| Conditions | 3 |
| Total Lines | 92 |
| Lines | 0 |
| Ratio | 0 % |
| Changes | 0 | ||
Small methods make your code easier to understand, in particular if combined with a good name. Besides, if your method is small, finding a good name is usually much easier.
For example, if you find yourself adding comments to a method's body, this is usually a good sign to extract the commented part to a new method, and use the comment as a starting point when coming up with a good name for this new method.
Commonly applied refactorings include:
If many parameters/temporary variables are present:
| 1 | # -*- coding: utf-8 -*- |
||
| 82 | def test_get_resources(self): |
||
| 83 | |||
| 84 | def compare_results(permissions, service=None, name=None, |
||
| 85 | resource=None, result=None, include_locked=False): |
||
| 86 | """ Resets the auth API endpoint /tokens/:id/permissions, call |
||
| 87 | get_resources and compare results with what is expected. |
||
| 88 | """ |
||
| 89 | if result is None: |
||
| 90 | result = [] |
||
| 91 | |||
| 92 | self.make_fake_perms(permissions) |
||
| 93 | resources = self.api.get_resources( |
||
| 94 | service=service, name=name, resource=resource, |
||
| 95 | include_locked=include_locked |
||
| 96 | ) |
||
| 97 | # XOR on two sets returns the difference between them |
||
| 98 | # Used because we don't know in which order api.get_resources |
||
| 99 | # returns the resources. |
||
| 100 | self.assertFalse(set(resources) ^ set(result)) |
||
| 101 | |||
| 102 | # Check the API has been requested with |
||
| 103 | # ?include_locked set to `include_locked` |
||
| 104 | self.assertEqual( |
||
| 105 | httpretty.last_request().querystring.get('include_locked'), |
||
| 106 | [str(include_locked)] |
||
| 107 | ) |
||
| 108 | |||
| 109 | # No permission, no resource |
||
| 110 | compare_results({}, result=[]) |
||
| 111 | |||
| 112 | # Simple permissions |
||
| 113 | compare_results(self.fake_permissions, |
||
| 114 | service='compute', name='can_boot', |
||
| 115 | result=['server1', 'server2']) |
||
| 116 | |||
| 117 | compare_results(self.fake_permissions, |
||
| 118 | service='compute', name='can_boot', |
||
| 119 | result=['server1', 'server2']) |
||
| 120 | |||
| 121 | compare_results(self.fake_permissions, |
||
| 122 | service='compute', name='can_boot', resource='server2', |
||
| 123 | result=['server2']) |
||
| 124 | |||
| 125 | compare_results(self.fake_permissions, |
||
| 126 | service='compute', name='can_delete', |
||
| 127 | result=['server1']) |
||
| 128 | |||
| 129 | compare_results( |
||
| 130 | self.fake_permissions, |
||
| 131 | service='compute', name='can_delete', resource='server1', |
||
| 132 | result=['server1'] |
||
| 133 | ) |
||
| 134 | |||
| 135 | compare_results(self.fake_permissions, |
||
| 136 | service='compute', name='can_write', |
||
| 137 | result=[]) |
||
| 138 | |||
| 139 | # Nested permissions |
||
| 140 | compare_results(self.fake_permissions, |
||
| 141 | service='account', name='token:read', |
||
| 142 | result=['token1', 'token2', 'token3']) |
||
| 143 | |||
| 144 | compare_results( |
||
| 145 | self.fake_permissions, |
||
| 146 | service='account', name='token:read', resource='invalid', |
||
| 147 | result=[] |
||
| 148 | ) |
||
| 149 | |||
| 150 | compare_results( |
||
| 151 | self.fake_permissions, |
||
| 152 | service='account', name='token:read', resource='token2', |
||
| 153 | result=['token2'] |
||
| 154 | ) |
||
| 155 | |||
| 156 | compare_results( |
||
| 157 | self.fake_permissions, |
||
| 158 | service='account', name='token:write', |
||
| 159 | result=['token1', 'token2', 'token4'] |
||
| 160 | ) |
||
| 161 | |||
| 162 | compare_results( |
||
| 163 | self.fake_permissions, |
||
| 164 | service='account', name='token:admin', |
||
| 165 | result=['token1', 'token2'] |
||
| 166 | ) |
||
| 167 | |||
| 168 | # Include lock set to True |
||
| 169 | compare_results( |
||
| 170 | self.fake_permissions, |
||
| 171 | service='account', name='token:admin', |
||
| 172 | result=['token1', 'token2'], |
||
| 173 | include_locked=True |
||
| 174 | ) |
||
| 274 |