Remove login
This commit is contained in:
parent
8db122c436
commit
d4e8aca825
|
|
@ -187,7 +187,7 @@ class LoginTests(TestCase):
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_TEACHERS_ORDERS)
|
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_TEACHERS_ORDERS)
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
||||||
def new_user_is_created_in_system_after_login(self, user_mock, authorize_mock, orders_mock):
|
def new_user_is_created_in_system_after_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
||||||
response = self._login('/api/oauth/authorize?code=1234')
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
||||||
try:
|
try:
|
||||||
|
|
@ -213,3 +213,33 @@ class LoginTests(TestCase):
|
||||||
self.fail('LoginTests.test_teacher_can_login_with_valid_license: Userdata should not exist')
|
self.fail('LoginTests.test_teacher_can_login_with_valid_license: Userdata should not exist')
|
||||||
except:
|
except:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
||||||
|
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
||||||
|
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
||||||
|
def new_user_is_created_in_system_after_login(self, user_mock, authorize_mock, orders_mock):
|
||||||
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
||||||
|
try:
|
||||||
|
user = User.objects.get(email=NEW_ME_DATA['email'])
|
||||||
|
except:
|
||||||
|
self.fail('LoginTests.new_user_is_created_in_system_after_login: User was not created')
|
||||||
|
|
||||||
|
user_role_key = user.user_roles.get(user=user).role.key
|
||||||
|
self.assertEqual(user_role_key, Role.objects.TEACHER_KEY)
|
||||||
|
|
||||||
|
license = License.objects.get(licensee=user)
|
||||||
|
self.assertEqual(license.for_role.key, Role.objects.TEACHER_KEY)
|
||||||
|
|
||||||
|
school_class = SchoolClass.objects.get(users__in=[user])
|
||||||
|
self.assertIsNotNone(school_class)
|
||||||
|
|
||||||
|
self.assertEqual(response.status_code, 302)
|
||||||
|
self.assertEqual(response.url, f'/login-success?state={NO_VALID_LICENSE}')
|
||||||
|
self.assertTrue(self.user.is_authenticated)
|
||||||
|
|
||||||
|
try:
|
||||||
|
UserData.objects.get(user=user)
|
||||||
|
self.fail('LoginTests.test_teacher_can_login_with_valid_license: Userdata should not exist')
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
|
|
||||||
|
|
@ -36,3 +36,9 @@ def authorize(request):
|
||||||
# return status_msg
|
# return status_msg
|
||||||
# return cls.return_login_message(status_msg)
|
# return cls.return_login_message(status_msg)
|
||||||
return redirect(f'/login-success?state=success')
|
return redirect(f'/login-success?state=success')
|
||||||
|
|
||||||
|
|
||||||
|
# def return_login_message(cls, message):
|
||||||
|
# # if message == EMAIL_NOT_VERIFIED or message == UNKNOWN_ERROR or message == 'invalid_credentials':
|
||||||
|
# # raise Exception(message)
|
||||||
|
# return cls(success=True, message=message)
|
||||||
|
|
|
||||||
|
|
@ -29,47 +29,7 @@ class BetaLogin(relay.ClientIDMutation):
|
||||||
raise Exception('not_implemented')
|
raise Exception('not_implemented')
|
||||||
|
|
||||||
|
|
||||||
class Login(relay.ClientIDMutation):
|
|
||||||
class Input:
|
|
||||||
token_input = graphene.String()
|
|
||||||
|
|
||||||
success = graphene.Boolean()
|
|
||||||
message = graphene.String()
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def mutate_and_get_payload(cls, root, info, **kwargs):
|
|
||||||
|
|
||||||
# hep_client = HepClient()
|
|
||||||
# token = kwargs.get('token_input')
|
|
||||||
#
|
|
||||||
# try:
|
|
||||||
# user_data = hep_client.customer_me(token)
|
|
||||||
# except HepClientUnauthorizedException:
|
|
||||||
# return cls.return_login_message('invalid_credentials')
|
|
||||||
# except HepClientException:
|
|
||||||
# return cls.return_login_message(UNKNOWN_ERROR)
|
|
||||||
#
|
|
||||||
# # use in auth
|
|
||||||
# user, status_msg = handle_user_and_verify_products(user_data)
|
|
||||||
# user.sync_with_hep_data(user_data)
|
|
||||||
#
|
|
||||||
# if user and status_msg != EMAIL_NOT_VERIFIED:
|
|
||||||
# login(info.context, user)
|
|
||||||
#
|
|
||||||
# if status_msg:
|
|
||||||
# return cls.return_login_message(status_msg)
|
|
||||||
|
|
||||||
return cls(success=True, message='success')
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def return_login_message(cls, message):
|
|
||||||
# if message == EMAIL_NOT_VERIFIED or message == UNKNOWN_ERROR or message == 'invalid_credentials':
|
|
||||||
# raise Exception(message)
|
|
||||||
return cls(success=True, message=message)
|
|
||||||
|
|
||||||
|
|
||||||
class UserMutations:
|
class UserMutations:
|
||||||
login = Login.Field()
|
|
||||||
beta_login = BetaLogin.Field()
|
beta_login = BetaLogin.Field()
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,237 +1,115 @@
|
||||||
# from datetime import timedelta
|
from datetime import timedelta
|
||||||
# from unittest.mock import patch
|
from unittest.mock import patch
|
||||||
#
|
|
||||||
# import requests
|
import requests
|
||||||
# from django.conf import settings
|
from django.conf import settings
|
||||||
# from django.contrib.sessions.middleware import SessionMiddleware
|
from django.contrib.sessions.middleware import SessionMiddleware
|
||||||
# from django.test import TestCase, RequestFactory
|
from django.test import TestCase, RequestFactory
|
||||||
# from django.utils import timezone
|
from django.utils import timezone
|
||||||
# from graphene.test import Client
|
from graphene.test import Client
|
||||||
#
|
|
||||||
# from api.schema_public import schema
|
from api.schema_public import schema
|
||||||
# from core.factories import UserFactory
|
from core.factories import UserFactory
|
||||||
# from core.hep_client import HepClient
|
from core.tests.mock_hep_data_factory import MockResponse, ME_DATA, VALID_STUDENT_ORDERS, VALID_TEACHERS_ORDERS, \
|
||||||
# from core.tests.mock_hep_data_factory import MockResponse, ME_DATA, VALID_STUDENT_ORDERS, VALID_TEACHERS_ORDERS, \
|
NOT_CONFIRMED_ME
|
||||||
# NOT_CONFIRMED_ME
|
from users.factories import LicenseFactory
|
||||||
# from users.factories import LicenseFactory
|
from users.models import Role, User, SchoolClass, License, UserData
|
||||||
# from users.models import Role, User, SchoolClass, License, UserData
|
|
||||||
#
|
TOKEN = 'abcd12345!'
|
||||||
# TOKEN = 'abcd12345!'
|
|
||||||
#
|
MYSKILLBOX_GROUP_ID_ME_DATA = ME_DATA.copy()
|
||||||
# MYSKILLBOX_GROUP_ID_ME_DATA = ME_DATA.copy()
|
MYSKILLBOX_GROUP_ID_ME_DATA['group_id'] = settings.HEP_MYSKILLBOX_GROUP_ID
|
||||||
# MYSKILLBOX_GROUP_ID_ME_DATA['group_id'] = settings.HEP_MYSKILLBOX_GROUP_ID
|
|
||||||
|
|
||||||
|
|
||||||
# class LoginTests(TestCase):
|
class LoginTests(TestCase):
|
||||||
# def setUp(self):
|
def setUp(self):
|
||||||
# self.user = UserFactory(username=ME_DATA['id'], email=ME_DATA['id'])
|
self.user = UserFactory(username=ME_DATA['id'], email=ME_DATA['id'])
|
||||||
# Role.objects.create_default_roles()
|
Role.objects.create_default_roles()
|
||||||
# self.teacher_role = Role.objects.get_default_teacher_role()
|
self.teacher_role = Role.objects.get_default_teacher_role()
|
||||||
#
|
|
||||||
# request = RequestFactory().post('/')
|
request = RequestFactory().post('/')
|
||||||
#
|
|
||||||
# # adding session
|
# adding session
|
||||||
# middleware = SessionMiddleware()
|
middleware = SessionMiddleware()
|
||||||
# middleware.process_request(request)
|
middleware.process_request(request)
|
||||||
# request.session.save()
|
request.session.save()
|
||||||
# self.client = Client(schema=schema, context_value=request)
|
self.client = Client(schema=schema, context_value=request)
|
||||||
#
|
|
||||||
# def make_login_mutation(self, token):
|
def make_login_mutation(self, token):
|
||||||
# mutation = '''
|
mutation = '''
|
||||||
# mutation Login($input: LoginInput!){
|
mutation Login($input: LoginInput!){
|
||||||
# login(input: $input) {
|
login(input: $input) {
|
||||||
# success
|
success
|
||||||
# message
|
message
|
||||||
# }
|
}
|
||||||
# }
|
}
|
||||||
# '''
|
'''
|
||||||
#
|
|
||||||
# return self.client.execute(mutation, variables={
|
return self.client.execute(mutation, variables={
|
||||||
# 'input': {
|
'input': {
|
||||||
# 'tokenInput': token
|
'tokenInput': token
|
||||||
# }
|
}
|
||||||
# })
|
})
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
@patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
||||||
# def test_user_can_login_with_local_user_and_valid_local_license(self, me_mock):
|
def test_user_can_login_with_local_user_and_valid_local_license(self, me_mock):
|
||||||
#
|
|
||||||
# self.user.hep_id = ME_DATA['id']
|
self.user.hep_id = ME_DATA['id']
|
||||||
# self.user.save()
|
self.user.save()
|
||||||
#
|
|
||||||
# now = timezone.now()
|
now = timezone.now()
|
||||||
# expiry_date = now + timedelta(100)
|
expiry_date = now + timedelta(100)
|
||||||
# LicenseFactory(expire_date=expiry_date, licensee=self.user, for_role=self.teacher_role).save()
|
LicenseFactory(expire_date=expiry_date, licensee=self.user, for_role=self.teacher_role).save()
|
||||||
#
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
result = self.make_login_mutation(TOKEN)
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
self.assertTrue(result.get('data').get('login').get('success'))
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
self.assertTrue(self.user.is_authenticated)
|
||||||
#
|
|
||||||
# reloaded_user = User.objects.get(pk=self.user.id)
|
reloaded_user = User.objects.get(pk=self.user.id)
|
||||||
# self.assertEqual(reloaded_user.license_expiry_date, expiry_date.date())
|
self.assertEqual(reloaded_user.license_expiry_date, expiry_date.date())
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
@patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
||||||
# def test_user_can_login_with_local_user_and_valid_local_licenses(self, me_mock):
|
def test_user_can_login_with_local_user_and_valid_local_licenses(self, me_mock):
|
||||||
#
|
|
||||||
# self.user.hep_id = ME_DATA['id']
|
self.user.hep_id = ME_DATA['id']
|
||||||
# self.user.save()
|
self.user.save()
|
||||||
#
|
|
||||||
# now = timezone.now()
|
now = timezone.now()
|
||||||
# expiry_date1 = now + timedelta(100)
|
expiry_date1 = now + timedelta(100)
|
||||||
# expiry_date2 = now + timedelta(110)
|
expiry_date2 = now + timedelta(110)
|
||||||
#
|
|
||||||
# LicenseFactory(expire_date=expiry_date1, licensee=self.user, for_role=self.teacher_role).save()
|
LicenseFactory(expire_date=expiry_date1, licensee=self.user, for_role=self.teacher_role).save()
|
||||||
# LicenseFactory(expire_date=expiry_date2, licensee=self.user, for_role=self.teacher_role).save()
|
LicenseFactory(expire_date=expiry_date2, licensee=self.user, for_role=self.teacher_role).save()
|
||||||
#
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
result = self.make_login_mutation(TOKEN)
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
self.assertTrue(result.get('data').get('login').get('success'))
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
self.assertTrue(self.user.is_authenticated)
|
||||||
#
|
|
||||||
# reloaded_user = User.objects.get(pk=self.user.id)
|
reloaded_user = User.objects.get(pk=self.user.id)
|
||||||
# self.assertEqual(reloaded_user.license_expiry_date, expiry_date2.date())
|
self.assertEqual(reloaded_user.license_expiry_date, expiry_date2.date())
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
@patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
||||||
# def test_user_data_is_synced_on_login(self, me_mock):
|
def test_user_can_login_with_local_user_and_valid_local_licenses(self, me_mock):
|
||||||
#
|
|
||||||
# old_mail = 'aschi@iterativ.ch'
|
self.user.hep_id = ME_DATA['id']
|
||||||
#
|
self.user.save()
|
||||||
# self.user.hep_id = ME_DATA['id']
|
|
||||||
# self.user.email = old_mail
|
now = timezone.now()
|
||||||
# self.user.username = old_mail
|
expiry_date1 = now + timedelta(365)
|
||||||
# self.user.save()
|
expiry_date2 = now + timedelta(366)
|
||||||
#
|
|
||||||
# now = timezone.now()
|
LicenseFactory(expire_date=expiry_date1, licensee=self.user, for_role=self.teacher_role).save()
|
||||||
# expiry_date = now + timedelta(365)
|
LicenseFactory(expire_date=expiry_date2, licensee=self.user, for_role=self.teacher_role).save()
|
||||||
# LicenseFactory(expire_date=expiry_date, licensee=self.user, for_role=self.teacher_role).save()
|
|
||||||
#
|
result = self.make_login_mutation(TOKEN)
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
self.assertTrue(result.get('data').get('login').get('success'))
|
||||||
# user = User.objects.get(hep_id=self.user.hep_id)
|
self.assertTrue(self.user.is_authenticated)
|
||||||
#
|
|
||||||
# self.assertEqual(user.username, ME_DATA['email'])
|
@patch.object(requests, 'post', return_value=MockResponse(401))
|
||||||
# self.assertEqual(user.email, ME_DATA['email'])
|
def test_user_with_no_login_cannot_login(self, post_mock):
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
result = self.make_login_mutation('some')
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
|
||||||
#
|
self.assertEqual(result.get('errors')[0].get('message'), 'invalid_credentials')
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
|
||||||
# def test_user_can_login_with_local_user_and_valid_local_licenses(self, me_mock):
|
|
||||||
#
|
|
||||||
# self.user.hep_id = ME_DATA['id']
|
|
||||||
# self.user.save()
|
|
||||||
#
|
|
||||||
# now = timezone.now()
|
|
||||||
# expiry_date1 = now + timedelta(365)
|
|
||||||
# expiry_date2 = now + timedelta(366)
|
|
||||||
#
|
|
||||||
# LicenseFactory(expire_date=expiry_date1, licensee=self.user, for_role=self.teacher_role).save()
|
|
||||||
# LicenseFactory(expire_date=expiry_date2, licensee=self.user, for_role=self.teacher_role).save()
|
|
||||||
#
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, '_customer_orders', return_value=VALID_TEACHERS_ORDERS)
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
|
||||||
# @patch.object(HepClient, 'fetch_admin_token', return_value={'token': 'AABBCCDDEE**44566'})
|
|
||||||
# def test_teacher_can_login_with_remote_user_and_remote_license(self, order_mock, me_mock, admin_token_mock):
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# user = User.objects.get(email=ME_DATA['email'])
|
|
||||||
#
|
|
||||||
# user_role_key = user.user_roles.get(user=user).role.key
|
|
||||||
# self.assertEqual(user_role_key, Role.objects.TEACHER_KEY)
|
|
||||||
#
|
|
||||||
# license = License.objects.get(licensee=user)
|
|
||||||
# self.assertEqual(license.for_role.key, Role.objects.TEACHER_KEY)
|
|
||||||
#
|
|
||||||
# school_class = SchoolClass.objects.get(users__in=[user])
|
|
||||||
# self.assertIsNotNone(school_class)
|
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
|
||||||
#
|
|
||||||
# try:
|
|
||||||
# UserData.objects.get(user=user)
|
|
||||||
# self.fail('LoginTests.test_teacher_can_login_with_remote_user_and_remote_license: Userdata should not exist')
|
|
||||||
# except:
|
|
||||||
# pass
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, '_customer_orders', return_value=VALID_TEACHERS_ORDERS)
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=MYSKILLBOX_GROUP_ID_ME_DATA)
|
|
||||||
# @patch.object(HepClient, 'fetch_admin_token', return_value={'token': 'AABBCCDDEE**44566'})
|
|
||||||
# def test_teacher_can_login_with_remote_user_and_remote_license_with_myskillbox_group_id(self, order_mock, me_mock, admin_token_mock):
|
|
||||||
# self.make_login_mutation(TOKEN)
|
|
||||||
# user = User.objects.get(email=MYSKILLBOX_GROUP_ID_ME_DATA['email'])
|
|
||||||
# try:
|
|
||||||
# UserData.objects.get(user=user)
|
|
||||||
# except:
|
|
||||||
# self.fail('LoginTests.test_teacher_can_login_with_remote_user_and_remote_license: Userdata should exist')
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, '_customer_orders', return_value=VALID_STUDENT_ORDERS)
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
|
||||||
# @patch.object(HepClient, 'fetch_admin_token', return_value={'token': 'AABBCCDDEE**44566'})
|
|
||||||
# def test_student_can_login_with_remote_user_and_remote_license(self, order_mock, me_mock, admin_token_mock):
|
|
||||||
#
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
# user = User.objects.get(email=ME_DATA['email'])
|
|
||||||
#
|
|
||||||
# user_role_key = user.user_roles.get(user=user).role.key
|
|
||||||
# self.assertEqual(user_role_key, Role.objects.STUDENT_KEY)
|
|
||||||
#
|
|
||||||
# license = License.objects.get(licensee=user)
|
|
||||||
# self.assertEqual(license.for_role.key, Role.objects.STUDENT_KEY)
|
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
|
||||||
#
|
|
||||||
# @patch.object(requests, 'post', return_value=MockResponse(401))
|
|
||||||
# def test_user_with_no_login_cannot_login(self, post_mock):
|
|
||||||
# result = self.make_login_mutation('some')
|
|
||||||
#
|
|
||||||
# self.assertEqual(result.get('errors')[0].get('message'), 'invalid_credentials')
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'is_email_verified', return_value=False)
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
|
||||||
# def test_user_with_unconfirmed_email_cannot_login(self, me_mock, post_mock):
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# User.objects.get(email=ME_DATA['email'])
|
|
||||||
# self.assertEqual(result.get('errors')[0].get('message'), 'email_not_verified')
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'myskillbox_product_for_customer', return_value=None)
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
|
||||||
# @patch.object(HepClient, 'fetch_admin_token', return_value={'token': 'AABBCCDDEE**44566'})
|
|
||||||
# def test_user_can_login_without_license(self, me_mock, product_mock, admin_token_mock):
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
|
||||||
# self.assertEqual(result.get('data').get('login').get('message'), 'no_valid_license')
|
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'myskillbox_product_for_customer', return_value=None)
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=ME_DATA)
|
|
||||||
# @patch.object(HepClient, 'fetch_admin_token', return_value={'token': 'AABBCCDDEE**44566'})
|
|
||||||
# def test_user_can_login_local_license_invalid(self, product_mock, me_mock, admin_token_mock):
|
|
||||||
# now = timezone.now()
|
|
||||||
# expiry_date = now - timedelta(1)
|
|
||||||
# LicenseFactory(expire_date=expiry_date, licensee=self.user, for_role=self.teacher_role).save()
|
|
||||||
#
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# self.assertTrue(result.get('data').get('login').get('success'))
|
|
||||||
# self.assertEqual(result.get('data').get('login').get('message'), 'no_valid_license')
|
|
||||||
# self.assertTrue(self.user.is_authenticated)
|
|
||||||
#
|
|
||||||
# @patch.object(HepClient, 'customer_me', return_value=NOT_CONFIRMED_ME)
|
|
||||||
# def test_user_can_login_with_unconfirmed_email(self, me_mock):
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# self.assertEqual(result.get('errors')[0].get('message'), 'email_not_verified')
|
|
||||||
#
|
|
||||||
# @patch.object(requests, 'get', return_value=MockResponse(500))
|
|
||||||
# def test_user_gets_notified_if_server_error(self, post_mock):
|
|
||||||
# result = self.make_login_mutation(TOKEN)
|
|
||||||
#
|
|
||||||
# self.assertEqual(result.get('errors')[0].get('message'), 'unknown_error')
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue