Add Media-Token beside access token
Media-Token can be used only to access the content, but unable to modify user data
This commit is contained in:
parent
0a71a6c840
commit
1f06c40c4c
31 changed files with 516 additions and 762 deletions
|
|
@ -2,7 +2,7 @@ import os
|
|||
import unittest
|
||||
import unittest.mock
|
||||
import json
|
||||
from .context import create_app, default_test_config
|
||||
from .context import create_app, default_test_config, create_test_session
|
||||
from backend.data import db
|
||||
from backend.data import dao_users
|
||||
from backend.data import dao_session
|
||||
|
|
@ -52,13 +52,7 @@ class IsUserPriviligedcUnitTest(unittest.TestCase):
|
|||
self.assertEqual(expected, actual_response_json)
|
||||
|
||||
def test_expired_access_token_headers_returns_unauthorized(self):
|
||||
session = Session(
|
||||
user_id=2,
|
||||
access_token='token',
|
||||
refresh_token='',
|
||||
access_expires_at=950,
|
||||
refresh_expires_at=1050,
|
||||
)
|
||||
session = create_test_session(user_id=2, access_token='token', access_expires_at=1, refresh_expires_at=2000)
|
||||
self.insert_session(session)
|
||||
expected = {'message':'Invalid Authorization!','code':441}
|
||||
|
||||
|
|
@ -68,22 +62,17 @@ class IsUserPriviligedcUnitTest(unittest.TestCase):
|
|||
self.assertEqual(401, response.status_code)
|
||||
self.assertEqual(expected, actual_response_json)
|
||||
|
||||
def test_sending_non_saved_user_error_is_shown(self):
|
||||
session = Session(
|
||||
user_id=2,
|
||||
access_token='token',
|
||||
refresh_token='',
|
||||
access_expires_at=1050,
|
||||
refresh_expires_at=2000
|
||||
)
|
||||
@unittest.mock.patch('time.time', return_value=1000)
|
||||
def test_sending_non_saved_user_error_is_shown(self, mock_time):
|
||||
session = create_test_session(user_id=2, access_token='token', access_expires_at=1050, refresh_expires_at=2000)
|
||||
self.insert_session(session)
|
||||
expected = {'message':'Invalid Authorization!','code':441}
|
||||
expected = {'message':'Invalid Authorization!','code':442}
|
||||
|
||||
header = {'Authorization': 'token'}
|
||||
response = self.client.get(self.url_path, headers = header)
|
||||
|
||||
actual_response_json = json.loads(response.data.decode())
|
||||
self.assertEqual(401, response.status_code)
|
||||
self.assertEqual(400, response.status_code)
|
||||
self.assertEqual(expected, actual_response_json)
|
||||
|
||||
@unittest.mock.patch('time.time', return_value=1000)
|
||||
|
|
@ -95,13 +84,7 @@ class IsUserPriviligedcUnitTest(unittest.TestCase):
|
|||
privileged = True
|
||||
)
|
||||
user_id = self.insert_user(user)
|
||||
session = Session(
|
||||
user_id=user_id,
|
||||
access_token='token',
|
||||
refresh_token='',
|
||||
access_expires_at=1050,
|
||||
refresh_expires_at=2000
|
||||
)
|
||||
session = create_test_session(user_id=user_id, access_token='token', access_expires_at=1050, refresh_expires_at=2000)
|
||||
self.insert_session(session)
|
||||
expected = {'is_privileged': True}
|
||||
|
||||
|
|
@ -121,13 +104,7 @@ class IsUserPriviligedcUnitTest(unittest.TestCase):
|
|||
privileged = False
|
||||
)
|
||||
user_id = self.insert_user(user)
|
||||
session = Session(
|
||||
user_id=user_id,
|
||||
access_token='token',
|
||||
refresh_token='',
|
||||
access_expires_at=1050,
|
||||
refresh_expires_at=2000
|
||||
)
|
||||
session = create_test_session(user_id=user_id, access_token='token', access_expires_at=1050, refresh_expires_at=2000)
|
||||
self.insert_session(session)
|
||||
expected = {'is_privileged': False}
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue