2022-08-03 20:38:26 +02:00
|
|
|
from calendar import timegm
|
|
|
|
from datetime import datetime, timedelta
|
|
|
|
from typing import Dict
|
|
|
|
from unittest.mock import Mock, patch
|
2022-02-13 12:08:24 +01:00
|
|
|
|
2022-08-03 20:38:26 +02:00
|
|
|
import jwt
|
2022-02-12 14:30:59 +01:00
|
|
|
import pytest
|
2022-08-03 20:38:26 +02:00
|
|
|
from cryptography.hazmat.primitives import serialization
|
|
|
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
2022-02-12 14:30:59 +01:00
|
|
|
from flask import Flask
|
|
|
|
|
2022-04-23 13:48:29 +02:00
|
|
|
from fittrackee import bcrypt
|
2022-03-19 20:34:36 +01:00
|
|
|
from fittrackee.tests.utils import random_string
|
2022-04-23 13:48:29 +02:00
|
|
|
from fittrackee.users.exceptions import (
|
|
|
|
InvalidEmailException,
|
|
|
|
UserNotFoundException,
|
|
|
|
)
|
2022-02-12 14:30:59 +01:00
|
|
|
from fittrackee.users.models import User
|
2022-04-23 13:48:29 +02:00
|
|
|
from fittrackee.users.utils.admin import UserManagerService
|
2022-02-16 18:07:05 +01:00
|
|
|
from fittrackee.users.utils.controls import (
|
2022-03-13 08:39:50 +01:00
|
|
|
check_password,
|
2022-02-13 12:08:24 +01:00
|
|
|
check_username,
|
|
|
|
is_valid_email,
|
|
|
|
register_controls,
|
|
|
|
)
|
2022-08-03 20:38:26 +02:00
|
|
|
from fittrackee.users.utils.token import decode_user_token, get_user_token
|
2022-02-12 14:30:59 +01:00
|
|
|
|
2022-04-23 13:48:29 +02:00
|
|
|
from ..utils import random_email
|
|
|
|
|
2022-02-12 14:30:59 +01:00
|
|
|
|
2022-04-23 13:48:29 +02:00
|
|
|
class TestUserManagerService:
|
2022-02-12 14:30:59 +01:00
|
|
|
def test_it_raises_exception_if_user_does_not_exist(
|
|
|
|
self, app: Flask
|
|
|
|
) -> None:
|
2022-04-23 13:48:29 +02:00
|
|
|
user_manager_service = UserManagerService(username=random_string())
|
|
|
|
|
2022-02-12 14:30:59 +01:00
|
|
|
with pytest.raises(UserNotFoundException):
|
2022-04-23 13:48:29 +02:00
|
|
|
user_manager_service.update()
|
|
|
|
|
|
|
|
def test_it_does_not_update_user_when_no_args_provided(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
_, user_updated, _ = user_manager_service.update()
|
|
|
|
|
|
|
|
assert user_updated is False
|
|
|
|
|
|
|
|
def test_it_returns_user(self, app: Flask, user_1: User) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
user, _, _ = user_manager_service.update()
|
|
|
|
|
|
|
|
assert user == user_1
|
2022-02-12 14:30:59 +01:00
|
|
|
|
|
|
|
def test_it_sets_admin_right_for_a_given_user(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
2022-04-23 13:48:29 +02:00
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
user_manager_service.update(is_admin=True)
|
2022-02-12 14:30:59 +01:00
|
|
|
|
|
|
|
assert user_1.admin is True
|
|
|
|
|
2022-04-23 13:48:29 +02:00
|
|
|
def test_it_return_updated_user_flag_to_true(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
_, user_updated, _ = user_manager_service.update(is_admin=True)
|
|
|
|
|
|
|
|
assert user_updated is True
|
|
|
|
|
2022-02-12 14:30:59 +01:00
|
|
|
def test_it_does_not_raise_exception_when_user_has_already_admin_right(
|
|
|
|
self, app: Flask, user_1_admin: User
|
|
|
|
) -> None:
|
2022-04-23 13:48:29 +02:00
|
|
|
user_manager_service = UserManagerService(
|
|
|
|
username=user_1_admin.username
|
|
|
|
)
|
|
|
|
|
|
|
|
user_manager_service.update(is_admin=True)
|
2022-02-12 14:30:59 +01:00
|
|
|
|
|
|
|
assert user_1_admin.admin is True
|
2022-02-13 12:08:24 +01:00
|
|
|
|
2022-03-20 16:31:48 +01:00
|
|
|
def test_it_activates_account_if_user_is_inactive(
|
|
|
|
self, app: Flask, inactive_user: User
|
|
|
|
) -> None:
|
2022-04-23 13:48:29 +02:00
|
|
|
user_manager_service = UserManagerService(
|
|
|
|
username=inactive_user.username
|
|
|
|
)
|
|
|
|
|
|
|
|
user_manager_service.update(is_admin=True)
|
2022-03-20 16:31:48 +01:00
|
|
|
|
|
|
|
assert inactive_user.admin is True
|
|
|
|
assert inactive_user.is_active is True
|
|
|
|
assert inactive_user.confirmation_token is None
|
|
|
|
|
2022-04-23 13:48:29 +02:00
|
|
|
def test_it_activates_given_user_account(
|
|
|
|
self, app: Flask, inactive_user: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(
|
|
|
|
username=inactive_user.username
|
|
|
|
)
|
|
|
|
|
|
|
|
user_manager_service.update(activate=True)
|
|
|
|
|
|
|
|
assert inactive_user.is_active is True
|
|
|
|
|
|
|
|
def test_it_empties_confirmation_token(
|
|
|
|
self, app: Flask, inactive_user: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(
|
|
|
|
username=inactive_user.username
|
|
|
|
)
|
|
|
|
|
|
|
|
user_manager_service.update(activate=True)
|
|
|
|
|
|
|
|
assert inactive_user.confirmation_token is None
|
|
|
|
|
|
|
|
def test_it_does_not_raise_error_if_user_account_already_activated(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
user_manager_service.update(activate=True)
|
|
|
|
|
|
|
|
assert user_1.is_active is True
|
|
|
|
|
|
|
|
def test_it_resets_user_password(self, app: Flask, user_1: User) -> None:
|
|
|
|
previous_password = user_1.password
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
user_manager_service.update(reset_password=True)
|
|
|
|
|
|
|
|
assert user_1.password != previous_password
|
|
|
|
|
|
|
|
def test_new_password_is_encrypted(self, app: Flask, user_1: User) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
_, _, new_password = user_manager_service.update(reset_password=True)
|
|
|
|
|
|
|
|
assert bcrypt.check_password_hash(user_1.password, new_password)
|
|
|
|
|
|
|
|
def test_it_raises_exception_if_provided_email_is_invalid(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
with pytest.raises(
|
|
|
|
InvalidEmailException, match='valid email must be provided'
|
|
|
|
):
|
|
|
|
user_manager_service.update(new_email=random_string())
|
|
|
|
|
|
|
|
def test_it_raises_exception_if_provided_email_is_current_user_email(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
with pytest.raises(
|
|
|
|
InvalidEmailException,
|
|
|
|
match='new email must be different than curent email',
|
|
|
|
):
|
|
|
|
user_manager_service.update(new_email=user_1.email)
|
|
|
|
|
|
|
|
def test_it_updates_user_email_to_confirm(
|
|
|
|
self, app: Flask, user_1: User
|
|
|
|
) -> None:
|
|
|
|
new_email = random_email()
|
|
|
|
current_email = user_1.email
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
user_manager_service.update(new_email=new_email)
|
|
|
|
|
|
|
|
assert user_1.email == current_email
|
|
|
|
assert user_1.email_to_confirm == new_email
|
|
|
|
assert user_1.confirmation_token is not None
|
|
|
|
|
|
|
|
def test_it_updates_user_email(self, app: Flask, user_1: User) -> None:
|
|
|
|
new_email = random_email()
|
|
|
|
user_manager_service = UserManagerService(username=user_1.username)
|
|
|
|
|
|
|
|
user_manager_service.update(
|
|
|
|
new_email=new_email, with_confirmation=False
|
|
|
|
)
|
|
|
|
|
|
|
|
assert user_1.email == new_email
|
|
|
|
assert user_1.email_to_confirm is None
|
|
|
|
assert user_1.confirmation_token is None
|
|
|
|
|
2022-02-13 12:08:24 +01:00
|
|
|
|
|
|
|
class TestIsValidEmail:
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
('input_email',),
|
|
|
|
[
|
2022-03-23 18:29:49 +01:00
|
|
|
(None,),
|
2022-02-13 12:08:24 +01:00
|
|
|
('',),
|
|
|
|
('foo',),
|
|
|
|
('foo@',),
|
|
|
|
('@foo.fr',),
|
|
|
|
('foo@foo',),
|
|
|
|
('.',),
|
|
|
|
('./',),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_it_returns_false_if_email_is_invalid(
|
|
|
|
self, input_email: str
|
|
|
|
) -> None:
|
|
|
|
assert is_valid_email(input_email) is False
|
|
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
('input_email',),
|
|
|
|
[
|
|
|
|
('admin@example.com',),
|
|
|
|
('admin@test.example.com',),
|
|
|
|
('admin.site@test.example.com',),
|
|
|
|
('admin-site@test-example.com',),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_it_returns_true_if_email_is_valid(self, input_email: str) -> None:
|
|
|
|
assert is_valid_email(input_email) is True
|
|
|
|
|
|
|
|
|
|
|
|
class TestCheckPasswords:
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
('input_password_length',),
|
|
|
|
[
|
|
|
|
(0,),
|
|
|
|
(3,),
|
|
|
|
(7,),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_it_returns_error_message_string_if_password_length_is_below_8_characters( # noqa
|
|
|
|
self, input_password_length: int
|
|
|
|
) -> None:
|
|
|
|
password = random_string(input_password_length)
|
2022-03-13 08:39:50 +01:00
|
|
|
assert check_password(password) == (
|
2022-02-13 12:08:24 +01:00
|
|
|
'password: 8 characters required\n'
|
|
|
|
)
|
|
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
('input_password_length',),
|
|
|
|
[
|
|
|
|
(8,),
|
|
|
|
(10,),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_it_returns_empty_string_when_password_length_exceeds_7_characters(
|
|
|
|
self, input_password_length: int
|
|
|
|
) -> None:
|
|
|
|
password = random_string(input_password_length)
|
2022-03-13 08:39:50 +01:00
|
|
|
assert check_password(password) == ''
|
2022-02-13 12:08:24 +01:00
|
|
|
|
|
|
|
|
|
|
|
class TestIsUsernameValid:
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
('input_username_length',),
|
|
|
|
[
|
|
|
|
(2,),
|
2022-03-13 08:38:45 +01:00
|
|
|
(31,),
|
2022-02-13 12:08:24 +01:00
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_it_returns_error_message_when_username_length_is_invalid(
|
|
|
|
self, input_username_length: int
|
|
|
|
) -> None:
|
|
|
|
assert (
|
|
|
|
check_username(
|
2022-03-13 08:38:45 +01:00
|
|
|
username=random_string(31),
|
2022-02-13 12:08:24 +01:00
|
|
|
)
|
2022-03-13 08:38:45 +01:00
|
|
|
== 'username: 3 to 30 characters required\n'
|
2022-02-13 12:08:24 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
('input_invalid_character',),
|
|
|
|
[
|
|
|
|
('.',),
|
|
|
|
('/',),
|
|
|
|
('$',),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_it_returns_error_message_when_username_has_invalid_character(
|
|
|
|
self, input_invalid_character: str
|
|
|
|
) -> None:
|
|
|
|
username = random_string() + input_invalid_character
|
|
|
|
assert check_username(username=username) == (
|
|
|
|
'username: only alphanumeric characters and the '
|
|
|
|
'underscore character "_" allowed\n'
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_it_returns_empty_string_when_username_is_valid(self) -> None:
|
|
|
|
assert check_username(username=random_string()) == ''
|
|
|
|
|
|
|
|
def test_it_returns_multiple_errors(self) -> None:
|
2022-03-13 08:38:45 +01:00
|
|
|
username = random_string(31) + '.'
|
2022-02-13 12:08:24 +01:00
|
|
|
assert check_username(username=username) == (
|
2022-03-13 08:38:45 +01:00
|
|
|
'username: 3 to 30 characters required\n'
|
2022-02-13 12:08:24 +01:00
|
|
|
'username: only alphanumeric characters and the underscore '
|
|
|
|
'character "_" allowed\n'
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class TestRegisterControls:
|
2022-02-16 18:07:05 +01:00
|
|
|
module_path = 'fittrackee.users.utils.controls.'
|
2022-02-13 12:08:24 +01:00
|
|
|
valid_username = random_string()
|
|
|
|
valid_email = f'{random_string()}@example.com'
|
|
|
|
valid_password = random_string()
|
|
|
|
|
|
|
|
def test_it_calls_all_validators(self) -> None:
|
|
|
|
with patch(
|
2022-03-13 08:39:50 +01:00
|
|
|
self.module_path + 'check_password'
|
2022-02-13 12:08:24 +01:00
|
|
|
) as check_passwords_mock, patch(
|
|
|
|
self.module_path + 'check_username'
|
|
|
|
) as check_username_mock, patch(
|
|
|
|
self.module_path + 'is_valid_email'
|
|
|
|
) as is_valid_email_mock:
|
|
|
|
register_controls(
|
|
|
|
self.valid_username,
|
|
|
|
self.valid_email,
|
|
|
|
self.valid_password,
|
|
|
|
)
|
|
|
|
|
2022-03-13 08:39:50 +01:00
|
|
|
check_passwords_mock.assert_called_once_with(self.valid_password)
|
2022-02-13 12:08:24 +01:00
|
|
|
check_username_mock.assert_called_once_with(self.valid_username)
|
|
|
|
is_valid_email_mock.assert_called_once_with(self.valid_email)
|
|
|
|
|
|
|
|
def test_it_returns_empty_string_when_inputs_are_valid(self) -> None:
|
|
|
|
assert (
|
|
|
|
register_controls(
|
|
|
|
self.valid_username,
|
|
|
|
self.valid_email,
|
|
|
|
self.valid_password,
|
|
|
|
)
|
|
|
|
== ''
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_it_returns_multiple_errors_when_inputs_are_invalid(self) -> None:
|
2022-03-13 08:38:45 +01:00
|
|
|
invalid_username = random_string(31)
|
2022-02-13 12:08:24 +01:00
|
|
|
assert register_controls(
|
|
|
|
username=invalid_username,
|
|
|
|
email=invalid_username,
|
|
|
|
password=random_string(8),
|
|
|
|
) == (
|
2022-03-13 08:38:45 +01:00
|
|
|
'username: 3 to 30 characters required\n'
|
2022-02-13 12:08:24 +01:00
|
|
|
'email: valid email must be provided\n'
|
|
|
|
)
|
2022-08-03 20:38:26 +02:00
|
|
|
|
|
|
|
|
|
|
|
class TestGetUserToken:
|
|
|
|
@staticmethod
|
|
|
|
def decode_token(app: Flask, token: str) -> Dict:
|
|
|
|
return jwt.decode(
|
|
|
|
token,
|
|
|
|
app.config['SECRET_KEY'],
|
|
|
|
algorithms=['HS256'],
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_token_is_encoded_with_hs256(self, app: Flask) -> None:
|
|
|
|
token = get_user_token(user_id=1)
|
|
|
|
|
|
|
|
decoded_token = self.decode_token(app, token)
|
|
|
|
assert list(decoded_token.keys()) == ['exp', 'iat', 'sub']
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('input_password_reset', [True, False])
|
|
|
|
def test_token_contains_user_id(
|
|
|
|
self, app: Flask, input_password_reset: bool
|
|
|
|
) -> None:
|
|
|
|
user_id = 1
|
|
|
|
token = get_user_token(
|
|
|
|
user_id=user_id, password_reset=input_password_reset
|
|
|
|
)
|
|
|
|
|
|
|
|
decoded_token = self.decode_token(app, token)
|
|
|
|
assert decoded_token['sub'] == user_id
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('input_password_reset', [True, False])
|
|
|
|
def test_token_contains_timestamp_of_when_it_is_issued(
|
|
|
|
self, app: Flask, input_password_reset: bool
|
|
|
|
) -> None:
|
|
|
|
user_id = 1
|
|
|
|
iat = datetime.utcnow()
|
|
|
|
with patch('fittrackee.users.utils.token.datetime') as datetime_mock:
|
|
|
|
datetime_mock.utcnow = Mock(return_value=iat)
|
|
|
|
|
|
|
|
token = get_user_token(
|
|
|
|
user_id=user_id, password_reset=input_password_reset
|
|
|
|
)
|
|
|
|
|
|
|
|
decoded_token = self.decode_token(app, token)
|
|
|
|
assert decoded_token['iat'] == timegm(iat.utctimetuple())
|
|
|
|
|
|
|
|
def test_token_contains_timestamp_of_when_it_expired(
|
|
|
|
self, app: Flask
|
|
|
|
) -> None:
|
|
|
|
user_id = 1
|
|
|
|
iat = datetime.utcnow()
|
|
|
|
expiration = timedelta(
|
|
|
|
days=app.config['TOKEN_EXPIRATION_DAYS'],
|
|
|
|
seconds=app.config['TOKEN_EXPIRATION_SECONDS'],
|
|
|
|
)
|
|
|
|
with patch('fittrackee.users.utils.token.datetime') as datetime_mock:
|
|
|
|
datetime_mock.utcnow = Mock(return_value=iat)
|
|
|
|
|
|
|
|
token = get_user_token(user_id=user_id)
|
|
|
|
|
|
|
|
decoded_token = self.decode_token(app, token)
|
|
|
|
assert decoded_token['exp'] == timegm(
|
|
|
|
(iat + expiration).utctimetuple()
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_password_token_contains_timestamp_of_when_it_expired(
|
|
|
|
self, app: Flask
|
|
|
|
) -> None:
|
|
|
|
user_id = 1
|
|
|
|
iat = datetime.utcnow()
|
|
|
|
expiration = timedelta(
|
|
|
|
days=0.0,
|
|
|
|
seconds=app.config['PASSWORD_TOKEN_EXPIRATION_SECONDS'],
|
|
|
|
)
|
|
|
|
with patch('fittrackee.users.utils.token.datetime') as datetime_mock:
|
|
|
|
datetime_mock.utcnow = Mock(return_value=iat)
|
|
|
|
|
|
|
|
token = get_user_token(user_id=user_id, password_reset=True)
|
|
|
|
|
|
|
|
decoded_token = self.decode_token(app, token)
|
|
|
|
assert decoded_token['exp'] == timegm(
|
|
|
|
(iat + expiration).utctimetuple()
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class TestDecodeUserToken:
|
|
|
|
@staticmethod
|
|
|
|
def generate_token(user_id: int, now: datetime) -> str:
|
|
|
|
with patch('fittrackee.users.utils.token.datetime') as datetime_mock:
|
|
|
|
datetime_mock.utcnow = Mock(return_value=now)
|
|
|
|
token = get_user_token(user_id)
|
|
|
|
return token
|
|
|
|
|
|
|
|
def test_it_raises_error_when_token_is_invalid(self, app: Flask) -> None:
|
|
|
|
with pytest.raises(jwt.exceptions.DecodeError):
|
|
|
|
|
|
|
|
decode_user_token(random_string())
|
|
|
|
|
|
|
|
def test_it_raises_error_when_token_body_is_invalid(
|
|
|
|
self, app: Flask
|
|
|
|
) -> None:
|
|
|
|
token = self.generate_token(user_id=1, now=datetime.utcnow())
|
|
|
|
header, body, signature = token.split('.')
|
|
|
|
modified_token = f'{header}.{random_string()}.{signature}'
|
|
|
|
with pytest.raises(
|
|
|
|
jwt.exceptions.InvalidSignatureError,
|
|
|
|
match='Signature verification failed',
|
|
|
|
):
|
|
|
|
|
|
|
|
decode_user_token(modified_token)
|
|
|
|
|
|
|
|
def test_it_raises_error_when_secret_key_is_invalid(
|
|
|
|
self, app: Flask
|
|
|
|
) -> None:
|
|
|
|
now = datetime.utcnow()
|
|
|
|
token = jwt.encode(
|
|
|
|
{
|
|
|
|
'exp': now + timedelta(minutes=1),
|
|
|
|
'iat': now,
|
|
|
|
'sub': 1,
|
|
|
|
},
|
|
|
|
random_string(),
|
|
|
|
algorithm='HS256',
|
|
|
|
)
|
|
|
|
with pytest.raises(
|
|
|
|
jwt.exceptions.InvalidSignatureError,
|
|
|
|
match='Signature verification failed',
|
|
|
|
):
|
|
|
|
|
|
|
|
decode_user_token(token)
|
|
|
|
|
|
|
|
def test_it_raises_error_when_algorithm_is_not_hs256(
|
|
|
|
self, app: Flask
|
|
|
|
) -> None:
|
|
|
|
key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
|
|
|
|
private_key = key.private_bytes(
|
|
|
|
serialization.Encoding.PEM,
|
|
|
|
serialization.PrivateFormat.PKCS8,
|
|
|
|
serialization.NoEncryption(),
|
|
|
|
)
|
|
|
|
now = datetime.utcnow()
|
|
|
|
token = jwt.encode(
|
|
|
|
{
|
|
|
|
'exp': now + timedelta(minutes=1),
|
|
|
|
'iat': now,
|
|
|
|
'sub': 1,
|
|
|
|
},
|
|
|
|
private_key.decode(),
|
|
|
|
algorithm="RS256",
|
|
|
|
)
|
|
|
|
with pytest.raises(jwt.exceptions.InvalidAlgorithmError):
|
|
|
|
|
|
|
|
decode_user_token(token)
|
|
|
|
|
|
|
|
def test_it_raises_error_when_token_is_expired(self, app: Flask) -> None:
|
|
|
|
now = datetime.utcnow() - timedelta(minutes=10)
|
|
|
|
token = self.generate_token(user_id=1, now=now)
|
|
|
|
with pytest.raises(
|
|
|
|
jwt.exceptions.ExpiredSignatureError, match='Signature has expired'
|
|
|
|
):
|
|
|
|
|
|
|
|
decode_user_token(token)
|
|
|
|
|
|
|
|
def test_it_returns_user_id(self, app: Flask) -> None:
|
|
|
|
expected_user_id = 1
|
|
|
|
token = self.generate_token(
|
|
|
|
user_id=expected_user_id, now=datetime.utcnow()
|
|
|
|
)
|
|
|
|
|
|
|
|
user_id = decode_user_token(token)
|
|
|
|
|
|
|
|
assert user_id == expected_user_id
|