':' + str(ProvMnSProvider.portNumber) + \
ProvMnSProvider.prefix + '/' + 'invalidMoiClass' + \
'/' + MOI_ID
+BAD_PREFIX_URI_BASE_STRING = URI_SCHEMA + '://' + ProvMnSProvider.ipAddress + \
+ ':' + str(ProvMnSProvider.portNumber) + \
+ '/bad/prefix' + '/' + MOI_CLASS + '/' + MOI_ID
+BAD_PREFIX1_URI_BASE_STRING = URI_SCHEMA + '://' + ProvMnSProvider.ipAddress + \
+ ':' + str(ProvMnSProvider.portNumber) + \
+ '/badprefix' + '/' + MOI_CLASS + '/' + MOI_ID
UNAUTHORIZED_MSG="not Authorized"
INVALID_CLASS_MSG = "MOI class not support"
+INVALID_PREFIX_MSG = "wrong prefix"
auth=AUTH_STRING)
assert req.status_code == requests.codes.not_acceptable
assert INVALID_CLASS_MSG in req.text
+
+def test_bad_prefix():
+ '''Check service returns proper
+ http code and error msg if URI prefix
+ is invalid'''
+
+ for url in BAD_PREFIX_URI_BASE_STRING, BAD_PREFIX1_URI_BASE_STRING:
+ req = requests.get('{0}'.format(url),
+ auth=AUTH_STRING)
+ assert req.status_code == requests.codes.not_found
+ assert INVALID_PREFIX_MSG in req.text
+
+ req = requests.put('{0}'.format(url),
+ auth=AUTH_STRING, json=MOI_DATA_TMPL)
+ assert req.status_code == requests.codes.not_found
+ assert INVALID_PREFIX_MSG in req.text
+
+ req = requests.patch('{0}'.format(url),
+ auth=AUTH_STRING, json=MOI_DATA_PATCH)
+ assert req.status_code == requests.codes.not_found
+ assert INVALID_PREFIX_MSG in req.text
+
+ req = requests.delete('{0}'.format(url),
+ auth=AUTH_STRING)
+ assert req.status_code == requests.codes.not_found
+ assert INVALID_PREFIX_MSG in req.text