mirror of
https://git.selfprivacy.org/SelfPrivacy/selfprivacy-rest-api.git
synced 2024-11-29 07:21:27 +00:00
test(services): remove redundant ocserv tests
This commit is contained in:
parent
e63acc6d56
commit
15eafbb524
|
@ -1,123 +0,0 @@
|
||||||
import json
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
|
|
||||||
def read_json(file_path):
|
|
||||||
with open(file_path, "r") as f:
|
|
||||||
return json.load(f)
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
|
||||||
def ocserv_off(mocker, datadir):
|
|
||||||
mocker.patch("selfprivacy_api.utils.USERDATA_FILE", new=datadir / "turned_off.json")
|
|
||||||
assert read_json(datadir / "turned_off.json")["ocserv"]["enable"] == False
|
|
||||||
return datadir
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
|
||||||
def ocserv_on(mocker, datadir):
|
|
||||||
mocker.patch("selfprivacy_api.utils.USERDATA_FILE", new=datadir / "turned_on.json")
|
|
||||||
assert read_json(datadir / "turned_on.json")["ocserv"]["enable"] == True
|
|
||||||
return datadir
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
|
||||||
def ocserv_enable_undefined(mocker, datadir):
|
|
||||||
mocker.patch(
|
|
||||||
"selfprivacy_api.utils.USERDATA_FILE", new=datadir / "enable_undefined.json"
|
|
||||||
)
|
|
||||||
assert "enable" not in read_json(datadir / "enable_undefined.json")["ocserv"]
|
|
||||||
return datadir
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
|
||||||
def ocserv_undefined(mocker, datadir):
|
|
||||||
mocker.patch("selfprivacy_api.utils.USERDATA_FILE", new=datadir / "undefined.json")
|
|
||||||
assert "ocserv" not in read_json(datadir / "undefined.json")
|
|
||||||
return datadir
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("endpoint", ["enable", "disable"])
|
|
||||||
def test_unauthorized(client, ocserv_off, endpoint):
|
|
||||||
response = client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 401
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("endpoint", ["enable", "disable"])
|
|
||||||
def test_illegal_methods(authorized_client, ocserv_off, endpoint):
|
|
||||||
response = authorized_client.get(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 405
|
|
||||||
response = authorized_client.put(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 405
|
|
||||||
response = authorized_client.delete(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 405
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"endpoint,target_file",
|
|
||||||
[("enable", "turned_on.json"), ("disable", "turned_off.json")],
|
|
||||||
)
|
|
||||||
def test_switch_from_off(authorized_client, ocserv_off, endpoint, target_file):
|
|
||||||
response = authorized_client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 200
|
|
||||||
assert read_json(ocserv_off / "turned_off.json") == read_json(
|
|
||||||
ocserv_off / target_file
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"endpoint,target_file",
|
|
||||||
[("enable", "turned_on.json"), ("disable", "turned_off.json")],
|
|
||||||
)
|
|
||||||
def test_switch_from_on(authorized_client, ocserv_on, endpoint, target_file):
|
|
||||||
response = authorized_client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 200
|
|
||||||
assert read_json(ocserv_on / "turned_on.json") == read_json(ocserv_on / target_file)
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"endpoint,target_file",
|
|
||||||
[("enable", "turned_on.json"), ("disable", "turned_off.json")],
|
|
||||||
)
|
|
||||||
def test_switch_twice(authorized_client, ocserv_off, endpoint, target_file):
|
|
||||||
response = authorized_client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 200
|
|
||||||
response = authorized_client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 200
|
|
||||||
assert read_json(ocserv_off / "turned_off.json") == read_json(
|
|
||||||
ocserv_off / target_file
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"endpoint,target_file",
|
|
||||||
[("enable", "turned_on.json"), ("disable", "turned_off.json")],
|
|
||||||
)
|
|
||||||
def test_on_attribute_deleted(
|
|
||||||
authorized_client, ocserv_enable_undefined, endpoint, target_file
|
|
||||||
):
|
|
||||||
response = authorized_client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 200
|
|
||||||
assert read_json(ocserv_enable_undefined / "enable_undefined.json") == read_json(
|
|
||||||
ocserv_enable_undefined / target_file
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"endpoint,target_file",
|
|
||||||
[("enable", "turned_on.json"), ("disable", "turned_off.json")],
|
|
||||||
)
|
|
||||||
def test_on_ocserv_undefined(
|
|
||||||
authorized_client, ocserv_undefined, endpoint, target_file
|
|
||||||
):
|
|
||||||
response = authorized_client.post(f"/services/ocserv/{endpoint}")
|
|
||||||
assert response.status_code == 200
|
|
||||||
assert read_json(ocserv_undefined / "undefined.json") == read_json(
|
|
||||||
ocserv_undefined / target_file
|
|
||||||
)
|
|
|
@ -1,56 +0,0 @@
|
||||||
{
|
|
||||||
"api": {
|
|
||||||
"token": "TEST_TOKEN",
|
|
||||||
"enableSwagger": false
|
|
||||||
},
|
|
||||||
"bitwarden": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"databasePassword": "PASSWORD",
|
|
||||||
"domain": "test.tld",
|
|
||||||
"hashedMasterPassword": "HASHED_PASSWORD",
|
|
||||||
"hostname": "test-instance",
|
|
||||||
"nextcloud": {
|
|
||||||
"adminPassword": "ADMIN",
|
|
||||||
"databasePassword": "ADMIN",
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"resticPassword": "PASS",
|
|
||||||
"ssh": {
|
|
||||||
"enable": true,
|
|
||||||
"passwordAuthentication": true,
|
|
||||||
"rootKeys": [
|
|
||||||
"ssh-ed25519 KEY test@pc"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"username": "tester",
|
|
||||||
"gitea": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"ocserv": {
|
|
||||||
},
|
|
||||||
"pleroma": {
|
|
||||||
"enable": true
|
|
||||||
},
|
|
||||||
"autoUpgrade": {
|
|
||||||
"enable": true,
|
|
||||||
"allowReboot": true
|
|
||||||
},
|
|
||||||
"timezone": "Europe/Moscow",
|
|
||||||
"sshKeys": [
|
|
||||||
"ssh-rsa KEY test@pc"
|
|
||||||
],
|
|
||||||
"dns": {
|
|
||||||
"provider": "CLOUDFLARE",
|
|
||||||
"apiKey": "TOKEN"
|
|
||||||
},
|
|
||||||
"server": {
|
|
||||||
"provider": "HETZNER"
|
|
||||||
},
|
|
||||||
"backup": {
|
|
||||||
"provider": "BACKBLAZE",
|
|
||||||
"accountId": "ID",
|
|
||||||
"accountKey": "KEY",
|
|
||||||
"bucket": "selfprivacy"
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,57 +0,0 @@
|
||||||
{
|
|
||||||
"api": {
|
|
||||||
"token": "TEST_TOKEN",
|
|
||||||
"enableSwagger": false
|
|
||||||
},
|
|
||||||
"bitwarden": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"databasePassword": "PASSWORD",
|
|
||||||
"domain": "test.tld",
|
|
||||||
"hashedMasterPassword": "HASHED_PASSWORD",
|
|
||||||
"hostname": "test-instance",
|
|
||||||
"nextcloud": {
|
|
||||||
"adminPassword": "ADMIN",
|
|
||||||
"databasePassword": "ADMIN",
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"resticPassword": "PASS",
|
|
||||||
"ssh": {
|
|
||||||
"enable": true,
|
|
||||||
"passwordAuthentication": true,
|
|
||||||
"rootKeys": [
|
|
||||||
"ssh-ed25519 KEY test@pc"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"username": "tester",
|
|
||||||
"gitea": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"ocserv": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"pleroma": {
|
|
||||||
"enable": true
|
|
||||||
},
|
|
||||||
"autoUpgrade": {
|
|
||||||
"enable": true,
|
|
||||||
"allowReboot": true
|
|
||||||
},
|
|
||||||
"timezone": "Europe/Moscow",
|
|
||||||
"sshKeys": [
|
|
||||||
"ssh-rsa KEY test@pc"
|
|
||||||
],
|
|
||||||
"dns": {
|
|
||||||
"provider": "CLOUDFLARE",
|
|
||||||
"apiKey": "TOKEN"
|
|
||||||
},
|
|
||||||
"server": {
|
|
||||||
"provider": "HETZNER"
|
|
||||||
},
|
|
||||||
"backup": {
|
|
||||||
"provider": "BACKBLAZE",
|
|
||||||
"accountId": "ID",
|
|
||||||
"accountKey": "KEY",
|
|
||||||
"bucket": "selfprivacy"
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,57 +0,0 @@
|
||||||
{
|
|
||||||
"api": {
|
|
||||||
"token": "TEST_TOKEN",
|
|
||||||
"enableSwagger": false
|
|
||||||
},
|
|
||||||
"bitwarden": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"databasePassword": "PASSWORD",
|
|
||||||
"domain": "test.tld",
|
|
||||||
"hashedMasterPassword": "HASHED_PASSWORD",
|
|
||||||
"hostname": "test-instance",
|
|
||||||
"nextcloud": {
|
|
||||||
"adminPassword": "ADMIN",
|
|
||||||
"databasePassword": "ADMIN",
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"resticPassword": "PASS",
|
|
||||||
"ssh": {
|
|
||||||
"enable": true,
|
|
||||||
"passwordAuthentication": true,
|
|
||||||
"rootKeys": [
|
|
||||||
"ssh-ed25519 KEY test@pc"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"username": "tester",
|
|
||||||
"gitea": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"ocserv": {
|
|
||||||
"enable": true
|
|
||||||
},
|
|
||||||
"pleroma": {
|
|
||||||
"enable": true
|
|
||||||
},
|
|
||||||
"autoUpgrade": {
|
|
||||||
"enable": true,
|
|
||||||
"allowReboot": true
|
|
||||||
},
|
|
||||||
"timezone": "Europe/Moscow",
|
|
||||||
"sshKeys": [
|
|
||||||
"ssh-rsa KEY test@pc"
|
|
||||||
],
|
|
||||||
"dns": {
|
|
||||||
"provider": "CLOUDFLARE",
|
|
||||||
"apiKey": "TOKEN"
|
|
||||||
},
|
|
||||||
"server": {
|
|
||||||
"provider": "HETZNER"
|
|
||||||
},
|
|
||||||
"backup": {
|
|
||||||
"provider": "BACKBLAZE",
|
|
||||||
"accountId": "ID",
|
|
||||||
"accountKey": "KEY",
|
|
||||||
"bucket": "selfprivacy"
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,54 +0,0 @@
|
||||||
{
|
|
||||||
"api": {
|
|
||||||
"token": "TEST_TOKEN",
|
|
||||||
"enableSwagger": false
|
|
||||||
},
|
|
||||||
"bitwarden": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"databasePassword": "PASSWORD",
|
|
||||||
"domain": "test.tld",
|
|
||||||
"hashedMasterPassword": "HASHED_PASSWORD",
|
|
||||||
"hostname": "test-instance",
|
|
||||||
"nextcloud": {
|
|
||||||
"adminPassword": "ADMIN",
|
|
||||||
"databasePassword": "ADMIN",
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"resticPassword": "PASS",
|
|
||||||
"ssh": {
|
|
||||||
"enable": true,
|
|
||||||
"passwordAuthentication": true,
|
|
||||||
"rootKeys": [
|
|
||||||
"ssh-ed25519 KEY test@pc"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"username": "tester",
|
|
||||||
"gitea": {
|
|
||||||
"enable": false
|
|
||||||
},
|
|
||||||
"pleroma": {
|
|
||||||
"enable": true
|
|
||||||
},
|
|
||||||
"autoUpgrade": {
|
|
||||||
"enable": true,
|
|
||||||
"allowReboot": true
|
|
||||||
},
|
|
||||||
"timezone": "Europe/Moscow",
|
|
||||||
"sshKeys": [
|
|
||||||
"ssh-rsa KEY test@pc"
|
|
||||||
],
|
|
||||||
"dns": {
|
|
||||||
"provider": "CLOUDFLARE",
|
|
||||||
"apiKey": "TOKEN"
|
|
||||||
},
|
|
||||||
"server": {
|
|
||||||
"provider": "HETZNER"
|
|
||||||
},
|
|
||||||
"backup": {
|
|
||||||
"provider": "BACKBLAZE",
|
|
||||||
"accountId": "ID",
|
|
||||||
"accountKey": "KEY",
|
|
||||||
"bucket": "selfprivacy"
|
|
||||||
}
|
|
||||||
}
|
|
Loading…
Reference in a new issue