Example #1
0
def test_put_role_success(client, database, cleanup):
    new_role = create_role(*admin_role)
    database.session.add(new_role)

    new_role = create_role(*owner_role)
    database.session.add(new_role)

    new_user = create_user(*user_2)
    database.session.add(new_user)

    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 1,
        "role": role,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = put_role_socket(payload)
    expected_role = role
    expected_role["id"] = 1

    assert result["role"] == expected_role
Example #2
0
def test_put_role_missing_key(client, database, cleanup):
    new_user = create_user(*user_1)

    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {"role": role, "id": 1, "token": token.decode("UTF-8")}
    result = put_role_socket(payload)
    assert result["error"] == "Missing request key!"
Example #3
0
def test_put_role_missing_token(client, database, cleanup):
    new_user = create_user(*user_1)

    database.session.add(new_user)
    database.session.commit()

    payload = {
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb"
    }
    result = put_role_socket(payload)
    assert result["error"] == "Missing request key!"
Example #4
0
def test_get_role_invalid_key(client, database, cleanup):
    new_user = create_user(*user_1)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 1,
        "private-key": "IdoNotExist",
        "token": token.decode("UTF-8")
    }
    result = get_role_socket(payload)
    assert result["error"] == "Invalid credentials!"
Example #5
0
def test_get_role_missing_role(client, database, cleanup):
    new_user = create_user(*user_1)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 1,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = get_role_socket(payload)
    assert result["error"] == "Role ID not found!"
Example #6
0
def test_post_role_invalid_token(client, database, cleanup):
    new_user = create_user(*user_1)

    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"asdsadad": 124356}, app.config["SECRET_KEY"])
    payload = {
        "role": role,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = create_role_socket(payload)
    assert result["error"] == "Invalid credentials!"
def test_delete_role_missing_key(client, database, cleanup):
    new_role = create_role(*owner_role)
    database.session.add(new_role)
    new_role = create_role(*admin_role)
    database.session.add(new_role)
    new_user = create_user(*user_1)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {"id": 2, "token": token.decode("UTF-8")}
    result = delete_role_socket(payload)
    result = loads(result)

    assert result["error"] == "Missing request key!"
Example #8
0
def test_delete_role_unauthorized_user(client, database, cleanup):
    new_role = create_role(*admin_role)
    new_user = create_user(*user_1)
    database.session.add(new_role)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 1,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = delete_role_socket(payload)
    assert result["error"] == "User is not authorized for this operation!"
Example #9
0
def test_delete_role_invalid_key(client, database, cleanup):
    new_role = create_role(*owner_role)
    database.session.add(new_role)
    new_role = create_role(*admin_role)
    database.session.add(new_role)
    new_user = create_user(*user_1)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 2,
        "private-key": "1230896843rtfsvdjb123453212098792171766n",
        "token": token.decode("UTF-8"),
    }
    result = delete_role_socket(payload)
    assert result["error"] == "Invalid credentials!"
Example #10
0
def test_delete_role_invalid_token(client, database, cleanup):
    new_role = create_role(*owner_role)
    database.session.add(new_role)
    new_role = create_role(*admin_role)
    database.session.add(new_role)
    new_user = create_user(*user_1)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, "213p4u4trgsvczxnwdaere67yiukyhj")
    payload = {
        "id": 2,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = delete_role_socket(payload)
    assert result["error"] == "Invalid credentials!"
Example #11
0
def test_get_all_roles_invalid_key(client, database, cleanup):
    new_role = create_role(*admin_role)
    database.session.add(new_role)
    new_role = create_role(*owner_role)
    database.session.add(new_role)

    new_user = create_user(*user_2)
    database.session.add(new_user)

    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "private-key": "siohfigdadANDVBSIAWE0WI21Y8OR1082ORHFEDNSLCSADIJOKA",
        "token": token.decode("UTF-8"),
    }
    result = get_all_roles_socket(payload)
    assert result["error"] == "Invalid credentials!"
Example #12
0
def test_put_role_invalid_key(client, database, cleanup):
    new_role = create_role(*owner_role)

    new_user = create_user(*user_1)

    database.session.add(new_role)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 1,
        "role": role,
        "private-key": "dsapksasdp12-04290u83t5r752tyvdwhbsacnxz",
        "token": token.decode("UTF-8"),
    }
    result = put_role_socket(payload)
    assert result["error"] == "Invalid credentials!"
Example #13
0
def test_put_role_invalid_token(client, database, cleanup):
    new_role = create_role(*owner_role)

    new_user = create_user(*user_1)

    database.session.add(new_role)
    database.session.add(new_user)
    database.session.commit()

    token = jwt.encode({"id": 1}, "1029382trytdfsvcbxz")
    payload = {
        "id": 1,
        "role": role,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = put_role_socket(payload)
    assert result["error"] == "Invalid credentials!"
Example #14
0
def test_get_all_roles_invalid_token(client, database, cleanup):
    new_role = create_role(*admin_role)
    database.session.add(new_role)
    new_role = create_role(*owner_role)
    database.session.add(new_role)

    new_user = create_user(*user_2)
    database.session.add(new_user)

    database.session.commit()

    token = jwt.encode({"id": 1}, "totally a secret, trust me")
    payload = {
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = get_all_roles_socket(payload)
    assert result["error"] == "Invalid credentials!"
def test_delete_role_missing_token(client, database, cleanup):
    new_role = create_role(*owner_role)
    database.session.add(new_role)
    new_role = create_role(*admin_role)
    database.session.add(new_role)
    new_user = create_user(*user_1)
    database.session.add(new_user)
    database.session.commit()

    payload = {
        "id":
        2,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
    }
    result = delete_role_socket(payload)
    result = loads(result)

    assert result["error"] == "Missing request key!"
Example #16
0
def test_delete_role_success(client, database, cleanup):
    new_role = create_role(*admin_role)
    database.session.add(new_role)

    new_role = create_role(*owner_role)
    database.session.add(new_role)

    new_user = create_user(*user_2)
    database.session.add(new_user)

    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "id": 1,
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = delete_role_socket(payload)
    assert database.session.query(Role).get(1) is None
Example #17
0
def test_get_all_roles_success(client, database, cleanup):
    role1 = create_role(*user_role)
    database.session.add(role1)

    role2 = create_role(*admin_role)
    database.session.add(role2)

    new_user = create_user(*user_2)
    database.session.add(new_user)

    database.session.commit()

    token = jwt.encode({"id": 1}, app.config["SECRET_KEY"])
    payload = {
        "private-key":
        "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb",
        "token": token.decode("UTF-8"),
    }
    result = get_all_roles_socket(payload)
    expected_roles = [model_to_json(role1), model_to_json(role2)]

    assert result["roles"] == expected_roles