|
| 1 | +from typing import Optional |
| 2 | + |
1 | 3 | from faker import Faker |
2 | 4 | from fastapi import status |
3 | 5 | from fastapi.testclient import TestClient |
4 | 6 | from loguru import logger |
5 | 7 |
|
6 | 8 | from app.core.configs import configs |
7 | 9 | from app.models.enums import OAuthProvider, Role |
8 | | -from app.schemas.users import UserPasswordRequest, UserRegisterRequest |
| 10 | +from app.schemas.auth import PasswordOAuthReigsterRequest, PasswordOAuthRequest |
9 | 11 |
|
10 | 12 | fake = Faker() |
11 | 13 |
|
12 | 14 |
|
13 | | -def test_register_and_login(sync_client: TestClient): |
14 | | - for _ in range(5): |
15 | | - request, access_token = register_and_login(sync_client) |
16 | | - get_me(sync_client, request, access_token) |
17 | | - response = sync_client.post( |
18 | | - f"{configs.PREFIX}/v1/auth/register/", |
19 | | - json=request.model_dump(), |
| 15 | +def get_mock_request() -> PasswordOAuthReigsterRequest: |
| 16 | + return PasswordOAuthReigsterRequest( |
| 17 | + grant_type="password", |
| 18 | + username=fake.email(), |
| 19 | + password=fake.password(), |
| 20 | + name=fake.name(), |
20 | 21 | ) |
21 | | - assert response.status_code == 409 |
22 | 22 |
|
23 | 23 |
|
24 | | -def get_mock_request() -> UserRegisterRequest: |
25 | | - return UserRegisterRequest( |
26 | | - name=fake.name(), email=fake.email(), password=fake.password() |
27 | | - ) |
28 | | - |
| 24 | +class MockUser: |
| 25 | + def __init__( |
| 26 | + self, |
| 27 | + sync_client: TestClient, |
| 28 | + request: Optional[PasswordOAuthReigsterRequest] = None, |
| 29 | + ) -> None: |
| 30 | + self.client = sync_client |
| 31 | + self.headers = { |
| 32 | + "Content-Type": "application/x-www-form-urlencoded", |
| 33 | + "Accept": "application/json", |
| 34 | + } |
| 35 | + if request: |
| 36 | + self.request = request |
| 37 | + else: |
| 38 | + self.request = get_mock_request() |
29 | 39 |
|
30 | | -def register_and_login(sync_client: TestClient) -> tuple[UserRegisterRequest, str]: |
31 | | - request = get_mock_request() |
32 | | - register(sync_client, request) |
33 | | - access_token = log_in( |
34 | | - sync_client, UserPasswordRequest.model_validate(request.model_dump()) |
35 | | - ) |
36 | | - return request, access_token |
| 40 | + def register(self) -> None: |
| 41 | + response = self.client.post( |
| 42 | + f"{configs.PREFIX}/v1/auth/register/password/", |
| 43 | + headers=self.headers, |
| 44 | + data=self.request.model_dump(), |
| 45 | + ) |
| 46 | + logger.warning(response) |
| 47 | + assert response.status_code == status.HTTP_201_CREATED |
| 48 | + data = response.json()["data"] |
| 49 | + assert data["name"] == self.request.name |
| 50 | + assert data["email"] == self.request.username |
37 | 51 |
|
| 52 | + def log_in(self) -> str: |
| 53 | + request = PasswordOAuthRequest.model_validate(self.request.model_dump()) |
| 54 | + response = self.client.post( |
| 55 | + f"{configs.PREFIX}/v1/auth/token/password/", |
| 56 | + headers=self.headers, |
| 57 | + data=request.model_dump(), |
| 58 | + ) |
| 59 | + logger.warning(response) |
| 60 | + assert response.status_code == status.HTTP_200_OK |
| 61 | + data = response.json() |
| 62 | + assert "access_token" in data |
| 63 | + assert "refresh_token" in data |
| 64 | + assert "token_type" in data |
| 65 | + assert "expires_in" in data |
| 66 | + return data["access_token"] |
38 | 67 |
|
39 | | -def register(sync_client: TestClient, request: UserRegisterRequest) -> None: |
40 | | - response = sync_client.post( |
41 | | - f"{configs.PREFIX}/v1/auth/register/", |
42 | | - json=request.model_dump(), |
43 | | - ) |
44 | | - logger.warning(response) |
45 | | - assert response.status_code == status.HTTP_201_CREATED |
46 | | - data = response.json()["data"] |
47 | | - assert request.name == data["name"] |
48 | | - assert request.email == data["email"] |
| 68 | + def get_me(self, access_token: str) -> int: |
| 69 | + logger.warning(access_token) |
| 70 | + response = self.client.get( |
| 71 | + f"{configs.PREFIX}/v1/auth/me/", |
| 72 | + headers={"Authorization": f"Bearer {access_token}"}, |
| 73 | + ) |
| 74 | + logger.warning(response) |
| 75 | + logger.warning(response.json()) |
| 76 | + assert response.status_code == status.HTTP_200_OK |
| 77 | + data = response.json()["data"] |
| 78 | + assert data["oauth"] == OAuthProvider.PASSWORD.value |
| 79 | + assert data["role"] == Role.USER.value |
| 80 | + assert data["name"] == self.request.name |
| 81 | + assert data["email"] == self.request.username |
| 82 | + assert data["password"] != self.request.password |
| 83 | + return data["id"] |
49 | 84 |
|
50 | 85 |
|
51 | | -def log_in(sync_client: TestClient, request: UserPasswordRequest) -> str: |
52 | | - response = sync_client.post( |
53 | | - f"{configs.PREFIX}/v1/auth/login/", json=request.model_dump() |
54 | | - ) |
55 | | - logger.warning(response) |
56 | | - assert response.status_code == status.HTTP_200_OK |
57 | | - data = response.json()["data"] |
58 | | - return data["access_token"] |
| 86 | +def register_and_log_in(sync_client: TestClient) -> tuple[MockUser, str]: |
| 87 | + mock_user = MockUser(sync_client=sync_client) |
| 88 | + mock_user.register() |
| 89 | + access_token = mock_user.log_in() |
| 90 | + return mock_user, access_token |
59 | 91 |
|
60 | 92 |
|
61 | | -def get_me(sync_client: TestClient, request: UserRegisterRequest, access_token: str): |
62 | | - logger.warning(access_token) |
63 | | - response = sync_client.get( |
64 | | - f"{configs.PREFIX}/v1/auth/me/", |
65 | | - headers={"Authorization": f"Bearer {access_token}"}, |
| 93 | +def test_register_and_log_in(sync_client: TestClient): |
| 94 | + for _ in range(5): |
| 95 | + mock_user, access_token = register_and_log_in(sync_client) |
| 96 | + mock_user.get_me(access_token) |
| 97 | + response = sync_client.post( |
| 98 | + f"{configs.PREFIX}/v1/auth/register/password/", |
| 99 | + headers=mock_user.headers, |
| 100 | + data=mock_user.request.model_dump(), |
66 | 101 | ) |
67 | | - logger.warning(response) |
68 | | - logger.warning(response.json()) |
69 | | - assert response.status_code == status.HTTP_200_OK |
70 | | - data = response.json()["data"] |
71 | | - assert data["oauth"] == OAuthProvider.PASSWORD.value |
72 | | - assert data["role"] == Role.USER.value |
73 | | - assert data["name"] == request.name |
74 | | - assert data["email"] == request.email |
75 | | - assert data["password"] != request.password |
| 102 | + assert response.status_code == 409 |
0 commit comments