Skip to content

Commit 646e302

Browse files
committed
Fix grammar in unittest-article.md
1 parent 84da425 commit 646e302

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

unittest-article.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Please find more detail about the unittest framework from the following resource
5757

5858
## <a id="rdp_workflow"></a>RDP APIs Application Workflow
5959

60-
Refinitiv Data Platform entitlement check is based on OAuth 2.0 specification. The first step of an application workflow is to get a token from RDP Auth Service, which will allow access to the protected resource, i.e. data REST API's.
60+
Refinitiv Data Platform entitlement check is based on OAuth 2.0 specification. The first step of an application workflow is to get a token from RDP Auth Service, which will allow access to the protected resource, i.e. data REST API.
6161

6262
The API requires the following access credential information:
6363
- Username: The username.
@@ -184,7 +184,7 @@ from rdp_controller import rdp_http_controller
184184
185185
class TestRDPHTTPController(unittest.TestCase):
186186
187-
# A class method called before tests in an individual class are run
187+
# A class method called before all tests in an individual class are run
188188
@classmethod
189189
def setUpClass(cls):
190190
# Create an app object for the RDPHTTPController class
@@ -286,7 +286,7 @@ Text: {"error":"invalid_client" ,"error_description":"Invalid Application Crede
286286
E
287287
======================================================================
288288
ERROR: test_login_rdp_success (test_rdp_http_controller.TestRDPHTTPController)
289-
Test that it can logged in to the RDP Auth Service
289+
Test that it can log in to the RDP Auth Service
290290
----------------------------------------------------------------------
291291
Traceback (most recent call last):
292292
File "....\rdp_python_unittest\tests\test_rdp_http_controller.py", line 72, in test_login_rdp_success
@@ -347,7 +347,7 @@ from rdp_controller import rdp_http_controller
347347
348348
class TestRDPHTTPController(unittest.TestCase):
349349
350-
# A class method called before tests in an individual class are run
350+
# A class method called before all tests in an individual class are run
351351
@classmethod
352352
def setUpClass(cls):
353353
# Create an app object for the RDPHTTPController class
@@ -378,7 +378,7 @@ import os
378378
379379
class TestRDPHTTPController(unittest.TestCase):
380380
381-
# A class method called before tests in an individual class are run
381+
# A class method called before all tests in an individual class are run
382382
@classmethod
383383
def setUpClass(cls):
384384
...
@@ -470,7 +470,7 @@ class TestRDPHTTPController(unittest.TestCase):
470470
@responses.activate
471471
def test_login_rdp_invalid(self):
472472
"""
473-
Test that it handle some invalid credentials
473+
Test that it can handle some invalid credentials
474474
"""
475475
...
476476
with self.assertRaises(requests.exceptions.HTTPError) as exception_context:
@@ -675,7 +675,7 @@ All RDP data services use the same token expire error message, so we load this f
675675
676676
class TestRDPHTTPController(unittest.TestCase):
677677
678-
# A class method called before tests in an individual class are run
678+
# A class method called before all tests in an individual class are run
679679
@classmethod
680680
def setUpClass(cls):
681681
# Set up previous class variables
@@ -728,7 +728,7 @@ class TestRDPHTTPController(unittest.TestCase):
728728
@responses.activate
729729
def test_request_esg_token_expire(self):
730730
"""
731-
Test that it can handle token expire requests
731+
Test that it can handle token expiration requests
732732
"""
733733
# Previous code
734734
...
@@ -748,8 +748,7 @@ class TestRDPHTTPController(unittest.TestCase):
748748
749749
```
750750

751-
The other common RDP APIs failure scenarios is the application sends the request message to RDP without the access token in the HTTP request' header. However, the *access token* is one of the ```rdp_request_esg()``` method required parameters. If the access token is not presented (None or Empty), the method raise the TypeError exception and not send HTTP request message to the RDP. The ```test_request_esg_none_empty()``` method is the one that covers this test case.
752-
751+
The other common RDP APIs failure scenario is the application sends the request message to RDP without the access token in the HTTP request header. However, the *access token* is one of the ```rdp_request_esg()``` method required parameters. If the access token is not presented (None or Empty), the method raises the TypeError exception and does not send an HTTP request message to the RDP. The ```test_request_esg_none_empty()``` method is the one that covers this test case.
753752

754753
### <a id="unittest_rdp_esg_invalid"></a>Testing Requesting RDP ESG data with an invalid item
755754

0 commit comments

Comments
 (0)