diracx-testing 0.0.1a18__tar.gz → 0.0.1a20__tar.gz
Sign up to get free protection for your applications and to get access to all the features.
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/PKG-INFO +1 -1
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx/testing/__init__.py +8 -4
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/PKG-INFO +1 -1
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/README.md +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/pyproject.toml +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/setup.cfg +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx/testing/dummy_osdb.py +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx/testing/mock_osdb.py +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx/testing/osdb.py +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx/testing/routers.py +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/SOURCES.txt +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/dependency_links.txt +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/requires.txt +0 -0
- {diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/top_level.txt +0 -0
@@ -241,6 +241,7 @@ class ClientFactory:
|
|
241
241
|
|
242
242
|
@contextlib.contextmanager
|
243
243
|
def configure(self, enabled_dependencies):
|
244
|
+
|
244
245
|
assert (
|
245
246
|
self.app.dependency_overrides == {} and self.app.lifetime_functions == []
|
246
247
|
), "configure cannot be nested"
|
@@ -422,7 +423,7 @@ def with_config_repo(tmp_path_factory):
|
|
422
423
|
"DefaultProxyLifeTime": 432000,
|
423
424
|
"DefaultStorageQuota": 2000,
|
424
425
|
"IdP": {
|
425
|
-
"URL": "https://
|
426
|
+
"URL": "https://idp-server.invalid",
|
426
427
|
"ClientID": "test-idp",
|
427
428
|
},
|
428
429
|
"Users": {
|
@@ -443,6 +444,10 @@ def with_config_repo(tmp_path_factory):
|
|
443
444
|
"c935e5ed-2g0e-5ff9-9eg6-d1bf66e57152",
|
444
445
|
],
|
445
446
|
},
|
447
|
+
"lhcb_prmgr": {
|
448
|
+
"Properties": ["NormalUser", "ProductionManagement"],
|
449
|
+
"Users": ["b824d4dc-1f9d-4ee8-8df5-c0ae55d46041"],
|
450
|
+
},
|
446
451
|
"lhcb_tokenmgr": {
|
447
452
|
"Properties": ["NormalUser", "ProxyManagement"],
|
448
453
|
"Users": ["c935e5ed-2g0e-5ff9-9eg6-d1bf66e57152"],
|
@@ -532,8 +537,8 @@ def cli_env(monkeypatch, tmp_path, demo_urls, demo_dir):
|
|
532
537
|
async def with_cli_login(monkeypatch, capfd, cli_env, tmp_path):
|
533
538
|
try:
|
534
539
|
credentials = await test_login(monkeypatch, capfd, cli_env)
|
535
|
-
except Exception:
|
536
|
-
pytest.skip("Login failed, fix test_login to re-enable this test")
|
540
|
+
except Exception as e:
|
541
|
+
pytest.skip(f"Login failed, fix test_login to re-enable this test: {e!r}")
|
537
542
|
|
538
543
|
credentials_path = tmp_path / "credentials.json"
|
539
544
|
credentials_path.write_text(credentials)
|
@@ -575,7 +580,6 @@ async def test_login(monkeypatch, capfd, cli_env):
|
|
575
580
|
expected_credentials_path = Path(
|
576
581
|
cli_env["HOME"], ".cache", "diracx", "credentials.json"
|
577
582
|
)
|
578
|
-
|
579
583
|
# Ensure the credentials file does not exist before logging in
|
580
584
|
assert not expected_credentials_path.exists()
|
581
585
|
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/dependency_links.txt
RENAMED
File without changes
|
{diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/requires.txt
RENAMED
File without changes
|
{diracx_testing-0.0.1a18 → diracx_testing-0.0.1a20}/src/diracx_testing.egg-info/top_level.txt
RENAMED
File without changes
|