This repository has been archived by the owner on Jan 18, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 432
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Treat `tests` as part of the local package * Import modules instead of objects Some imports that slipped by last time this was cleaned up.
- Loading branch information
Showing
15 changed files
with
66 additions
and
68 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -38,7 +38,7 @@ | |
from oauth2client import client | ||
from oauth2client import clientsecrets | ||
from oauth2client.contrib import appengine | ||
from ... import http_mock | ||
from tests import http_mock | ||
|
||
__author__ = '[email protected] (Joe Gregorio)' | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -18,18 +18,18 @@ | |
|
||
from django import http | ||
import django.conf | ||
from django.contrib.auth.models import AnonymousUser, User | ||
from django.contrib.auth import models as django_models | ||
import mock | ||
from six.moves import http_client | ||
from six.moves import reload_module | ||
from six.moves.urllib import parse | ||
from tests.contrib.django_util import TestWithDjangoEnvironment | ||
|
||
import oauth2client.contrib.django_util | ||
from oauth2client.contrib.django_util import decorators | ||
from tests.contrib import django_util as tests_django_util | ||
|
||
|
||
class OAuth2EnabledDecoratorTest(TestWithDjangoEnvironment): | ||
class OAuth2EnabledDecoratorTest(tests_django_util.TestWithDjangoEnvironment): | ||
|
||
def setUp(self): | ||
super(OAuth2EnabledDecoratorTest, self).setUp() | ||
|
@@ -39,7 +39,7 @@ def setUp(self): | |
# at import time, so in order for us to reload the settings | ||
# we need to reload the module | ||
reload_module(oauth2client.contrib.django_util) | ||
self.user = User.objects.create_user( | ||
self.user = django_models.User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
|
||
def tearDown(self): | ||
|
@@ -106,14 +106,14 @@ def test_view(request): | |
self.assertFalse(request.oauth.has_credentials()) | ||
|
||
|
||
class OAuth2RequiredDecoratorTest(TestWithDjangoEnvironment): | ||
class OAuth2RequiredDecoratorTest(tests_django_util.TestWithDjangoEnvironment): | ||
|
||
def setUp(self): | ||
super(OAuth2RequiredDecoratorTest, self).setUp() | ||
self.save_settings = copy.deepcopy(django.conf.settings) | ||
|
||
reload_module(oauth2client.contrib.django_util) | ||
self.user = User.objects.create_user( | ||
self.user = django_models.User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
|
||
def tearDown(self): | ||
|
@@ -195,7 +195,8 @@ def test_view(request): | |
response.status_code, django.http.HttpResponseRedirect.status_code) | ||
|
||
|
||
class OAuth2RequiredDecoratorStorageModelTest(TestWithDjangoEnvironment): | ||
class OAuth2RequiredDecoratorStorageModelTest( | ||
tests_django_util.TestWithDjangoEnvironment): | ||
|
||
def setUp(self): | ||
super(OAuth2RequiredDecoratorStorageModelTest, self).setUp() | ||
|
@@ -209,7 +210,7 @@ def setUp(self): | |
django.conf.settings.GOOGLE_OAUTH2_STORAGE_MODEL = STORAGE_MODEL | ||
|
||
reload_module(oauth2client.contrib.django_util) | ||
self.user = User.objects.create_user( | ||
self.user = django_models.User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
|
||
def tearDown(self): | ||
|
@@ -219,7 +220,7 @@ def tearDown(self): | |
def test_redirects_anonymous_to_login(self): | ||
request = self.factory.get('/test') | ||
request.session = self.session | ||
request.user = AnonymousUser() | ||
request.user = django_models.AnonymousUser() | ||
|
||
@decorators.oauth_required | ||
def test_view(request): | ||
|
@@ -233,7 +234,7 @@ def test_view(request): | |
def test_redirects_user_to_oauth_authorize(self): | ||
request = self.factory.get('/test') | ||
request.session = self.session | ||
request.user = User.objects.create_user( | ||
request.user = django_models.User.objects.create_user( | ||
username='bill3', email='[email protected]', password='hunter2') | ||
|
||
@decorators.oauth_required | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,27 +20,26 @@ | |
import django | ||
from django import http | ||
import django.conf | ||
from django.contrib.auth.models import AnonymousUser, User | ||
from django.contrib.auth import models as django_models | ||
import mock | ||
from six.moves import reload_module | ||
|
||
from tests.contrib.django_util import TestWithDjangoEnvironment | ||
from tests.contrib.django_util.models import CredentialsModel | ||
|
||
from oauth2client.client import FlowExchangeError, OAuth2WebServerFlow | ||
from oauth2client import client | ||
import oauth2client.contrib.django_util | ||
from oauth2client.contrib.django_util import views | ||
from oauth2client.contrib.django_util.models import CredentialsField | ||
from oauth2client.contrib.django_util import models | ||
from tests.contrib import django_util as tests_django_util | ||
from tests.contrib.django_util import models as tests_models | ||
|
||
|
||
class OAuth2AuthorizeTest(TestWithDjangoEnvironment): | ||
class OAuth2AuthorizeTest(tests_django_util.TestWithDjangoEnvironment): | ||
|
||
def setUp(self): | ||
super(OAuth2AuthorizeTest, self).setUp() | ||
self.save_settings = copy.deepcopy(django.conf.settings) | ||
reload_module(oauth2client.contrib.django_util) | ||
self.user = User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
self.user = django_models.User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
|
||
def tearDown(self): | ||
django.conf.settings = copy.deepcopy(self.save_settings) | ||
|
@@ -55,7 +54,7 @@ def test_authorize_works(self): | |
def test_authorize_anonymous_user(self): | ||
request = self.factory.get('oauth2/oauth2authorize') | ||
request.session = self.session | ||
request.user = AnonymousUser() | ||
request.user = django_models.AnonymousUser() | ||
response = views.oauth2_authorize(request) | ||
self.assertIsInstance(response, http.HttpResponseRedirect) | ||
|
||
|
@@ -68,7 +67,8 @@ def test_authorize_works_explicit_return_url(self): | |
self.assertIsInstance(response, http.HttpResponseRedirect) | ||
|
||
|
||
class Oauth2AuthorizeStorageModelTest(TestWithDjangoEnvironment): | ||
class Oauth2AuthorizeStorageModelTest( | ||
tests_django_util.TestWithDjangoEnvironment): | ||
|
||
def setUp(self): | ||
super(Oauth2AuthorizeStorageModelTest, self).setUp() | ||
|
@@ -85,7 +85,7 @@ def setUp(self): | |
# at import time, so in order for us to reload the settings | ||
# we need to reload the module | ||
reload_module(oauth2client.contrib.django_util) | ||
self.user = User.objects.create_user( | ||
self.user = django_models.User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
|
||
def tearDown(self): | ||
|
@@ -103,7 +103,7 @@ def test_authorize_works(self): | |
def test_authorize_anonymous_user_redirects_login(self): | ||
request = self.factory.get('oauth2/oauth2authorize') | ||
request.session = self.session | ||
request.user = AnonymousUser() | ||
request.user = django_models.AnonymousUser() | ||
response = views.oauth2_authorize(request) | ||
self.assertIsInstance(response, http.HttpResponseRedirect) | ||
# redirects to Django login | ||
|
@@ -122,11 +122,11 @@ def test_authorized_user_not_logged_in_redirects(self): | |
data={'return_url': '/return_endpoint'}) | ||
request.session = self.session | ||
|
||
authorized_user = User.objects.create_user( | ||
authorized_user = django_models.User.objects.create_user( | ||
username='bill2', email='[email protected]', password='hunter2') | ||
credentials = CredentialsField() | ||
credentials = models.CredentialsField() | ||
|
||
CredentialsModel.objects.create( | ||
tests_models.CredentialsModel.objects.create( | ||
user_id=authorized_user, | ||
credentials=credentials) | ||
|
||
|
@@ -135,7 +135,7 @@ def test_authorized_user_not_logged_in_redirects(self): | |
self.assertIsInstance(response, http.HttpResponseRedirect) | ||
|
||
|
||
class Oauth2CallbackTest(TestWithDjangoEnvironment): | ||
class Oauth2CallbackTest(tests_django_util.TestWithDjangoEnvironment): | ||
|
||
def setUp(self): | ||
super(Oauth2CallbackTest, self).setUp() | ||
|
@@ -149,7 +149,7 @@ def setUp(self): | |
'return_url': self.RETURN_URL, | ||
'scopes': django.conf.settings.GOOGLE_OAUTH2_SCOPES | ||
} | ||
self.user = User.objects.create_user( | ||
self.user = django_models.User.objects.create_user( | ||
username='bill', email='[email protected]', password='hunter2') | ||
|
||
@mock.patch('oauth2client.contrib.django_util.views.pickle') | ||
|
@@ -161,7 +161,7 @@ def test_callback_works(self, pickle): | |
|
||
self.session['google_oauth2_csrf_token'] = self.CSRF_TOKEN | ||
|
||
flow = OAuth2WebServerFlow( | ||
flow = client.OAuth2WebServerFlow( | ||
client_id='clientid', | ||
client_secret='clientsecret', | ||
scope=['email'], | ||
|
@@ -190,7 +190,7 @@ def test_callback_handles_bad_flow_exchange(self, pickle): | |
|
||
self.session['google_oauth2_csrf_token'] = self.CSRF_TOKEN | ||
|
||
flow = OAuth2WebServerFlow( | ||
flow = client.OAuth2WebServerFlow( | ||
client_id='clientid', | ||
client_secret='clientsecret', | ||
scope=['email'], | ||
|
@@ -201,7 +201,7 @@ def test_callback_handles_bad_flow_exchange(self, pickle): | |
self.session[session_key] = pickle.dumps(flow) | ||
|
||
def local_throws(code): | ||
raise FlowExchangeError('test') | ||
raise client.FlowExchangeError('test') | ||
|
||
flow.step2_exchange = local_throws | ||
pickle.loads.return_value = flow | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -28,7 +28,7 @@ | |
from oauth2client import client | ||
from oauth2client import clientsecrets | ||
from oauth2client.contrib import flask_util | ||
from .. import http_mock | ||
from tests import http_mock | ||
|
||
|
||
__author__ = '[email protected] (Jon Wayne Parrott)' | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.