def test_put_role_success(client, database, cleanup): new_role = create_role(*admin_role) database.session.add(new_role) new_role = create_role(*owner_role) database.session.add(new_role) new_user = create_user(*user_2) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "id": 1, "role": role, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = put_role_socket(payload) expected_role = role expected_role["id"] = 1 assert result["role"] == expected_role
def test_delete_role_missing_key(client, database, cleanup): new_role = create_role(*owner_role) database.session.add(new_role) new_role = create_role(*admin_role) database.session.add(new_role) new_user = create_user(*user_1) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = {"id": 2, "token": token.decode("UTF-8")} result = delete_role_socket(payload) assert result["error"] == "Missing request key!"
def test_delete_role_invalid_key(client, database, cleanup): new_role = create_role(*owner_role) database.session.add(new_role) new_role = create_role(*admin_role) database.session.add(new_role) new_user = create_user(*user_1) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "id": 2, "private-key": "1230896843rtfsvdjb123453212098792171766n", "token": token.decode("UTF-8"), } result = delete_role_socket(payload) assert result["error"] == "Invalid credentials!"
def test_delete_role_missing_token(client, database, cleanup): new_role = create_role(*owner_role) database.session.add(new_role) new_role = create_role(*admin_role) database.session.add(new_role) new_user = create_user(*user_1) database.session.add(new_user) database.session.commit() payload = { "id": 2, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", } result = delete_role_socket(payload) assert result["error"] == "Missing request key!"
def test_delete_role_invalid_token(client, database, cleanup): new_role = create_role(*owner_role) database.session.add(new_role) new_role = create_role(*admin_role) database.session.add(new_role) new_user = create_user(*user_1) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, "213p4u4trgsvczxnwdaere67yiukyhj") payload = { "id": 2, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = delete_role_socket(payload) assert result["error"] == "Invalid credentials!"
def test_get_all_roles_invalid_key(client, database, cleanup): new_role = create_role(*admin_role) database.session.add(new_role) new_role = create_role(*owner_role) database.session.add(new_role) new_user = create_user(*user_2) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "private-key": "siohfigdadANDVBSIAWE0WI21Y8OR1082ORHFEDNSLCSADIJOKA", "token": token.decode("UTF-8"), } result = get_all_roles_socket(payload) assert result["error"] == "Invalid credentials!"
def test_get_all_roles_invalid_token(client, database, cleanup): new_role = create_role(*admin_role) database.session.add(new_role) new_role = create_role(*owner_role) database.session.add(new_role) new_user = create_user(*user_2) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, "totally a secret, trust me") payload = { "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = get_all_roles_socket(payload) assert result["error"] == "Invalid credentials!"
def test_delete_role_success(client, database, cleanup): new_role = create_role(*admin_role) database.session.add(new_role) new_role = create_role(*owner_role) database.session.add(new_role) new_user = create_user(*user_2) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "id": 1, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = delete_role_socket(payload) assert database.session.query(Role).get(1) is None
def test_delete_role_user_with_missing_role(client, database, cleanup): new_role = create_role(*admin_role) database.session.add(new_role) new_role = create_role(*owner_role) database.session.add(new_role) new_user = create_user(*user_2) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "id": 3, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = delete_role_socket(payload) assert result["error"] == "Role ID not found!"
def test_get_all_roles_success(client, database, cleanup): role1 = create_role(*user_role) database.session.add(role1) role2 = create_role(*admin_role) database.session.add(role2) new_user = create_user(*user_2) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = get_all_roles_socket(payload) expected_roles = [model_to_json(role1), model_to_json(role2)] assert result["roles"] == expected_roles
def test_delete_role_unauthorized_user(client, database, cleanup): new_role = create_role(*admin_role) new_user = create_user(*user_1) database.session.add(new_role) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "id": 1, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = delete_role_socket(payload) assert result["error"] == "User is not authorized for this operation!"
def test_put_role_invalid_key(client, database, cleanup): new_role = create_role(*owner_role) new_user = create_user(*user_1) database.session.add(new_role) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, app.config["SECRET_KEY"]) payload = { "id": 1, "role": role, "private-key": "dsapksasdp12-04290u83t5r752tyvdwhbsacnxz", "token": token.decode("UTF-8"), } result = put_role_socket(payload) assert result["error"] == "Invalid credentials!"
def test_put_role_invalid_token(client, database, cleanup): new_role = create_role(*owner_role) new_user = create_user(*user_1) database.session.add(new_role) database.session.add(new_user) database.session.commit() token = jwt.encode({"id": 1}, "1029382trytdfsvcbxz") payload = { "id": 1, "role": role, "private-key": "3c777d6e1cece1e78aa9c26ae7fa2ecf33a6d3fb1db7c1313e7b79ef3ee884eb", "token": token.decode("UTF-8"), } result = put_role_socket(payload) assert result["error"] == "Invalid credentials!"