kwork-api/tests/e2e/test_auth.py
root 034a2e4775 test: reuse authenticated client across E2E tests
- Add session-scoped 'client' fixture for authenticated client
- Add 'catalog_kwork_id' fixture for reusable kwork ID
- Update all catalog tests to use fixtures
- Reduces login calls from 10 to 1 per test session
2026-03-29 23:39:05 +00:00

52 lines
1.4 KiB
Python

"""
E2E тесты аутентификации.
"""
import pytest
from kwork_api import KworkClient
from kwork_api.errors import KworkAuthError
@pytest.mark.e2e
async def test_login_success(require_credentials):
"""E2E: Успешная аутентификация."""
client = await KworkClient.login(
username=require_credentials["username"], password=require_credentials["password"]
)
try:
assert client.token is not None
assert len(client.token) > 0
finally:
await client.close()
@pytest.mark.e2e
async def test_login_invalid_credentials():
"""E2E: Неверные credentials."""
with pytest.raises(KworkAuthError):
await KworkClient.login(username="invalid_user_12345", password="invalid_pass_12345")
@pytest.mark.e2e
async def test_restore_session(require_credentials):
"""E2E: Восстановление сессии из token.
HAR shows: POST /user endpoint works with proper auth token.
"""
# First login
client1 = await KworkClient.login(
username=require_credentials["username"], password=require_credentials["password"]
)
token = client1.token # Get web_auth_token
await client1.close()
# Restore from token
client2 = KworkClient(token=token)
try:
user = await client2.user.get_info()
assert user is not None
finally:
await client2.close()