mirror of
https://github.com/fastapi-users/fastapi-users.git
synced 2025-08-14 18:58:10 +08:00
165 lines
5.6 KiB
Python
165 lines
5.6 KiB
Python
import pytest
|
|
from fastapi import Depends, FastAPI
|
|
from starlette import status
|
|
from starlette.testclient import TestClient
|
|
|
|
from fastapi_users import FastAPIUsers
|
|
from fastapi_users.models import BaseUser, BaseUserDB
|
|
from fastapi_users.router import Event
|
|
|
|
|
|
def sync_event_handler():
|
|
return None
|
|
|
|
|
|
async def async_event_handler():
|
|
return None
|
|
|
|
|
|
@pytest.fixture(params=[sync_event_handler, async_event_handler])
|
|
def fastapi_users(request, mock_user_db, mock_authentication) -> FastAPIUsers:
|
|
class User(BaseUser):
|
|
pass
|
|
|
|
fastapi_users = FastAPIUsers(mock_user_db, mock_authentication, User, "SECRET")
|
|
|
|
@fastapi_users.on_after_register()
|
|
def on_after_register():
|
|
return request.param()
|
|
|
|
@fastapi_users.on_after_forgot_password()
|
|
def on_after_forgot_password():
|
|
return request.param()
|
|
|
|
return fastapi_users
|
|
|
|
|
|
@pytest.fixture()
|
|
@pytest.mark.fastapi_users
|
|
def test_app_client(fastapi_users) -> TestClient:
|
|
app = FastAPI()
|
|
app.include_router(fastapi_users.router, prefix="/users")
|
|
|
|
@app.get("/current-user")
|
|
def current_user(user=Depends(fastapi_users.get_current_user)):
|
|
return user
|
|
|
|
@app.get("/current-active-user")
|
|
def current_active_user(user=Depends(fastapi_users.get_current_active_user)):
|
|
return user
|
|
|
|
@app.get("/current-superuser")
|
|
def current_superuser(user=Depends(fastapi_users.get_current_superuser)):
|
|
return user
|
|
|
|
return TestClient(app)
|
|
|
|
|
|
@pytest.mark.fastapi_users
|
|
class TestFastAPIUsers:
|
|
def test_event_handlers(self, fastapi_users):
|
|
event_handlers = fastapi_users.router.event_handlers
|
|
assert len(event_handlers[Event.ON_AFTER_REGISTER]) == 1
|
|
assert len(event_handlers[Event.ON_AFTER_FORGOT_PASSWORD]) == 1
|
|
|
|
|
|
@pytest.mark.fastapi_users
|
|
class TestRouter:
|
|
def test_routes_exist(self, test_app_client: TestClient):
|
|
response = test_app_client.post("/users/register")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
response = test_app_client.post("/users/login")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
response = test_app_client.post("/users/forgot-password")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
response = test_app_client.post("/users/reset-password")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
response = test_app_client.get("/users")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
response = test_app_client.get("/users/aaa")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
response = test_app_client.patch("/users/aaa")
|
|
assert response.status_code != status.HTTP_404_NOT_FOUND
|
|
|
|
|
|
@pytest.mark.fastapi_users
|
|
class TestGetCurrentUser:
|
|
def test_missing_token(self, test_app_client: TestClient):
|
|
response = test_app_client.get("/current-user")
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_invalid_token(self, test_app_client: TestClient):
|
|
response = test_app_client.get(
|
|
"/current-user", headers={"Authorization": "Bearer foo"}
|
|
)
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_valid_token(self, test_app_client: TestClient, user: BaseUserDB):
|
|
response = test_app_client.get(
|
|
"/current-user", headers={"Authorization": f"Bearer {user.id}"}
|
|
)
|
|
assert response.status_code == status.HTTP_200_OK
|
|
|
|
|
|
@pytest.mark.fastapi_users
|
|
class TestGetCurrentActiveUser:
|
|
def test_missing_token(self, test_app_client: TestClient):
|
|
response = test_app_client.get("/current-active-user")
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_invalid_token(self, test_app_client: TestClient):
|
|
response = test_app_client.get(
|
|
"/current-active-user", headers={"Authorization": "Bearer foo"}
|
|
)
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_valid_token_inactive_user(
|
|
self, test_app_client: TestClient, inactive_user: BaseUserDB
|
|
):
|
|
response = test_app_client.get(
|
|
"/current-active-user",
|
|
headers={"Authorization": f"Bearer {inactive_user.id}"},
|
|
)
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_valid_token(self, test_app_client: TestClient, user: BaseUserDB):
|
|
response = test_app_client.get(
|
|
"/current-active-user", headers={"Authorization": f"Bearer {user.id}"}
|
|
)
|
|
assert response.status_code == status.HTTP_200_OK
|
|
|
|
|
|
@pytest.mark.fastapi_users
|
|
class TestGetCurrentSuperuser:
|
|
def test_missing_token(self, test_app_client: TestClient):
|
|
response = test_app_client.get("/current-superuser")
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_invalid_token(self, test_app_client: TestClient):
|
|
response = test_app_client.get(
|
|
"/current-superuser", headers={"Authorization": "Bearer foo"}
|
|
)
|
|
assert response.status_code == status.HTTP_401_UNAUTHORIZED
|
|
|
|
def test_valid_token_regular_user(
|
|
self, test_app_client: TestClient, user: BaseUserDB
|
|
):
|
|
response = test_app_client.get(
|
|
"/current-superuser", headers={"Authorization": f"Bearer {user.id}"}
|
|
)
|
|
assert response.status_code == status.HTTP_403_FORBIDDEN
|
|
|
|
def test_valid_token_superuser(
|
|
self, test_app_client: TestClient, superuser: BaseUserDB
|
|
):
|
|
response = test_app_client.get(
|
|
"/current-superuser", headers={"Authorization": f"Bearer {superuser.id}"}
|
|
)
|
|
assert response.status_code == status.HTTP_200_OK
|