@@ -134,10 +134,11 @@ def test_sign_invalid_token(domain, config_file):
134
134
req = {"hash" : "some_data" , "created" : now }
135
135
136
136
with TestClient (app ) as client :
137
- resp = client .post ( "/sign" , json = req )
137
+ resp = client .request ( "POST" , "/sign" , json = req )
138
138
assert resp .status_code == 403
139
139
140
- resp = client .post (
140
+ resp = client .request (
141
+ "POST" ,
141
142
"/sign" ,
142
143
headers = {
143
144
"Authorization" : "bearer " + base64 .b64encode (b"abc" ).decode ("ascii" )
@@ -153,8 +154,8 @@ def test_sign_valid_token(domain, config_file):
153
154
154
155
global signed_hash
155
156
with TestClient (app ) as client :
156
- resp = client .post (
157
- "/sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
157
+ resp = client .request (
158
+ "POST" , " /sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
158
159
)
159
160
signed_hash = resp .json ()
160
161
print (signed_hash )
@@ -189,8 +190,8 @@ def test_sign_valid_token_a_few_mins_ago(domain, config_file):
189
190
req = {"hash" : "some_data" , "created" : now }
190
191
191
192
with TestClient (app ) as client :
192
- resp = client .post (
193
- "/sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
193
+ resp = client .request (
194
+ "POST" , " /sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
194
195
)
195
196
assert resp .status_code == 200
196
197
@@ -205,8 +206,8 @@ def test_sign_valid_token_wrong_date_too_early(domain, config_file):
205
206
206
207
global signed_hash
207
208
with TestClient (app ) as client :
208
- resp = client .post (
209
- "/sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
209
+ resp = client .request (
210
+ "POST" , " /sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
210
211
)
211
212
assert resp .status_code == 400
212
213
@@ -221,8 +222,8 @@ def test_sign_valid_token_bad_date_in_future(domain, config_file):
221
222
222
223
global signed_hash
223
224
with TestClient (app ) as client :
224
- resp = client .post (
225
- "/sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
225
+ resp = client .request (
226
+ "POST" , " /sign" , headers = {"Authorization" : "bearer " + auth_token }, json = req
226
227
)
227
228
assert resp .status_code == 400
228
229
@@ -231,31 +232,31 @@ def test_verify_invalid_missing(domain, config_file):
231
232
with TestClient (app ) as client :
232
233
req = signed_hash .copy ()
233
234
req .pop ("timeSignature" , "" )
234
- resp = client .post ( "/verify" , json = req )
235
+ resp = client .request ( "POST" , "/verify" , json = req )
235
236
assert resp .status_code == 422
236
237
237
238
238
239
def test_verify_invalid_hash (domain , config_file ):
239
240
with TestClient (app ) as client :
240
241
req = signed_hash .copy ()
241
242
req ["hash" ] = "other data"
242
- resp = client .post ( "/verify" , json = req )
243
+ resp = client .request ( "POST" , "/verify" , json = req )
243
244
assert resp .status_code == 400
244
245
245
246
246
247
def test_verify_wrong_cert (domain , config_file ):
247
248
with TestClient (app ) as client :
248
249
req = signed_hash .copy ()
249
250
req ["timestampCert" ] = req ["domainCert" ]
250
- resp = client .post ( "/verify" , json = req )
251
+ resp = client .request ( "POST" , "/verify" , json = req )
251
252
assert resp .status_code == 400
252
253
253
254
254
255
def test_verify_wrong_cross_signed_cert (domain , config_file ):
255
256
with TestClient (app ) as client :
256
257
req = signed_hash .copy ()
257
258
req ["crossSignedCert" ] = req ["timestampCert" ]
258
- resp = client .post ( "/verify" , json = req )
259
+ resp = client .request ( "POST" , "/verify" , json = req )
259
260
assert resp .status_code == 400
260
261
261
262
@@ -264,7 +265,7 @@ def test_verify_invalid_bad_date(domain, config_file):
264
265
# date to early
265
266
req = signed_hash .copy ()
266
267
req ["created" ] = "abc"
267
- resp = client .post ( "/verify" , json = req )
268
+ resp = client .request ( "POST" , "/verify" , json = req )
268
269
assert resp .status_code == 422
269
270
270
271
@@ -275,21 +276,21 @@ def test_verify_invalid_date_out_of_range(domain, config_file):
275
276
req ["created" ] = format_date (
276
277
datetime .datetime .utcnow () - datetime .timedelta (days = 1 )
277
278
)
278
- resp = client .post ( "/verify" , json = req )
279
+ resp = client .request ( "POST" , "/verify" , json = req )
279
280
assert resp .status_code == 400
280
281
281
282
# date to late
282
283
req = signed_hash .copy ()
283
284
req ["created" ] = format_date (
284
285
datetime .datetime .utcnow () + datetime .timedelta (days = 1 )
285
286
)
286
- resp = client .post ( "/verify" , json = req )
287
+ resp = client .request ( "POST" , "/verify" , json = req )
287
288
assert resp .status_code == 400
288
289
289
290
290
291
def test_verify_valid (domain , config_file ):
291
292
with TestClient (app ) as client :
292
- resp = client .post ( "/verify" , json = signed_hash )
293
+ resp = client .request ( "POST" , "/verify" , json = signed_hash )
293
294
assert resp .status_code == 200
294
295
res = resp .json ()
295
296
assert res ["observer" ] == domain
0 commit comments