association_divisions_no_permissions(client: TestClient, normal_user_token_headers: dict[str, str], db: Session) -> None:
|
||||
association = create_random_association(db)
|
||||
create_random_division(db, association=association)
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/associations/{association.id}/divisions",
|
||||
headers=normal_user_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
assert response.json()["detail"] == "Not enough permissions"
|
||||
|
||||
191
backend/app/tests/api/routes/test_division.py
Normal file
191
backend/app/tests/api/routes/test_division.py
Normal file
@@ -0,0 +1,191 @@
|
||||
import uuid
|
||||
|
||||
from fastapi import status
|
||||
from fastapi.testclient import TestClient
|
||||
from sqlmodel import Session
|
||||
|
||||
from app.core.config import settings
|
||||
from app.tests.utils.division import create_random_division
|
||||
from app.tests.utils.association import create_random_association
|
||||
|
||||
|
||||
def test_create_division(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
association = create_random_association(db)
|
||||
data = {
|
||||
"name": "Verkenners",
|
||||
"scouting_id": "122314",
|
||||
"association_id": str(association.id),
|
||||
}
|
||||
response = client.post(
|
||||
f"{settings.API_V1_STR}/divisions/",
|
||||
headers=superuser_token_headers,
|
||||
json=data,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
content = response.json()
|
||||
assert content["name"] == data["name"]
|
||||
assert content["scouting_id"] == data["scouting_id"]
|
||||
assert content["association_id"] == str(association.id)
|
||||
assert "contact" in content
|
||||
assert "id" in content
|
||||
|
||||
|
||||
def test_create_division_no_permissions(client: TestClient, normal_user_token_headers: dict[str, str], db: Session) -> None:
|
||||
association = create_random_association(db)
|
||||
data = {
|
||||
"name": "Padvinsters",
|
||||
"contact": "-",
|
||||
"scouting_id": "122323",
|
||||
"association_id": str(association.id),
|
||||
}
|
||||
response = client.post(
|
||||
f"{settings.API_V1_STR}/divisions/",
|
||||
headers=normal_user_token_headers,
|
||||
json=data,
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
assert response.json()["detail"] == "Not enough permissions"
|
||||
|
||||
|
||||
def test_read_division(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
division = create_random_division(db)
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/divisions/{division.id}",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
content = response.json()
|
||||
assert content["id"] == str(division.id)
|
||||
assert content["name"] == division.name
|
||||
assert content["contact"] == division.contact
|
||||
assert content["scouting_id"] == division.scouting_id
|
||||
assert content["association_id"] == str(division.association_id)
|
||||
|
||||
|
||||
def test_read_division_not_found(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/divisions/{uuid.uuid4()}",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_404_NOT_FOUND
|
||||
assert response.json()["detail"] == "Division not found"
|
||||
|
||||
|
||||
def test_read_division_no_permission(client: TestClient, normal_user_token_headers: dict[str, str], db: Session) -> None:
|
||||
division = create_random_division(db)
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/divisions/{division.id}",
|
||||
headers=normal_user_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
assert response.json()["detail"] == "Not enough permissions"
|
||||
|
||||
|
||||
def test_read_divisions(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
create_random_division(db)
|
||||
create_random_division(db)
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/divisions/",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
content = response.json()
|
||||
assert "count" in content
|
||||
assert content["count"] >= 2
|
||||
assert "data" in content
|
||||
assert isinstance(content["data"], list)
|
||||
assert len(content["data"]) <= content["count"]
|
||||
|
||||
|
||||
def test_read_divisions_no_permissions(client: TestClient, normal_user_token_headers: dict[str, str], db: Session) -> None:
|
||||
create_random_division(db)
|
||||
create_random_division(db)
|
||||
response = client.get(
|
||||
f"{settings.API_V1_STR}/divisions/",
|
||||
headers=normal_user_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
content = response.json()
|
||||
assert "count" in content
|
||||
assert content["count"] == 0
|
||||
assert "data" in content
|
||||
assert isinstance(content["data"], list)
|
||||
assert len(content["data"]) == 0
|
||||
|
||||
|
||||
def test_update_division(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
division = create_random_division(db)
|
||||
data = {
|
||||
"name": "Updated name",
|
||||
"contact": "Updated contact",
|
||||
}
|
||||
response = client.put(
|
||||
f"{settings.API_V1_STR}/divisions/{division.id}",
|
||||
headers=superuser_token_headers,
|
||||
json=data,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
content = response.json()
|
||||
assert content["id"] == str(division.id)
|
||||
assert content["name"] == data["name"]
|
||||
assert content["contact"] == data["contact"]
|
||||
assert content["scouting_id"] == division.scouting_id
|
||||
assert content["association_id"] == str(division.association_id)
|
||||
|
||||
|
||||
def test_update_division_not_found(client: TestClient, superuser_token_headers: dict[str, str]) -> None:
|
||||
data = {
|
||||
"name": "Not found",
|
||||
"contact": "Not found",
|
||||
}
|
||||
response = client.put(
|
||||
f"{settings.API_V1_STR}/divisions/{uuid.uuid4()}",
|
||||
headers=superuser_token_headers,
|
||||
json=data,
|
||||
)
|
||||
assert response.status_code == status.HTTP_404_NOT_FOUND
|
||||
assert response.json()["detail"] == "Division not found"
|
||||
|
||||
|
||||
def test_update_division_no_permissions(client: TestClient, normal_user_token_headers: dict[str, str], db: Session) -> None:
|
||||
division = create_random_division(db)
|
||||
data = {
|
||||
"name": "No permissions",
|
||||
"contact": "No permissions",
|
||||
}
|
||||
response = client.put(
|
||||
f"{settings.API_V1_STR}/divisions/{division.id}",
|
||||
headers=normal_user_token_headers,
|
||||
json=data,
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
assert response.json()["detail"] == "Not enough permissions"
|
||||
|
||||
|
||||
def test_delete_division(client: TestClient, superuser_token_headers: dict[str, str], db: Session) -> None:
|
||||
division = create_random_division(db)
|
||||
response = client.delete(
|
||||
f"{settings.API_V1_STR}/divisions/{division.id}",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
assert response.json()["message"] == "Division deleted successfully"
|
||||
|
||||
|
||||
def test_delete_division_not_found(client: TestClient, superuser_token_headers: dict[str, str]) -> None:
|
||||
response = client.delete(
|
||||
f"{settings.API_V1_STR}/divisions/{uuid.uuid4()}",
|
||||
headers=superuser_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_404_NOT_FOUND
|
||||
assert response.json()["detail"] == "Division not found"
|
||||
|
||||
|
||||
def test_delete_division_no_permissions(client: TestClient, normal_user_token_headers: dict[str, str], db: Session) -> None:
|
||||
division = create_random_division(db)
|
||||
response = client.delete(
|
||||
f"{settings.API_V1_STR}/divisions/{division.id}",
|
||||
headers=normal_user_token_headers,
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
assert response.json()["detail"] == "Not enough permissions"
|
||||
Reference in New Issue
Block a user