[REFORMAT] Ran black reformat
This commit is contained in:
@@ -34,6 +34,7 @@ def test_register(client: TestClient) -> None:
|
||||
)
|
||||
assert response.status_code == status.HTTP_201_CREATED
|
||||
|
||||
|
||||
def test_login(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
|
||||
@@ -51,17 +52,21 @@ def test_login(db: Session, client: TestClient) -> None:
|
||||
assert "token_type" in response_data
|
||||
assert response_data["token_type"] == "bearer"
|
||||
|
||||
|
||||
def test_refresh_token(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
rsp = generators.login(db, user.username, unhashed_password)
|
||||
access_token = rsp["access_token"]
|
||||
refresh_token = rsp["refresh_token"]
|
||||
|
||||
time.sleep(1) # Sleep to ensure tokens won't be identical
|
||||
time.sleep(1) # Sleep to ensure tokens won't be identical
|
||||
|
||||
response = client.post(
|
||||
"/api/auth/refresh",
|
||||
headers={"Authorization": f"Bearer {access_token}", "Content-Type": "application/json"},
|
||||
headers={
|
||||
"Authorization": f"Bearer {access_token}",
|
||||
"Content-Type": "application/json",
|
||||
},
|
||||
json={"refresh_token": refresh_token},
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
@@ -70,7 +75,10 @@ def test_refresh_token(db: Session, client: TestClient) -> None:
|
||||
assert "access_token" in response_data
|
||||
assert "token_type" in response_data
|
||||
assert response_data["token_type"] == "bearer"
|
||||
assert response_data["access_token"] != access_token # Ensure the token is refreshed
|
||||
assert (
|
||||
response_data["access_token"] != access_token
|
||||
) # Ensure the token is refreshed
|
||||
|
||||
|
||||
def test_logout(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
@@ -80,15 +88,20 @@ def test_logout(db: Session, client: TestClient) -> None:
|
||||
|
||||
response = client.post(
|
||||
"/api/auth/logout",
|
||||
headers={"Authorization": f"Bearer {access_token}", "Content-Type": "application/json"},
|
||||
headers={
|
||||
"Authorization": f"Bearer {access_token}",
|
||||
"Content-Type": "application/json",
|
||||
},
|
||||
json={"refresh_token": refresh_token},
|
||||
)
|
||||
assert response.status_code == status.HTTP_200_OK
|
||||
|
||||
# Verify that the token is blacklisted
|
||||
blacklisted_token = db.query(TokenBlacklist).filter(TokenBlacklist.token == access_token).first()
|
||||
blacklisted_token = (
|
||||
db.query(TokenBlacklist).filter(TokenBlacklist.token == access_token).first()
|
||||
)
|
||||
assert blacklisted_token is not None
|
||||
|
||||
|
||||
# Verify that we can't still actually do anything
|
||||
response = client.get(
|
||||
"/api/user/me",
|
||||
@@ -98,7 +111,10 @@ def test_logout(db: Session, client: TestClient) -> None:
|
||||
|
||||
response = client.post(
|
||||
"/api/auth/refresh",
|
||||
headers={"Authorization": f"Bearer {access_token}", "Content-Type": "application/json"},
|
||||
headers={
|
||||
"Authorization": f"Bearer {access_token}",
|
||||
"Content-Type": "application/json",
|
||||
},
|
||||
json={"refresh_token": refresh_token},
|
||||
)
|
||||
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
||||
@@ -106,7 +122,9 @@ def test_logout(db: Session, client: TestClient) -> None:
|
||||
|
||||
def test_get_me(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
access_token = generators.login(db, user.username, unhashed_password)["access_token"]
|
||||
access_token = generators.login(db, user.username, unhashed_password)[
|
||||
"access_token"
|
||||
]
|
||||
|
||||
response = client.get(
|
||||
"/api/user/me",
|
||||
@@ -119,14 +137,18 @@ def test_get_me(db: Session, client: TestClient) -> None:
|
||||
assert response_data["uuid"] == user.uuid
|
||||
assert response_data["username"] == user.username
|
||||
|
||||
|
||||
def test_get_me_unauthorized(client: TestClient) -> None:
|
||||
### This test should fail (unauthorized) because the user isn't logged in
|
||||
response = client.get("/api/user/me")
|
||||
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
||||
|
||||
|
||||
def test_get_user(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
access_token = generators.login(db, user.username, unhashed_password)["access_token"]
|
||||
access_token = generators.login(db, user.username, unhashed_password)[
|
||||
"access_token"
|
||||
]
|
||||
|
||||
response = client.get(
|
||||
f"/api/user/{user.username}",
|
||||
@@ -139,11 +161,14 @@ def test_get_user(db: Session, client: TestClient) -> None:
|
||||
assert response_data["uuid"] == user.uuid
|
||||
assert response_data["username"] == user.username
|
||||
|
||||
|
||||
def test_get_user_unauthorized(db: Session, client: TestClient) -> None:
|
||||
### This test should fail (unauthorized) because the user isn't us
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
user2, _ = generators.create_user(db)
|
||||
access_token = generators.login(db, user.username, unhashed_password)["access_token"]
|
||||
access_token = generators.login(db, user.username, unhashed_password)[
|
||||
"access_token"
|
||||
]
|
||||
|
||||
response = client.get(
|
||||
f"/api/user/{user2.username}",
|
||||
@@ -151,11 +176,14 @@ def test_get_user_unauthorized(db: Session, client: TestClient) -> None:
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
|
||||
|
||||
def test_update_user(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
new_name = fake.name()
|
||||
|
||||
access_token = generators.login(db, user.username, unhashed_password)["access_token"]
|
||||
access_token = generators.login(db, user.username, unhashed_password)[
|
||||
"access_token"
|
||||
]
|
||||
response = client.patch(
|
||||
f"/api/user/{user.username}",
|
||||
headers={"Authorization": f"Bearer {access_token}"},
|
||||
@@ -168,7 +196,9 @@ def test_update_user(db: Session, client: TestClient) -> None:
|
||||
|
||||
def test_delete_user(db: Session, client: TestClient) -> None:
|
||||
user, unhashed_password = generators.create_user(db)
|
||||
access_token = generators.login(db, user.username, unhashed_password)["access_token"]
|
||||
access_token = generators.login(db, user.username, unhashed_password)[
|
||||
"access_token"
|
||||
]
|
||||
response = client.delete(
|
||||
f"/api/user/{user.username}",
|
||||
headers={"Authorization": f"Bearer {access_token}"},
|
||||
@@ -179,6 +209,7 @@ def test_delete_user(db: Session, client: TestClient) -> None:
|
||||
deleted_user = db.query(User).filter(User.username == user.username).first()
|
||||
assert deleted_user is None
|
||||
|
||||
|
||||
def test_get_user_forbidden(db: Session, client: TestClient) -> None:
|
||||
"""Test getting another user's profile (should be forbidden)."""
|
||||
user1, password_user1 = generators.create_user(db, username="user1_get_forbidden")
|
||||
@@ -195,9 +226,12 @@ def test_get_user_forbidden(db: Session, client: TestClient) -> None:
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
|
||||
|
||||
def test_update_user_forbidden(db: Session, client: TestClient) -> None:
|
||||
"""Test updating another user's profile (should be forbidden)."""
|
||||
user1, password_user1 = generators.create_user(db, username="user1_update_forbidden")
|
||||
user1, password_user1 = generators.create_user(
|
||||
db, username="user1_update_forbidden"
|
||||
)
|
||||
user2, _ = generators.create_user(db, username="user2_update_forbidden")
|
||||
new_name = fake.name()
|
||||
|
||||
@@ -213,9 +247,12 @@ def test_update_user_forbidden(db: Session, client: TestClient) -> None:
|
||||
)
|
||||
assert response.status_code == status.HTTP_403_FORBIDDEN
|
||||
|
||||
|
||||
def test_delete_user_forbidden(db: Session, client: TestClient) -> None:
|
||||
"""Test deleting another user's profile (should be forbidden)."""
|
||||
user1, password_user1 = generators.create_user(db, username="user1_delete_forbidden")
|
||||
user1, password_user1 = generators.create_user(
|
||||
db, username="user1_delete_forbidden"
|
||||
)
|
||||
user2, _ = generators.create_user(db, username="user2_delete_forbidden")
|
||||
|
||||
# Log in as user1
|
||||
|
||||
Reference in New Issue
Block a user