Add test to verify bad API prefix handling by the service 94/106094/2
authorBartek Grzybowski <b.grzybowski@partner.samsung.com>
Thu, 16 Apr 2020 11:11:07 +0000 (04:11 -0700)
committerBartek Grzybowski <b.grzybowski@partner.samsung.com>
Thu, 16 Apr 2020 11:37:00 +0000 (11:37 +0000)
Functional test for verifying that the service handles
bad API prefix in URI string properly and returns appropriate
response to the client.

Change-Id: I5e5e8a9dcd6fe05bd2b4536790d16e825aa21679
Issue-ID: INT-1529
Signed-off-by: Bartek Grzybowski <b.grzybowski@partner.samsung.com>
test/mocks/prov-mns-provider/src/tests/common.py
test/mocks/prov-mns-provider/src/tests/test_invalid_requests.py

index a78e9f5..62fd807 100644 (file)
@@ -26,5 +26,12 @@ BAD_CLASS_URI_BASE_STRING = URI_SCHEMA + '://' + ProvMnSProvider.ipAddress + \
                             ':' + str(ProvMnSProvider.portNumber) + \
                             ProvMnSProvider.prefix + '/' + 'invalidMoiClass' + \
                             '/' + MOI_ID
+BAD_PREFIX_URI_BASE_STRING = URI_SCHEMA + '://' + ProvMnSProvider.ipAddress + \
+                             ':' + str(ProvMnSProvider.portNumber) + \
+                             '/bad/prefix' + '/' + MOI_CLASS + '/' + MOI_ID
+BAD_PREFIX1_URI_BASE_STRING = URI_SCHEMA + '://' + ProvMnSProvider.ipAddress + \
+                             ':' + str(ProvMnSProvider.portNumber) + \
+                             '/badprefix' + '/' + MOI_CLASS + '/' + MOI_ID
 UNAUTHORIZED_MSG="not Authorized"
 INVALID_CLASS_MSG = "MOI class not support"
+INVALID_PREFIX_MSG = "wrong prefix"
index 08e0e32..5c77cdc 100644 (file)
@@ -47,3 +47,29 @@ def test_bad_moi_class():
                           auth=AUTH_STRING)
     assert req.status_code == requests.codes.not_acceptable
     assert INVALID_CLASS_MSG in req.text
+
+def test_bad_prefix():
+    '''Check service returns proper
+    http code and error msg if URI prefix
+    is invalid'''
+
+    for url in BAD_PREFIX_URI_BASE_STRING, BAD_PREFIX1_URI_BASE_STRING:
+        req = requests.get('{0}'.format(url),
+                           auth=AUTH_STRING)
+        assert req.status_code == requests.codes.not_found
+        assert INVALID_PREFIX_MSG in req.text
+
+        req = requests.put('{0}'.format(url),
+                           auth=AUTH_STRING, json=MOI_DATA_TMPL)
+        assert req.status_code == requests.codes.not_found
+        assert INVALID_PREFIX_MSG in req.text
+
+        req = requests.patch('{0}'.format(url),
+                             auth=AUTH_STRING, json=MOI_DATA_PATCH)
+        assert req.status_code == requests.codes.not_found
+        assert INVALID_PREFIX_MSG in req.text
+
+        req = requests.delete('{0}'.format(url),
+                              auth=AUTH_STRING)
+        assert req.status_code == requests.codes.not_found
+        assert INVALID_PREFIX_MSG in req.text