2022-06-29 17:39:46 +00:00
|
|
|
# pylint: disable=redefined-outer-name
|
|
|
|
# pylint: disable=unused-argument
|
|
|
|
# pylint: disable=missing-function-docstring
|
|
|
|
import datetime
|
2022-12-21 13:09:51 +00:00
|
|
|
import pytest
|
2022-06-29 17:39:46 +00:00
|
|
|
from mnemonic import Mnemonic
|
|
|
|
|
2022-12-21 13:09:51 +00:00
|
|
|
from selfprivacy_api.repositories.tokens.json_tokens_repository import (
|
|
|
|
JsonTokensRepository,
|
|
|
|
)
|
|
|
|
from selfprivacy_api.models.tokens.token import Token
|
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
from tests.common import generate_api_query, read_json, write_json
|
2023-01-04 12:31:24 +00:00
|
|
|
from tests.conftest import DEVICE_WE_AUTH_TESTS_WITH, TOKENS_FILE_CONTENTS
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2023-01-04 13:18:38 +00:00
|
|
|
ORIGINAL_DEVICES = TOKENS_FILE_CONTENTS["tokens"]
|
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
API_DEVICES_QUERY = """
|
|
|
|
devices {
|
|
|
|
creationDate
|
|
|
|
isCaller
|
|
|
|
name
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-12-21 13:09:51 +00:00
|
|
|
@pytest.fixture
|
|
|
|
def token_repo():
|
|
|
|
return JsonTokensRepository()
|
|
|
|
|
|
|
|
|
2023-01-04 13:18:38 +00:00
|
|
|
def graphql_get_devices(client):
|
2023-01-04 12:31:24 +00:00
|
|
|
response = client.post(
|
2022-06-29 17:39:46 +00:00
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": generate_api_query([API_DEVICES_QUERY])},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
2023-01-04 14:22:14 +00:00
|
|
|
data = assert_data(response)
|
|
|
|
devices = data["api"]["devices"]
|
2023-01-04 12:31:24 +00:00
|
|
|
assert devices is not None
|
2023-01-04 13:18:38 +00:00
|
|
|
return devices
|
|
|
|
|
|
|
|
|
|
|
|
def assert_same(graphql_devices, abstract_devices):
|
|
|
|
"""Orderless comparison"""
|
|
|
|
assert len(graphql_devices) == len(abstract_devices)
|
|
|
|
for original_device in abstract_devices:
|
|
|
|
assert original_device["name"] in [device["name"] for device in graphql_devices]
|
|
|
|
for device in graphql_devices:
|
2023-01-04 12:31:24 +00:00
|
|
|
if device["name"] == original_device["name"]:
|
|
|
|
assert device["creationDate"] == original_device["date"].isoformat()
|
|
|
|
|
|
|
|
|
2023-01-04 13:18:38 +00:00
|
|
|
def assert_original(client):
|
|
|
|
devices = graphql_get_devices(client)
|
|
|
|
assert_same(devices, ORIGINAL_DEVICES)
|
|
|
|
|
|
|
|
for device in devices:
|
|
|
|
if device["name"] == DEVICE_WE_AUTH_TESTS_WITH["name"]:
|
|
|
|
assert device["isCaller"] is True
|
|
|
|
else:
|
|
|
|
assert device["isCaller"] is False
|
|
|
|
|
|
|
|
|
2023-01-04 14:01:23 +00:00
|
|
|
def assert_ok(response, request):
|
2023-01-04 14:22:14 +00:00
|
|
|
data = assert_data(response)
|
|
|
|
data[request]["success"] is True
|
|
|
|
data[request]["message"] is not None
|
|
|
|
data[request]["code"] == 200
|
2023-01-04 14:01:23 +00:00
|
|
|
|
|
|
|
|
|
|
|
def assert_errorcode(response, request, code):
|
2023-01-04 14:22:14 +00:00
|
|
|
data = assert_data(response)
|
|
|
|
data[request]["success"] is False
|
|
|
|
data[request]["message"] is not None
|
|
|
|
data[request]["code"] == code
|
2023-01-04 14:01:23 +00:00
|
|
|
|
|
|
|
|
2023-01-04 14:15:12 +00:00
|
|
|
def assert_empty(response):
|
|
|
|
assert response.status_code == 200
|
|
|
|
assert response.json().get("data") is None
|
|
|
|
|
|
|
|
|
2023-01-04 14:22:14 +00:00
|
|
|
def assert_data(response):
|
|
|
|
assert response.status_code == 200
|
|
|
|
data = response.json().get("data")
|
|
|
|
assert data is not None
|
|
|
|
return data
|
|
|
|
|
|
|
|
|
2023-01-04 12:31:24 +00:00
|
|
|
def test_graphql_tokens_info(authorized_client, tokens_file):
|
|
|
|
assert_original(authorized_client)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_tokens_info_unauthorized(client, tokens_file):
|
2022-08-25 17:03:56 +00:00
|
|
|
response = client.post(
|
2022-06-29 17:39:46 +00:00
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": generate_api_query([API_DEVICES_QUERY])},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
2023-01-04 14:15:12 +00:00
|
|
|
assert_empty(response)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
DELETE_TOKEN_MUTATION = """
|
|
|
|
mutation DeleteToken($device: String!) {
|
|
|
|
deleteDeviceApiToken(device: $device) {
|
|
|
|
success
|
|
|
|
message
|
|
|
|
code
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_delete_token_unauthorized(client, tokens_file):
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": DELETE_TOKEN_MUTATION,
|
|
|
|
"variables": {
|
|
|
|
"device": "test_token",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
2023-01-04 14:15:12 +00:00
|
|
|
assert_empty(response)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_delete_token(authorized_client, tokens_file):
|
2023-01-04 13:18:38 +00:00
|
|
|
test_devices = ORIGINAL_DEVICES.copy()
|
|
|
|
device_to_delete = test_devices.pop(1)
|
|
|
|
assert device_to_delete != DEVICE_WE_AUTH_TESTS_WITH
|
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": DELETE_TOKEN_MUTATION,
|
|
|
|
"variables": {
|
2023-01-04 13:18:38 +00:00
|
|
|
"device": device_to_delete["name"],
|
2022-06-29 17:39:46 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
2023-01-04 14:01:23 +00:00
|
|
|
assert_ok(response, "deleteDeviceApiToken")
|
2023-01-04 13:18:38 +00:00
|
|
|
|
|
|
|
devices = graphql_get_devices(authorized_client)
|
|
|
|
assert_same(devices, test_devices)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_delete_self_token(authorized_client, tokens_file):
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": DELETE_TOKEN_MUTATION,
|
|
|
|
"variables": {
|
|
|
|
"device": "test_token",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
2023-01-04 14:01:23 +00:00
|
|
|
assert_errorcode(response, "deleteDeviceApiToken", 400)
|
2023-01-04 12:31:24 +00:00
|
|
|
assert_original(authorized_client)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_delete_nonexistent_token(authorized_client, tokens_file):
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": DELETE_TOKEN_MUTATION,
|
|
|
|
"variables": {
|
|
|
|
"device": "test_token3",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["deleteDeviceApiToken"]["success"] is False
|
|
|
|
assert response.json()["data"]["deleteDeviceApiToken"]["message"] is not None
|
|
|
|
assert response.json()["data"]["deleteDeviceApiToken"]["code"] == 404
|
2023-01-04 12:31:24 +00:00
|
|
|
assert_original(authorized_client)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
REFRESH_TOKEN_MUTATION = """
|
|
|
|
mutation RefreshToken {
|
|
|
|
refreshDeviceApiToken {
|
|
|
|
success
|
|
|
|
message
|
|
|
|
code
|
2022-07-05 12:11:41 +00:00
|
|
|
token
|
2022-06-29 17:39:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_refresh_token_unauthorized(client, tokens_file):
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": REFRESH_TOKEN_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
2023-01-04 14:15:12 +00:00
|
|
|
assert_empty(response)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-12-21 13:09:51 +00:00
|
|
|
def test_graphql_refresh_token(authorized_client, tokens_file, token_repo):
|
2022-06-29 17:39:46 +00:00
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": REFRESH_TOKEN_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["refreshDeviceApiToken"]["success"] is True
|
|
|
|
assert response.json()["data"]["refreshDeviceApiToken"]["message"] is not None
|
|
|
|
assert response.json()["data"]["refreshDeviceApiToken"]["code"] == 200
|
2022-12-21 13:09:51 +00:00
|
|
|
token = token_repo.get_token_by_name("test_token")
|
|
|
|
assert token == Token(
|
|
|
|
token=response.json()["data"]["refreshDeviceApiToken"]["token"],
|
|
|
|
device_name="test_token",
|
|
|
|
created_at=datetime.datetime(2022, 1, 14, 8, 31, 10, 789314),
|
|
|
|
)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
NEW_DEVICE_KEY_MUTATION = """
|
|
|
|
mutation NewDeviceKey {
|
|
|
|
getNewDeviceApiKey {
|
|
|
|
success
|
|
|
|
message
|
|
|
|
code
|
|
|
|
key
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_get_new_device_auth_key_unauthorized(client, tokens_file):
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
2023-01-04 14:15:12 +00:00
|
|
|
assert_empty(response)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_get_new_device_auth_key(authorized_client, tokens_file):
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["success"] is True
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["message"] is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["code"] == 200
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["getNewDeviceApiKey"]["key"].split(" ").__len__() == 12
|
|
|
|
)
|
2022-07-07 13:53:19 +00:00
|
|
|
token = (
|
|
|
|
Mnemonic(language="english")
|
2022-08-25 17:03:56 +00:00
|
|
|
.to_entropy(response.json()["data"]["getNewDeviceApiKey"]["key"])
|
2022-07-07 13:53:19 +00:00
|
|
|
.hex()
|
|
|
|
)
|
2022-06-29 17:39:46 +00:00
|
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
INVALIDATE_NEW_DEVICE_KEY_MUTATION = """
|
|
|
|
mutation InvalidateNewDeviceKey {
|
|
|
|
invalidateNewDeviceApiKey {
|
|
|
|
success
|
|
|
|
message
|
|
|
|
code
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_invalidate_new_device_token_unauthorized(client, tokens_file):
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": DELETE_TOKEN_MUTATION,
|
|
|
|
"variables": {
|
|
|
|
"device": "test_token",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
2023-01-04 14:15:12 +00:00
|
|
|
assert_empty(response)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_get_and_delete_new_device_key(authorized_client, tokens_file):
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["success"] is True
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["message"] is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["code"] == 200
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["getNewDeviceApiKey"]["key"].split(" ").__len__() == 12
|
|
|
|
)
|
2022-07-07 13:53:19 +00:00
|
|
|
token = (
|
|
|
|
Mnemonic(language="english")
|
2022-08-25 17:03:56 +00:00
|
|
|
.to_entropy(response.json()["data"]["getNewDeviceApiKey"]["key"])
|
2022-07-07 13:53:19 +00:00
|
|
|
.hex()
|
|
|
|
)
|
2022-06-29 17:39:46 +00:00
|
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": INVALIDATE_NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["invalidateNewDeviceApiKey"]["success"] is True
|
|
|
|
assert response.json()["data"]["invalidateNewDeviceApiKey"]["message"] is not None
|
|
|
|
assert response.json()["data"]["invalidateNewDeviceApiKey"]["code"] == 200
|
2023-01-04 12:31:24 +00:00
|
|
|
assert_original(authorized_client)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION = """
|
|
|
|
mutation AuthorizeWithNewDeviceKey($input: UseNewDeviceKeyInput!) {
|
2022-07-05 12:11:41 +00:00
|
|
|
authorizeWithNewDeviceApiKey(input: $input) {
|
2022-06-29 17:39:46 +00:00
|
|
|
success
|
|
|
|
message
|
|
|
|
code
|
|
|
|
token
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_get_and_authorize_new_device(client, authorized_client, tokens_file):
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["success"] is True
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["message"] is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["code"] == 200
|
|
|
|
mnemonic_key = response.json()["data"]["getNewDeviceApiKey"]["key"]
|
2022-07-05 12:11:41 +00:00
|
|
|
assert mnemonic_key.split(" ").__len__() == 12
|
|
|
|
key = Mnemonic(language="english").to_entropy(mnemonic_key).hex()
|
2022-06-29 17:39:46 +00:00
|
|
|
assert read_json(tokens_file)["new_device"]["token"] == key
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION,
|
|
|
|
"variables": {
|
2022-07-05 12:11:41 +00:00
|
|
|
"input": {
|
|
|
|
"key": mnemonic_key,
|
|
|
|
"deviceName": "new_device",
|
2022-06-29 17:39:46 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["success"] is True
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["authorizeWithNewDeviceApiKey"]["message"] is not None
|
|
|
|
)
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["code"] == 200
|
|
|
|
token = response.json()["data"]["authorizeWithNewDeviceApiKey"]["token"]
|
2022-06-29 17:39:46 +00:00
|
|
|
assert read_json(tokens_file)["tokens"][2]["token"] == token
|
|
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "new_device"
|
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2023-01-04 12:31:24 +00:00
|
|
|
def test_graphql_authorize_new_device_with_invalid_key(
|
|
|
|
client, authorized_client, tokens_file
|
|
|
|
):
|
2022-06-29 17:39:46 +00:00
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION,
|
|
|
|
"variables": {
|
2022-07-05 12:11:41 +00:00
|
|
|
"input": {
|
2022-06-29 17:39:46 +00:00
|
|
|
"key": "invalid_token",
|
|
|
|
"deviceName": "test_token",
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["success"] is False
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["authorizeWithNewDeviceApiKey"]["message"] is not None
|
|
|
|
)
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["code"] == 404
|
2023-01-04 12:31:24 +00:00
|
|
|
assert_original(authorized_client)
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_get_and_authorize_used_key(client, authorized_client, tokens_file):
|
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["success"] is True
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["message"] is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["code"] == 200
|
|
|
|
mnemonic_key = response.json()["data"]["getNewDeviceApiKey"]["key"]
|
2022-07-05 12:11:41 +00:00
|
|
|
assert mnemonic_key.split(" ").__len__() == 12
|
|
|
|
key = Mnemonic(language="english").to_entropy(mnemonic_key).hex()
|
2022-06-29 17:39:46 +00:00
|
|
|
assert read_json(tokens_file)["new_device"]["token"] == key
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION,
|
|
|
|
"variables": {
|
2022-07-05 12:11:41 +00:00
|
|
|
"input": {
|
|
|
|
"key": mnemonic_key,
|
|
|
|
"deviceName": "new_token",
|
2022-06-29 17:39:46 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["success"] is True
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["authorizeWithNewDeviceApiKey"]["message"] is not None
|
|
|
|
)
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["code"] == 200
|
2022-07-07 13:53:19 +00:00
|
|
|
assert (
|
|
|
|
read_json(tokens_file)["tokens"][2]["token"]
|
2022-08-25 17:03:56 +00:00
|
|
|
== response.json()["data"]["authorizeWithNewDeviceApiKey"]["token"]
|
2022-07-07 13:53:19 +00:00
|
|
|
)
|
2022-07-05 12:11:41 +00:00
|
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "new_token"
|
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION,
|
|
|
|
"variables": {
|
2022-07-05 12:11:41 +00:00
|
|
|
"input": {
|
|
|
|
"key": mnemonic_key,
|
2022-06-29 17:39:46 +00:00
|
|
|
"deviceName": "test_token2",
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["success"] is False
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["authorizeWithNewDeviceApiKey"]["message"] is not None
|
|
|
|
)
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["code"] == 404
|
2022-07-05 12:11:41 +00:00
|
|
|
assert read_json(tokens_file)["tokens"].__len__() == 3
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
|
|
|
def test_graphql_get_and_authorize_key_after_12_minutes(
|
|
|
|
client, authorized_client, tokens_file
|
|
|
|
):
|
2022-06-29 17:39:46 +00:00
|
|
|
response = authorized_client.post(
|
|
|
|
"/graphql",
|
2022-07-07 13:53:19 +00:00
|
|
|
json={"query": NEW_DEVICE_KEY_MUTATION},
|
2022-06-29 17:39:46 +00:00
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["success"] is True
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["message"] is not None
|
|
|
|
assert response.json()["data"]["getNewDeviceApiKey"]["code"] == 200
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["getNewDeviceApiKey"]["key"].split(" ").__len__() == 12
|
|
|
|
)
|
2022-07-07 13:53:19 +00:00
|
|
|
key = (
|
|
|
|
Mnemonic(language="english")
|
2022-08-25 17:03:56 +00:00
|
|
|
.to_entropy(response.json()["data"]["getNewDeviceApiKey"]["key"])
|
2022-07-07 13:53:19 +00:00
|
|
|
.hex()
|
|
|
|
)
|
2022-06-29 17:39:46 +00:00
|
|
|
assert read_json(tokens_file)["new_device"]["token"] == key
|
|
|
|
|
|
|
|
file_data = read_json(tokens_file)
|
|
|
|
file_data["new_device"]["expiration"] = str(
|
|
|
|
datetime.datetime.now() - datetime.timedelta(minutes=13)
|
|
|
|
)
|
|
|
|
write_json(tokens_file, file_data)
|
|
|
|
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION,
|
|
|
|
"variables": {
|
2022-07-05 12:11:41 +00:00
|
|
|
"input": {
|
2022-06-29 17:39:46 +00:00
|
|
|
"key": key,
|
|
|
|
"deviceName": "test_token",
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
assert response.status_code == 200
|
2022-08-25 17:03:56 +00:00
|
|
|
assert response.json().get("data") is not None
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["success"] is False
|
|
|
|
assert (
|
|
|
|
response.json()["data"]["authorizeWithNewDeviceApiKey"]["message"] is not None
|
|
|
|
)
|
|
|
|
assert response.json()["data"]["authorizeWithNewDeviceApiKey"]["code"] == 404
|
2022-06-29 17:39:46 +00:00
|
|
|
|
2022-07-07 13:53:19 +00:00
|
|
|
|
2022-06-29 17:39:46 +00:00
|
|
|
def test_graphql_authorize_without_token(client, tokens_file):
|
|
|
|
response = client.post(
|
|
|
|
"/graphql",
|
|
|
|
json={
|
|
|
|
"query": AUTHORIZE_WITH_NEW_DEVICE_KEY_MUTATION,
|
|
|
|
"variables": {
|
2022-07-05 12:11:41 +00:00
|
|
|
"input": {
|
2022-06-29 17:39:46 +00:00
|
|
|
"deviceName": "test_token",
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
2023-01-04 14:15:12 +00:00
|
|
|
assert_empty(response)
|