Co-authored-by: Tomek Wójcik <labs@tomekwojcik.pl> Co-committed-by: Tomek Wójcik <labs@tomekwojcik.pl>
173 lines
4.2 KiB
Python
173 lines
4.2 KiB
Python
# -*- coding: utf-8 -*-
|
|
# type: ignore
|
|
from __future__ import annotations
|
|
|
|
import http
|
|
|
|
from django.test import Client
|
|
from django.urls import reverse
|
|
import pytest
|
|
from pytest_django import asserts
|
|
|
|
from hotpocket_backend_testing.services.accounts import (
|
|
AccessTokensTestingService,
|
|
)
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_ok(authenticated_client: Client,
|
|
access_token_out,
|
|
):
|
|
# When
|
|
result = authenticated_client.post(
|
|
reverse('ui.accounts.apps.delete', args=(access_token_out.pk,)),
|
|
data={
|
|
'canhazconfirm': 'hai',
|
|
},
|
|
)
|
|
|
|
# Then
|
|
asserts.assertRedirects(
|
|
result,
|
|
reverse('ui.accounts.apps.browse'),
|
|
fetch_redirect_response=False,
|
|
)
|
|
|
|
AccessTokensTestingService().assert_deleted(
|
|
pk=access_token_out.pk, reference=access_token_out,
|
|
)
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_ok_htmx(authenticated_client: Client,
|
|
access_token_out,
|
|
):
|
|
# When
|
|
result = authenticated_client.post(
|
|
reverse('ui.accounts.apps.delete', args=(access_token_out.pk,)),
|
|
headers={
|
|
'HX-Request': 'true',
|
|
},
|
|
data={
|
|
'canhazconfirm': 'hai',
|
|
},
|
|
)
|
|
|
|
# Then
|
|
assert result.status_code == http.HTTPStatus.OK
|
|
|
|
expected_payload = {
|
|
'status': 'ok',
|
|
'result': True,
|
|
}
|
|
assert result.json() == expected_payload
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_invalid_all_missing(authenticated_client: Client,
|
|
access_token_out,
|
|
):
|
|
# When
|
|
result = authenticated_client.post(
|
|
reverse('ui.accounts.apps.delete', args=(access_token_out.pk,)),
|
|
data={
|
|
},
|
|
)
|
|
|
|
# Then
|
|
assert result.status_code == http.HTTPStatus.OK
|
|
|
|
AccessTokensTestingService().assert_not_deleted(
|
|
pk=access_token_out.pk, reference=access_token_out,
|
|
)
|
|
|
|
assert 'canhazconfirm' in result.context['form'].errors
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_invalid_all_empty(authenticated_client: Client,
|
|
access_token_out,
|
|
):
|
|
# When
|
|
result = authenticated_client.post(
|
|
reverse('ui.accounts.apps.delete', args=(access_token_out.pk,)),
|
|
data={
|
|
'canhazconfirm': '',
|
|
},
|
|
)
|
|
|
|
# Then
|
|
assert result.status_code == http.HTTPStatus.OK
|
|
|
|
AccessTokensTestingService().assert_not_deleted(
|
|
pk=access_token_out.pk, reference=access_token_out,
|
|
)
|
|
|
|
assert 'canhazconfirm' in result.context['form'].errors
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_other_account_access_token(authenticated_client: Client,
|
|
other_account_access_token_out,
|
|
):
|
|
# When
|
|
result = authenticated_client.post(
|
|
reverse('ui.accounts.apps.delete', args=(other_account_access_token_out.pk,)),
|
|
data={
|
|
'canhazconfirm': 'hai',
|
|
},
|
|
)
|
|
|
|
# Then
|
|
assert result.status_code == http.HTTPStatus.FORBIDDEN
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_inactive_account(inactive_account_client: Client,
|
|
access_token_out,
|
|
):
|
|
# When
|
|
result = inactive_account_client.post(
|
|
reverse('ui.accounts.apps.delete', args=(access_token_out.pk,)),
|
|
data={
|
|
'canhazconfirm': 'hai',
|
|
},
|
|
)
|
|
|
|
# Then
|
|
asserts.assertRedirects(
|
|
result,
|
|
reverse(
|
|
'ui.accounts.login',
|
|
query=[
|
|
('next', reverse('ui.accounts.apps.delete', args=(access_token_out.pk,))),
|
|
],
|
|
),
|
|
fetch_redirect_response=False,
|
|
)
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_anonymous(client: Client,
|
|
access_token_out,
|
|
):
|
|
# When
|
|
result = client.post(
|
|
reverse('ui.accounts.apps.delete', args=(access_token_out.pk,)),
|
|
data={
|
|
'canhazconfirm': 'hai',
|
|
},
|
|
)
|
|
|
|
# Then
|
|
asserts.assertRedirects(
|
|
result,
|
|
reverse(
|
|
'ui.accounts.login',
|
|
query=[
|
|
('next', reverse('ui.accounts.apps.delete', args=(access_token_out.pk,))),
|
|
],
|
|
),
|
|
fetch_redirect_response=False,
|
|
)
|