Conditions | 3 |
Total Lines | 92 |
Lines | 0 |
Ratio | 0 % |
Changes | 0 |
Small methods make your code easier to understand, in particular if combined with a good name. Besides, if your method is small, finding a good name is usually much easier.
For example, if you find yourself adding comments to a method's body, this is usually a good sign to extract the commented part to a new method, and use the comment as a starting point when coming up with a good name for this new method.
Commonly applied refactorings include:
If many parameters/temporary variables are present:
1 | # -*- coding: utf-8 -*- |
||
82 | def test_get_resources(self): |
||
83 | |||
84 | def compare_results(permissions, service=None, name=None, |
||
85 | resource=None, result=None, include_locked=False): |
||
86 | """ Resets the auth API endpoint /tokens/:id/permissions, call |
||
87 | get_resources and compare results with what is expected. |
||
88 | """ |
||
89 | if result is None: |
||
90 | result = [] |
||
91 | |||
92 | self.make_fake_perms(permissions) |
||
93 | resources = self.api.get_resources( |
||
94 | service=service, name=name, resource=resource, |
||
95 | include_locked=include_locked |
||
96 | ) |
||
97 | # XOR on two sets returns the difference between them |
||
98 | # Used because we don't know in which order api.get_resources |
||
99 | # returns the resources. |
||
100 | self.assertFalse(set(resources) ^ set(result)) |
||
101 | |||
102 | # Check the API has been requested with |
||
103 | # ?include_locked set to `include_locked` |
||
104 | self.assertEqual( |
||
105 | httpretty.last_request().querystring.get('include_locked'), |
||
106 | [str(include_locked)] |
||
107 | ) |
||
108 | |||
109 | # No permission, no resource |
||
110 | compare_results({}, result=[]) |
||
111 | |||
112 | # Simple permissions |
||
113 | compare_results(self.fake_permissions, |
||
114 | service='compute', name='can_boot', |
||
115 | result=['server1', 'server2']) |
||
116 | |||
117 | compare_results(self.fake_permissions, |
||
118 | service='compute', name='can_boot', |
||
119 | result=['server1', 'server2']) |
||
120 | |||
121 | compare_results(self.fake_permissions, |
||
122 | service='compute', name='can_boot', resource='server2', |
||
123 | result=['server2']) |
||
124 | |||
125 | compare_results(self.fake_permissions, |
||
126 | service='compute', name='can_delete', |
||
127 | result=['server1']) |
||
128 | |||
129 | compare_results( |
||
130 | self.fake_permissions, |
||
131 | service='compute', name='can_delete', resource='server1', |
||
132 | result=['server1'] |
||
133 | ) |
||
134 | |||
135 | compare_results(self.fake_permissions, |
||
136 | service='compute', name='can_write', |
||
137 | result=[]) |
||
138 | |||
139 | # Nested permissions |
||
140 | compare_results(self.fake_permissions, |
||
141 | service='account', name='token:read', |
||
142 | result=['token1', 'token2', 'token3']) |
||
143 | |||
144 | compare_results( |
||
145 | self.fake_permissions, |
||
146 | service='account', name='token:read', resource='invalid', |
||
147 | result=[] |
||
148 | ) |
||
149 | |||
150 | compare_results( |
||
151 | self.fake_permissions, |
||
152 | service='account', name='token:read', resource='token2', |
||
153 | result=['token2'] |
||
154 | ) |
||
155 | |||
156 | compare_results( |
||
157 | self.fake_permissions, |
||
158 | service='account', name='token:write', |
||
159 | result=['token1', 'token2', 'token4'] |
||
160 | ) |
||
161 | |||
162 | compare_results( |
||
163 | self.fake_permissions, |
||
164 | service='account', name='token:admin', |
||
165 | result=['token1', 'token2'] |
||
166 | ) |
||
167 | |||
168 | # Include lock set to True |
||
169 | compare_results( |
||
170 | self.fake_permissions, |
||
171 | service='account', name='token:admin', |
||
172 | result=['token1', 'token2'], |
||
173 | include_locked=True |
||
174 | ) |
||
274 |