Skip to content

Commit 5a41128

Browse files
committed
remove duplicated test
1 parent 6635957 commit 5a41128

File tree

1 file changed

+0
-125
lines changed

1 file changed

+0
-125
lines changed

api_tests/users/views/test_user_settings.py

Lines changed: 0 additions & 125 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,12 @@
11
from unittest import mock
22
import pytest
3-
import urllib
43

54
from api.base.settings.defaults import API_BASE
6-
from api.base.settings import CSRF_COOKIE_NAME
75
from api.base.utils import hashids
86
from osf_tests.factories import (
97
AuthUserFactory,
108
UserFactory,
119
)
12-
from django.middleware import csrf
1310
from osf.models import Email, NotableDomain
1411
from framework.auth.views import auth_email_logout
1512

@@ -167,128 +164,6 @@ def test_multiple_errors(self, app, user_one, url, payload):
167164
assert res.json['errors'][1]['detail'] == 'Password should be at least eight characters'
168165

169166

170-
@pytest.mark.django_db
171-
@pytest.mark.usefixtures('mock_send_grid')
172-
@pytest.mark.usefixtures('mock_notification_send')
173-
class TestResetPassword:
174-
175-
@pytest.fixture()
176-
def user_one(self):
177-
user = UserFactory()
178-
user.set_password('password1')
179-
user.auth = (user.username, 'password1')
180-
user.save()
181-
return user
182-
183-
@pytest.fixture()
184-
def url(self):
185-
return f'/{API_BASE}users/reset_password/'
186-
187-
@pytest.fixture
188-
def csrf_token(self):
189-
return csrf._mask_cipher_secret(csrf._get_new_csrf_string())
190-
191-
def test_get(self, mock_send_grid, app, url, user_one):
192-
encoded_email = urllib.parse.quote(user_one.email)
193-
url = f'{url}?email={encoded_email}'
194-
res = app.get(url)
195-
assert res.status_code == 200
196-
197-
user_one.reload()
198-
assert mock_send_grid.call_args[1]['to_addr'] == user_one.username
199-
200-
def test_get_invalid_email(self, mock_send_grid, app, url):
201-
url = f'{url}?email={'invalid_email'}'
202-
res = app.get(url)
203-
assert res.status_code == 200
204-
assert not mock_send_grid.called
205-
206-
def test_post(self, app, url, user_one, csrf_token):
207-
app.set_cookie(CSRF_COOKIE_NAME, csrf_token)
208-
encoded_email = urllib.parse.quote(user_one.email)
209-
url = f'{url}?email={encoded_email}'
210-
res = app.get(url)
211-
user_one.reload()
212-
payload = {
213-
'data': {
214-
'attributes': {
215-
'uid': user_one._id,
216-
'token': user_one.verification_key_v2['token'],
217-
'password': 'password2',
218-
}
219-
}
220-
}
221-
222-
res = app.post_json_api(url, payload, headers={'X-CSRFToken': csrf_token})
223-
user_one.reload()
224-
assert res.status_code == 200
225-
assert user_one.check_password('password2')
226-
227-
def test_post_empty_payload(self, app, url, csrf_token):
228-
app.set_cookie(CSRF_COOKIE_NAME, csrf_token)
229-
payload = {
230-
'data': {
231-
'attributes': {
232-
}
233-
}
234-
}
235-
res = app.post_json_api(url, payload, expect_errors=True, headers={'X-CSRFToken': csrf_token})
236-
assert res.status_code == 400
237-
238-
def test_post_invalid_token(self, app, url, user_one, csrf_token):
239-
app.set_cookie(CSRF_COOKIE_NAME, csrf_token)
240-
payload = {
241-
'data': {
242-
'attributes': {
243-
'uid': user_one._id,
244-
'token': 'invalid_token',
245-
'password': 'password2',
246-
}
247-
}
248-
}
249-
res = app.post_json_api(url, payload, expect_errors=True, headers={'X-THROTTLE-TOKEN': 'test-token', 'X-CSRFToken': csrf_token})
250-
assert res.status_code == 400
251-
252-
def test_post_invalid_password(self, app, url, user_one, csrf_token):
253-
app.set_cookie(CSRF_COOKIE_NAME, csrf_token)
254-
encoded_email = urllib.parse.quote(user_one.email)
255-
url = f'{url}?email={encoded_email}'
256-
res = app.get(url)
257-
user_one.reload()
258-
payload = {
259-
'data': {
260-
'attributes': {
261-
'uid': user_one._id,
262-
'token': user_one.verification_key_v2['token'],
263-
'password': user_one.username,
264-
}
265-
}
266-
}
267-
268-
res = app.post_json_api(url, payload, expect_errors=True, headers={'X-THROTTLE-TOKEN': 'test-token', 'X-CSRFToken': csrf_token})
269-
assert res.status_code == 400
270-
271-
def test_throttle(self, app, url, user_one, csrf_token):
272-
app.set_cookie(CSRF_COOKIE_NAME, csrf_token)
273-
encoded_email = urllib.parse.quote(user_one.email)
274-
url = f'{url}?email={encoded_email}'
275-
app.get(url)
276-
user_one.reload()
277-
payload = {
278-
'data': {
279-
'attributes': {
280-
'uid': user_one._id,
281-
'token': user_one.verification_key_v2['token'],
282-
'password': '12345',
283-
}
284-
}
285-
}
286-
287-
res = app.post_json_api(url, payload, expect_errors=True, headers={'X-CSRFToken': csrf_token})
288-
289-
res = app.get(url, expect_errors=True)
290-
assert res.json['message'] == 'You have recently requested to change your password. Please wait a few minutes before trying again.'
291-
292167
@pytest.mark.django_db
293168
class TestUserEmailsList:
294169

0 commit comments

Comments
 (0)