1- from flask import url_for
1+ from flask import g , url_for
22from flask_jwt_extended import decode_token
33
44from openatlas .database .token import get_tokens
1010class TokenTests (TestBaseCase ):
1111 def test_token (self ) -> None :
1212 c = self .client
13- with app .test_request_context ():
14- app .preprocess_request ()
15- print ([(user .username , user .id ) for user in User .get_all ()])
1613
1714 rv = c .get (url_for ('api_token' ))
1815 assert b'Token' in rv .data
@@ -30,9 +27,7 @@ def test_token(self) -> None:
3027 jwt_token_strings = []
3128
3229 for token in generating_tokens :
33- rv = c .post (
34- url_for ('generate_token' ),
35- data = token )
30+ rv = c .post (url_for ('generate_token' ), data = token )
3631 for part in rv .headers ['Set-Cookie' ].split (';' ):
3732 if 'jwt_token=' in part :
3833 jwt_token_strings .append (
@@ -78,9 +73,11 @@ def test_token(self) -> None:
7873
7974 with app .test_request_context ():
8075 app .preprocess_request ()
81-
76+ app .config ['ALLOWED_IPS' ] = []
77+ g .settings ['api_public' ] = False
78+ c .get (url_for ('logout' ))
8279 for token in jwt_token_strings :
83- decoded = decode_token (token )
80+ # decoded = decode_token(token)
8481 #check = check_incoming_tokens({'typ': 'JWT'}, decoded)
8582 #assert check is True if decoded['sub'] in ['Alice', 'Inactive'] else False
8683
@@ -90,7 +87,7 @@ def test_token(self) -> None:
9087 headers = {'Authorization' : f'Bearer { token } ' })
9188 assert b'results' in rv .data
9289
93- assert check_incoming_tokens ({'typ' : 'Unknown' }, decoded ) is True
90+ # assert check_incoming_tokens({'typ': 'Unknown'}, decoded) is True
9491
9592 rv = c .get (url_for ('delete_revoked_tokens' ), follow_redirects = True )
9693 assert b'All revoked tokens deleted' in rv .data
0 commit comments