def _assert_oops_response(response: Response) -> None: """ Assert that the response is in the format of Vuforia's "Oops, an error occurred" HTML response. Raises: AssertionError: The given response is not in the expected format. """ assert_valid_date_header(response=response) assert 'Oops, an error occurred' in response.text assert 'This exception has been logged with id' in response.text expected_headers = { 'Content-Type': 'text/html; charset=UTF-8', 'Date': response.headers['Date'], 'Server': 'nginx', 'Content-Length': '1190', 'Connection': 'keep-alive', } assert dict(response.headers) == expected_headers
def test_bad_secret_key_query( self, vuforia_database: VuforiaDatabase, high_quality_image: io.BytesIO, ) -> None: """ If the client secret key given is incorrect, an ``UNAUTHORIZED`` response is returned. """ cloud_reco_client = CloudRecoService( client_access_key=vuforia_database.client_access_key, client_secret_key='example', ) with pytest.raises(cloud_reco_exceptions.AuthenticationFailure) as exc: cloud_reco_client.query(image=high_quality_image) response = exc.value.response assert_vwq_failure( response=response, status_code=HTTPStatus.UNAUTHORIZED, content_type='application/json', cache_control=None, www_authenticate='VWS', connection='keep-alive', ) assert response.json().keys() == {'transaction_id', 'result_code'} assert_valid_transaction_id(response=response) assert_valid_date_header(response=response) result_code = response.json()['result_code'] transaction_id = response.json()['transaction_id'] assert result_code == ResultCodes.AUTHENTICATION_FAILURE.value # The separators are inconsistent and we test this. expected_text = ('{"transaction_id":' f'"{transaction_id}",' f'"result_code":"{result_code}"' '}') assert response.text == expected_text
def test_invalid_json( self, endpoint: Endpoint, date_skew_minutes: int, ) -> None: """ Giving invalid JSON to endpoints returns error responses. """ date_is_skewed = not date_skew_minutes == 0 content = b'a' gmt = ZoneInfo('GMT') now = datetime.now(tz=gmt) time_to_freeze = now + timedelta(minutes=date_skew_minutes) with freeze_time(time_to_freeze): date = rfc_1123_date() endpoint_headers = dict(endpoint.prepared_request.headers) authorization_string = authorization_header( access_key=endpoint.access_key, secret_key=endpoint.secret_key, method=str(endpoint.prepared_request.method), content=content, content_type=endpoint.auth_header_content_type, date=date, request_path=endpoint.prepared_request.path_url, ) headers = { **endpoint_headers, 'Authorization': authorization_string, 'Date': date, } endpoint.prepared_request.body = content endpoint.prepared_request.headers = CaseInsensitiveDict(data=headers) endpoint.prepared_request.prepare_content_length(body=content) session = requests.Session() response = session.send( # type: ignore request=endpoint.prepared_request, ) takes_json_data = ( endpoint.auth_header_content_type == 'application/json' ) assert_valid_date_header(response=response) if date_is_skewed and takes_json_data: # On the real implementation, we get `HTTPStatus.FORBIDDEN` and # `REQUEST_TIME_TOO_SKEWED`. # See https://github.com/VWS-Python/vws-python-mock/issues/4 for # implementing this on them mock. return if not date_is_skewed and takes_json_data: assert_vws_failure( response=response, status_code=HTTPStatus.BAD_REQUEST, result_code=ResultCodes.FAIL, ) return assert response.status_code == HTTPStatus.BAD_REQUEST url = str(endpoint.prepared_request.url) netloc = urlparse(url).netloc if netloc == 'cloudreco.vuforia.com': assert_vwq_failure( response=response, status_code=HTTPStatus.BAD_REQUEST, content_type='text/html;charset=UTF-8', ) expected_text = ( 'java.lang.RuntimeException: RESTEASY007500: ' 'Could find no Content-Disposition header within part' ) assert response.text == expected_text return assert response.text == '' assert 'Content-Type' not in response.headers