def test_authenticate_with_invalid_pass_should_be_access_denied(self): user = User(email="*****@*****.**", password="******") user.save() response = self.fetch_with_headers(self.reverse_url('auth_user'), email="*****@*****.**", password="******") expect(response.code).to_equal(403)
def test_registering_duplicated_user(self): email = "*****@*****.**" password = "******" user = User(email=email, password=password) user.save() response = self.fetch_with_headers(self.reverse_url('register_user'), email=email, password=password) expect(response.code).to_equal(409) expect(response.body).to_equal("User already registered.")
def test_registering_duplicated_user(self): email = "*****@*****.**" password = "******" user = User(email=email, password=password) user.save() response = self.fetch_with_headers(self.reverse_url('register_user'), email=email, password=password) expect(response.code).to_equal(409) expect(response.body).to_equal("User already registered.")
def test_authenticate_with_valid_user(self): user = User(email="*****@*****.**", password="******") user.save() response = self.fetch_with_headers(self.reverse_url('auth_user'), email="*****@*****.**", password="******") expect(response.code).to_equal(200) expect(response.body).to_equal("OK") user = User.objects.filter(email="*****@*****.**").first() expect(response.headers).to_include('Token-Expiration') # without nano seconds expect(response.headers['Token-Expiration'][:19]).to_equal(user.token_expiration.isoformat()[:19]) expect(response.headers).to_include('Token') expect(response.headers['Token']).to_equal(user.token)
def test_authenticate_with_valid_user(self): user = User(email="*****@*****.**", password="******") user.save() response = self.fetch_with_headers(self.reverse_url('auth_user'), email="*****@*****.**", password="******") expect(response.code).to_equal(200) expect(response.body).to_equal("OK") user = User.objects.filter(email="*****@*****.**").first() expect(response.headers).to_include('Token-Expiration') # without nano seconds expect(response.headers['Token-Expiration'][:19]).to_equal( user.token_expiration.isoformat()[:19]) expect(response.headers).to_include('Token') expect(response.headers['Token']).to_equal(user.token)
def test_authenticate_with_invalid_pass_should_be_access_denied(self): user = User(email="*****@*****.**", password="******") user.save() response = self.fetch_with_headers(self.reverse_url('auth_user'), email="*****@*****.**", password="******") expect(response.code).to_equal(403)