Techdebt: Replace sure with regular asserts in EFS (#6486)

This commit is contained in:
Bert Blommers 2023-07-05 22:47:50 +00:00 committed by GitHub
parent 3ddfc0db40
commit acc3ca5f64
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 88 additions and 86 deletions

View File

@ -17,7 +17,7 @@ def test_list_tags_for_resource__without_tags(efs, file_system):
] ]
resp = efs.list_tags_for_resource(ResourceId=ap_id) resp = efs.list_tags_for_resource(ResourceId=ap_id)
resp.should.have.key("Tags").equals([]) assert resp["Tags"] == []
def test_list_tags_for_resource__with_tags(efs, file_system): def test_list_tags_for_resource__with_tags(efs, file_system):
@ -30,9 +30,10 @@ def test_list_tags_for_resource__with_tags(efs, file_system):
)["AccessPointId"] )["AccessPointId"]
resp = efs.list_tags_for_resource(ResourceId=ap_id) resp = efs.list_tags_for_resource(ResourceId=ap_id)
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key", "Value": "value"}, {"Key": "Name", "Value": "myname"}] {"Key": "key", "Value": "value"},
) {"Key": "Name", "Value": "myname"},
]
def test_tag_resource(efs, file_system): def test_tag_resource(efs, file_system):
@ -48,9 +49,10 @@ def test_tag_resource(efs, file_system):
) )
resp = efs.list_tags_for_resource(ResourceId=ap_id) resp = efs.list_tags_for_resource(ResourceId=ap_id)
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key", "Value": "value"}, {"Key": "Name", "Value": "myname"}] {"Key": "key", "Value": "value"},
) {"Key": "Name", "Value": "myname"},
]
def test_untag_resource(efs, file_system): def test_untag_resource(efs, file_system):
@ -70,6 +72,7 @@ def test_untag_resource(efs, file_system):
efs.untag_resource(ResourceId=ap_id, TagKeys=["key2"]) efs.untag_resource(ResourceId=ap_id, TagKeys=["key2"])
resp = efs.list_tags_for_resource(ResourceId=ap_id) resp = efs.list_tags_for_resource(ResourceId=ap_id)
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key1", "Value": "val1"}, {"Key": "key3", "Value": "val3"}] {"Key": "key1", "Value": "val1"},
) {"Key": "key3", "Value": "val3"},
]

View File

@ -14,21 +14,21 @@ def fixture_file_system(efs):
def test_describe_access_points__initial(efs): def test_describe_access_points__initial(efs):
resp = efs.describe_access_points() resp = efs.describe_access_points()
resp.should.have.key("AccessPoints").equals([]) assert resp["AccessPoints"] == []
def test_create_access_point__simple(efs, file_system): def test_create_access_point__simple(efs, file_system):
fs_id = file_system["FileSystemId"] fs_id = file_system["FileSystemId"]
resp = efs.create_access_point(ClientToken="ct", FileSystemId=fs_id) resp = efs.create_access_point(ClientToken="ct", FileSystemId=fs_id)
resp.should.have.key("ClientToken").equals("ct") assert resp["ClientToken"] == "ct"
resp.should.have.key("AccessPointId") assert "AccessPointId" in resp
resp.should.have.key("AccessPointArn") assert "AccessPointArn" in resp
resp.should.have.key("FileSystemId").equals(fs_id) assert resp["FileSystemId"] == fs_id
resp.should.have.key("OwnerId").equals(ACCOUNT_ID) assert resp["OwnerId"] == ACCOUNT_ID
resp.should.have.key("LifeCycleState").equals("available") assert resp["LifeCycleState"] == "available"
resp.should.have.key("RootDirectory").equals({"Path": "/"}) assert resp["RootDirectory"] == {"Path": "/"}
def test_create_access_point__full(efs, file_system): def test_create_access_point__full(efs, file_system):
@ -49,29 +49,26 @@ def test_create_access_point__full(efs, file_system):
}, },
) )
resp.should.have.key("ClientToken").equals("ct") assert resp["ClientToken"] == "ct"
resp.should.have.key("Name").equals("myname") assert resp["Name"] == "myname"
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key", "Value": "value"}, {"Key": "Name", "Value": "myname"}] {"Key": "key", "Value": "value"},
) {"Key": "Name", "Value": "myname"},
resp.should.have.key("AccessPointId") ]
resp.should.have.key("AccessPointArn") assert "AccessPointId" in resp
resp.should.have.key("FileSystemId").equals(fs_id) assert "AccessPointArn" in resp
resp.should.have.key("PosixUser").equals( assert resp["FileSystemId"] == fs_id
{"Uid": 123, "Gid": 123, "SecondaryGids": [124, 125]} assert resp["PosixUser"] == {"Uid": 123, "Gid": 123, "SecondaryGids": [124, 125]}
) assert resp["RootDirectory"] == {
resp.should.have.key("RootDirectory").equals( "Path": "/root/path",
{ "CreationInfo": {
"Path": "/root/path", "OwnerUid": 987,
"CreationInfo": { "OwnerGid": 986,
"OwnerUid": 987, "Permissions": "root_permissions",
"OwnerGid": 986, },
"Permissions": "root_permissions", }
}, assert resp["OwnerId"] == ACCOUNT_ID
} assert resp["LifeCycleState"] == "available"
)
resp.should.have.key("OwnerId").equals(ACCOUNT_ID)
resp.should.have.key("LifeCycleState").equals("available")
def test_describe_access_point(efs, file_system): def test_describe_access_point(efs, file_system):
@ -82,15 +79,15 @@ def test_describe_access_point(efs, file_system):
] ]
resp = efs.describe_access_points(AccessPointId=access_point_id) resp = efs.describe_access_points(AccessPointId=access_point_id)
resp.should.have.key("AccessPoints").length_of(1) assert len(resp["AccessPoints"]) == 1
access_point = resp["AccessPoints"][0] access_point = resp["AccessPoints"][0]
access_point.should.have.key("ClientToken").equals("ct") assert access_point["ClientToken"] == "ct"
access_point.should.have.key("AccessPointId") assert "AccessPointId" in access_point
access_point.should.have.key("AccessPointArn") assert "AccessPointArn" in access_point
access_point.should.have.key("FileSystemId").equals(fs_id) assert access_point["FileSystemId"] == fs_id
access_point.should.have.key("OwnerId").equals(ACCOUNT_ID) assert access_point["OwnerId"] == ACCOUNT_ID
access_point.should.have.key("LifeCycleState").equals("available") assert access_point["LifeCycleState"] == "available"
def test_describe_access_points__multiple(efs, file_system): def test_describe_access_points__multiple(efs, file_system):
@ -100,7 +97,7 @@ def test_describe_access_points__multiple(efs, file_system):
efs.create_access_point(ClientToken="ct2", FileSystemId=fs_id) efs.create_access_point(ClientToken="ct2", FileSystemId=fs_id)
resp = efs.describe_access_points() resp = efs.describe_access_points()
resp.should.have.key("AccessPoints").length_of(2) assert len(resp["AccessPoints"]) == 2
def test_delete_access_points(efs, file_system): def test_delete_access_points(efs, file_system):
@ -118,7 +115,7 @@ def test_delete_access_points(efs, file_system):
# We can only find one # We can only find one
resp = efs.describe_access_points() resp = efs.describe_access_points()
resp.should.have.key("AccessPoints").length_of(1) assert len(resp["AccessPoints"]) == 1
# The first one still exists # The first one still exists
efs.describe_access_points(AccessPointId=ap_id1) efs.describe_access_points(AccessPointId=ap_id1)
@ -127,4 +124,4 @@ def test_delete_access_points(efs, file_system):
with pytest.raises(ClientError) as exc_info: with pytest.raises(ClientError) as exc_info:
efs.describe_access_points(AccessPointId=ap_id2) efs.describe_access_points(AccessPointId=ap_id2)
err = exc_info.value.response["Error"] err = exc_info.value.response["Error"]
err["Code"].should.equal("AccessPointNotFound") assert err["Code"] == "AccessPointNotFound"

View File

@ -171,8 +171,8 @@ def test_describe_file_systems_using_identifier(efs):
# Describe the file system. # Describe the file system.
desc_fs_resp = efs.describe_file_systems(FileSystemId=fs_id) desc_fs_resp = efs.describe_file_systems(FileSystemId=fs_id)
desc_fs_resp.should.have.key("FileSystems").length_of(1) assert len(desc_fs_resp["FileSystems"]) == 1
desc_fs_resp["FileSystems"][0].should.have.key("FileSystemId").equals(fs_id) assert desc_fs_resp["FileSystems"][0]["FileSystemId"] == fs_id
assert desc_fs_resp["FileSystems"][0]["Name"] == "" assert desc_fs_resp["FileSystems"][0]["Name"] == ""
@ -180,9 +180,9 @@ def test_describe_file_systems_using_unknown_identifier(efs):
with pytest.raises(ClientError) as exc: with pytest.raises(ClientError) as exc:
efs.describe_file_systems(FileSystemId="unknown") efs.describe_file_systems(FileSystemId="unknown")
err = exc.value.response["Error"] err = exc.value.response["Error"]
err["Code"].should.equal("FileSystemNotFound") assert err["Code"] == "FileSystemNotFound"
# Verified against AWS # Verified against AWS
err["Message"].should.equal("File system 'unknown' does not exist.") assert err["Message"] == "File system 'unknown' does not exist."
def test_describe_file_systems_minimal_case(efs): def test_describe_file_systems_minimal_case(efs):

View File

@ -6,7 +6,7 @@ def test_list_tags_for_resource__without_tags(efs):
fs_id = file_system["FileSystemId"] fs_id = file_system["FileSystemId"]
resp = efs.list_tags_for_resource(ResourceId=fs_id) resp = efs.list_tags_for_resource(ResourceId=fs_id)
resp.should.have.key("Tags").equals([]) assert resp["Tags"] == []
def test_list_tags_for_resource__with_tags(efs): def test_list_tags_for_resource__with_tags(efs):
@ -17,9 +17,10 @@ def test_list_tags_for_resource__with_tags(efs):
fs_id = file_system["FileSystemId"] fs_id = file_system["FileSystemId"]
resp = efs.list_tags_for_resource(ResourceId=fs_id) resp = efs.list_tags_for_resource(ResourceId=fs_id)
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key", "Value": "value"}, {"Key": "Name", "Value": "myname"}] {"Key": "key", "Value": "value"},
) {"Key": "Name", "Value": "myname"},
]
def test_tag_resource(efs): def test_tag_resource(efs):
@ -35,9 +36,10 @@ def test_tag_resource(efs):
) )
resp = efs.list_tags_for_resource(ResourceId=fs_id) resp = efs.list_tags_for_resource(ResourceId=fs_id)
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key", "Value": "value"}, {"Key": "Name", "Value": "myname"}] {"Key": "key", "Value": "value"},
) {"Key": "Name", "Value": "myname"},
]
def test_untag_resource(efs): def test_untag_resource(efs):
@ -54,6 +56,7 @@ def test_untag_resource(efs):
efs.untag_resource(ResourceId=fs_id, TagKeys=["key2"]) efs.untag_resource(ResourceId=fs_id, TagKeys=["key2"])
resp = efs.list_tags_for_resource(ResourceId=fs_id) resp = efs.list_tags_for_resource(ResourceId=fs_id)
resp.should.have.key("Tags").equals( assert resp["Tags"] == [
[{"Key": "key1", "Value": "val1"}, {"Key": "key3", "Value": "val3"}] {"Key": "key1", "Value": "val1"},
) {"Key": "key3", "Value": "val3"},
]

View File

@ -8,8 +8,8 @@ def test_describe_filesystem_config__unknown(efs):
with pytest.raises(ClientError) as exc_info: with pytest.raises(ClientError) as exc_info:
efs.describe_lifecycle_configuration(FileSystemId="unknown") efs.describe_lifecycle_configuration(FileSystemId="unknown")
err = exc_info.value.response["Error"] err = exc_info.value.response["Error"]
err["Code"].should.equal("FileSystemNotFound") assert err["Code"] == "FileSystemNotFound"
err["Message"].should.equal("File system 'unknown' does not exist.") assert err["Message"] == "File system 'unknown' does not exist."
def test_describe_filesystem_config__initial(efs): def test_describe_filesystem_config__initial(efs):
@ -17,7 +17,7 @@ def test_describe_filesystem_config__initial(efs):
fs_id = create_fs_resp["FileSystemId"] fs_id = create_fs_resp["FileSystemId"]
resp = efs.describe_lifecycle_configuration(FileSystemId=fs_id) resp = efs.describe_lifecycle_configuration(FileSystemId=fs_id)
resp.should.have.key("LifecyclePolicies").equals([]) assert resp["LifecyclePolicies"] == []
def test_put_lifecycle_configuration(efs): def test_put_lifecycle_configuration(efs):
@ -30,10 +30,10 @@ def test_put_lifecycle_configuration(efs):
resp = efs.put_lifecycle_configuration( resp = efs.put_lifecycle_configuration(
FileSystemId=fs_id, LifecyclePolicies=[{"TransitionToIA": "AFTER_30_DAYS"}] FileSystemId=fs_id, LifecyclePolicies=[{"TransitionToIA": "AFTER_30_DAYS"}]
) )
resp.should.have.key("LifecyclePolicies").length_of(1) assert len(resp["LifecyclePolicies"]) == 1
resp["LifecyclePolicies"][0].should.equal({"TransitionToIA": "AFTER_30_DAYS"}) assert resp["LifecyclePolicies"][0] == {"TransitionToIA": "AFTER_30_DAYS"}
# Describe the lifecycle configuration # Describe the lifecycle configuration
resp = efs.describe_lifecycle_configuration(FileSystemId=fs_id) resp = efs.describe_lifecycle_configuration(FileSystemId=fs_id)
resp.should.have.key("LifecyclePolicies").length_of(1) assert len(resp["LifecyclePolicies"]) == 1
resp["LifecyclePolicies"][0].should.equal({"TransitionToIA": "AFTER_30_DAYS"}) assert resp["LifecyclePolicies"][0] == {"TransitionToIA": "AFTER_30_DAYS"}

View File

@ -258,10 +258,8 @@ def test_describe_mount_targets__by_access_point_id(
ap_resp = efs.describe_mount_targets(AccessPointId=access_point_id) ap_resp = efs.describe_mount_targets(AccessPointId=access_point_id)
# Check the list results. # Check the list results.
ap_resp.should.have.key("MountTargets").length_of(1) assert len(ap_resp["MountTargets"]) == 1
ap_resp["MountTargets"][0]["MountTargetId"].should.equal( assert ap_resp["MountTargets"][0]["MountTargetId"] == create_resp["MountTargetId"]
create_resp["MountTargetId"]
)
def test_describe_mount_targets_paging(efs, ec2, file_system): def test_describe_mount_targets_paging(efs, ec2, file_system):

View File

@ -22,8 +22,8 @@ def test_describe_mount_target_security_groups__unknown(efs):
with pytest.raises(ClientError) as exc_info: with pytest.raises(ClientError) as exc_info:
efs.describe_mount_target_security_groups(MountTargetId="mt-asdf1234asdf") efs.describe_mount_target_security_groups(MountTargetId="mt-asdf1234asdf")
err = exc_info.value.response["Error"] err = exc_info.value.response["Error"]
err["Code"].should.equal("MountTargetNotFound") assert err["Code"] == "MountTargetNotFound"
err["Message"].should.equal("Mount target 'mt-asdf1234asdf' does not exist.") assert err["Message"] == "Mount target 'mt-asdf1234asdf' does not exist."
def test_describe_mount_target_security_groups(efs, ec2, file_system, subnet): def test_describe_mount_target_security_groups(efs, ec2, file_system, subnet):
@ -44,7 +44,7 @@ def test_describe_mount_target_security_groups(efs, ec2, file_system, subnet):
# Describe it's Security Groups # Describe it's Security Groups
resp = efs.describe_mount_target_security_groups(MountTargetId=mount_target_id) resp = efs.describe_mount_target_security_groups(MountTargetId=mount_target_id)
resp.should.have.key("SecurityGroups").equals([security_group_id]) assert resp["SecurityGroups"] == [security_group_id]
def test_modify_mount_target_security_groups__unknown(efs): def test_modify_mount_target_security_groups__unknown(efs):
@ -53,8 +53,8 @@ def test_modify_mount_target_security_groups__unknown(efs):
MountTargetId="mt-asdf1234asdf", SecurityGroups=[] MountTargetId="mt-asdf1234asdf", SecurityGroups=[]
) )
err = exc_info.value.response["Error"] err = exc_info.value.response["Error"]
err["Code"].should.equal("MountTargetNotFound") assert err["Code"] == "MountTargetNotFound"
err["Message"].should.equal("Mount target 'mt-asdf1234asdf' does not exist.") assert err["Message"] == "Mount target 'mt-asdf1234asdf' does not exist."
def test_modify_mount_target_security_groups(efs, ec2, file_system, subnet): def test_modify_mount_target_security_groups(efs, ec2, file_system, subnet):
@ -89,12 +89,13 @@ def test_modify_mount_target_security_groups(efs, ec2, file_system, subnet):
# Describe it's Security Groups # Describe it's Security Groups
resp = efs.describe_mount_target_security_groups(MountTargetId=mount_target_id) resp = efs.describe_mount_target_security_groups(MountTargetId=mount_target_id)
resp.should.have.key("SecurityGroups").equals([sg_id_2, sg_id_3]) assert resp["SecurityGroups"] == [sg_id_2, sg_id_3]
# Verify EC2 reflects this change # Verify EC2 reflects this change
resp = ec2.describe_network_interfaces(NetworkInterfaceIds=[network_interface_id]) resp = ec2.describe_network_interfaces(NetworkInterfaceIds=[network_interface_id])
network_interface = resp["NetworkInterfaces"][0] network_interface = resp["NetworkInterfaces"][0]
network_interface["Groups"].should.have.length_of(2) assert len(network_interface["Groups"]) == 2
set([sg["GroupId"] for sg in network_interface["Groups"]]).should.equal( assert set([sg["GroupId"] for sg in network_interface["Groups"]]) == {
{sg_id_2, sg_id_3} sg_id_2,
) sg_id_3,
}