|
| 1 | +from fastapi import status |
1 | 2 | from fastapi.testclient import TestClient
|
| 3 | +from pytest_mock import MockerFixture |
| 4 | +from sqlalchemy.orm import Session |
2 | 5 |
|
3 |
| -from src.app.core.config import settings |
4 |
| -from src.app.main import app |
| 6 | +from src.app.api.dependencies import get_current_user |
| 7 | +from src.app.api.v1.users import oauth2_scheme |
| 8 | +from tests.conftest import fake, override_dependency |
5 | 9 |
|
6 |
| -from .helper import _get_token |
7 |
| - |
8 |
| -test_name = settings.TEST_NAME |
9 |
| -test_username = settings.TEST_USERNAME |
10 |
| -test_email = settings.TEST_EMAIL |
11 |
| -test_password = settings.TEST_PASSWORD |
12 |
| - |
13 |
| -admin_username = settings.ADMIN_USERNAME |
14 |
| -admin_password = settings.ADMIN_PASSWORD |
15 |
| - |
16 |
| -client = TestClient(app) |
| 10 | +from .helpers import generators, mocks |
17 | 11 |
|
18 | 12 |
|
19 | 13 | def test_post_user(client: TestClient) -> None:
|
20 | 14 | response = client.post(
|
21 | 15 | "/api/v1/user",
|
22 |
| - json={"name": test_name, "username": test_username, "email": test_email, "password": test_password}, |
| 16 | + json={ |
| 17 | + "name": fake.name(), |
| 18 | + "username": fake.user_name(), |
| 19 | + "email": fake.email(), |
| 20 | + "password": fake.password(), |
| 21 | + }, |
23 | 22 | )
|
24 |
| - assert response.status_code == 201 |
| 23 | + assert response.status_code == status.HTTP_201_CREATED |
| 24 | + |
25 | 25 |
|
| 26 | +def test_get_user(db: Session, client: TestClient) -> None: |
| 27 | + user = generators.create_user(db) |
26 | 28 |
|
27 |
| -def test_get_user(client: TestClient) -> None: |
28 |
| - response = client.get(f"/api/v1/user/{test_username}") |
29 |
| - assert response.status_code == 200 |
| 29 | + response = client.get(f"/api/v1/user/{user.username}") |
| 30 | + assert response.status_code == status.HTTP_200_OK |
30 | 31 |
|
| 32 | + response_data = response.json() |
| 33 | + |
| 34 | + assert response_data["id"] == user.id |
| 35 | + assert response_data["username"] == user.username |
| 36 | + |
| 37 | + |
| 38 | +def test_get_multiple_users(db: Session, client: TestClient) -> None: |
| 39 | + for _ in range(5): |
| 40 | + generators.create_user(db) |
31 | 41 |
|
32 |
| -def test_get_multiple_users(client: TestClient) -> None: |
33 | 42 | response = client.get("/api/v1/users")
|
34 |
| - assert response.status_code == 200 |
| 43 | + assert response.status_code == status.HTTP_200_OK |
35 | 44 |
|
| 45 | + response_data = response.json()["data"] |
| 46 | + assert len(response_data) >= 5 |
36 | 47 |
|
37 |
| -def test_update_user(client: TestClient) -> None: |
38 |
| - token = _get_token(username=test_username, password=test_password, client=client) |
39 | 48 |
|
40 |
| - response = client.patch( |
41 |
| - f"/api/v1/user/{test_username}", |
42 |
| - json={"name": f"Updated {test_name}"}, |
43 |
| - headers={"Authorization": f'Bearer {token.json()["access_token"]}'}, |
44 |
| - ) |
45 |
| - assert response.status_code == 200 |
| 49 | +def test_update_user(db: Session, client: TestClient) -> None: |
| 50 | + user = generators.create_user(db) |
| 51 | + new_name = fake.name() |
46 | 52 |
|
| 53 | + override_dependency(get_current_user, mocks.get_current_user(user)) |
47 | 54 |
|
48 |
| -def test_delete_user(client: TestClient) -> None: |
49 |
| - token = _get_token(username=test_username, password=test_password, client=client) |
| 55 | + response = client.patch(f"/api/v1/user/{user.username}", json={"name": new_name}) |
| 56 | + assert response.status_code == status.HTTP_200_OK |
50 | 57 |
|
51 |
| - response = client.delete( |
52 |
| - f"/api/v1/user/{test_username}", headers={"Authorization": f'Bearer {token.json()["access_token"]}'} |
53 |
| - ) |
54 |
| - assert response.status_code == 200 |
55 | 58 |
|
| 59 | +def test_delete_user(db: Session, client: TestClient, mocker: MockerFixture) -> None: |
| 60 | + user = generators.create_user(db) |
56 | 61 |
|
57 |
| -def test_delete_db_user(client: TestClient) -> None: |
58 |
| - token = _get_token(username=admin_username, password=admin_password, client=client) |
| 62 | + override_dependency(get_current_user, mocks.get_current_user(user)) |
| 63 | + override_dependency(oauth2_scheme, mocks.oauth2_scheme()) |
59 | 64 |
|
60 |
| - response = client.delete( |
61 |
| - f"/api/v1/db_user/{test_username}", headers={"Authorization": f'Bearer {token.json()["access_token"]}'} |
62 |
| - ) |
63 |
| - assert response.status_code == 200 |
| 65 | + mocker.patch("src.app.core.security.jwt.decode", return_value={"sub": user.username, "exp": 9999999999}) |
| 66 | + |
| 67 | + response = client.delete(f"/api/v1/user/{user.username}") |
| 68 | + assert response.status_code == status.HTTP_200_OK |
| 69 | + |
| 70 | + |
| 71 | +def test_delete_db_user(db: Session, mocker: MockerFixture, client: TestClient) -> None: |
| 72 | + user = generators.create_user(db) |
| 73 | + super_user = generators.create_user(db, is_super_user=True) |
| 74 | + |
| 75 | + override_dependency(get_current_user, mocks.get_current_user(super_user)) |
| 76 | + override_dependency(oauth2_scheme, mocks.oauth2_scheme()) |
| 77 | + |
| 78 | + mocker.patch("src.app.core.security.jwt.decode", return_value={"sub": user.username, "exp": 9999999999}) |
| 79 | + |
| 80 | + response = client.delete(f"/api/v1/db_user/{user.username}") |
| 81 | + assert response.status_code == status.HTTP_200_OK |
0 commit comments