Skip to content

Commit 6c4b853

Browse files
committed
[GPCAPIM-395]: Update patch decorators for session manager and JWT encoding for correct path
1 parent c23ddbd commit 6c4b853

1 file changed

Lines changed: 12 additions & 12 deletions

File tree

gateway-api/src/gateway_api/apim_app_auth/test_apim.py

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ def wrapper(*args: Any, **kwargs: Any) -> Any:
3737

3838
return wrapper
3939

40-
@patch("pathology_api.http.SessionManager")
41-
@patch("pathology_api.apim.jwt.encode")
40+
@patch("gateway_api.apim_app_auth.http.SessionManager")
41+
@patch("gateway_api.apim_app_auth.apim.jwt.encode")
4242
def test_auth(self, mock_jwt: MagicMock, mock_session_manager: MagicMock) -> None:
4343
mock_session_manager.with_session = self.mock_with_session
4444

@@ -96,8 +96,8 @@ def method(_: requests.Session) -> None:
9696

9797
method()
9898

99-
@patch("pathology_api.http.SessionManager")
100-
@patch("pathology_api.apim.jwt.encode")
99+
@patch("gateway_api.apim_app_auth.http.SessionManager")
100+
@patch("gateway_api.apim_app_auth.apim.jwt.encode")
101101
def test_auth_existing_valid_token(
102102
self, mock_jwt: MagicMock, mock_session_manager: MagicMock
103103
) -> None:
@@ -128,8 +128,8 @@ def method(_: requests.Session) -> None:
128128

129129
method()
130130

131-
@patch("pathology_api.http.SessionManager")
132-
@patch("pathology_api.apim.jwt.encode")
131+
@patch("gateway_api.apim_app_auth.http.SessionManager")
132+
@patch("gateway_api.apim_app_auth.apim.jwt.encode")
133133
def test_auth_existing_invalid_token(
134134
self, mock_jwt: MagicMock, mock_session_manager: MagicMock
135135
) -> None:
@@ -194,8 +194,8 @@ def method(_: requests.Session) -> None:
194194

195195
method()
196196

197-
@patch("pathology_api.http.SessionManager")
198-
@patch("pathology_api.apim.jwt.encode")
197+
@patch("gateway_api.apim_app_auth.http.SessionManager")
198+
@patch("gateway_api.apim_app_auth.apim.jwt.encode")
199199
def test_auth_unsuccessful_status_code(
200200
self, mock_jwt: MagicMock, mock_session_manager: MagicMock
201201
) -> None:
@@ -223,8 +223,8 @@ def method(_: requests.Session) -> None:
223223
with pytest.raises(ApimAuthenticationException):
224224
method()
225225

226-
@patch("pathology_api.http.SessionManager")
227-
@patch("pathology_api.apim.jwt.encode")
226+
@patch("gateway_api.apim_app_auth.http.SessionManager")
227+
@patch("gateway_api.apim_app_auth.apim.jwt.encode")
228228
def test_auth_session_post_raises_exception(
229229
self, mock_jwt: MagicMock, mock_session_manager: MagicMock
230230
) -> None:
@@ -253,8 +253,8 @@ def method(_: requests.Session) -> None:
253253
with pytest.raises(requests.RequestException, match="Connection failed"):
254254
method()
255255

256-
@patch("pathology_api.http.SessionManager")
257-
@patch("pathology_api.apim.jwt.encode")
256+
@patch("gateway_api.apim_app_auth.http.SessionManager")
257+
@patch("gateway_api.apim_app_auth.apim.jwt.encode")
258258
def test_auth_jwt_encode_raises_exception(
259259
self, mock_jwt: MagicMock, mock_session_manager: MagicMock
260260
) -> None:

0 commit comments

Comments
 (0)