@@ -685,7 +685,7 @@ async def test_get_current_user_disabled_auth(self, mock_settings):
685
685
"""Test get_current_user when authentication is disabled"""
686
686
mock_settings .disable_auth = True
687
687
688
- result = get_current_user (None )
688
+ result = await get_current_user (None )
689
689
690
690
assert isinstance (result , UserInfo )
691
691
assert result .sub == "local-dev-user"
@@ -700,7 +700,7 @@ async def test_get_current_user_missing_credentials(self, mock_settings):
700
700
mock_settings .auth_mode = "oauth2"
701
701
702
702
with pytest .raises (HTTPException ) as exc_info :
703
- get_current_user (None )
703
+ await get_current_user (None )
704
704
705
705
assert exc_info .value .status_code == status .HTTP_401_UNAUTHORIZED
706
706
assert "Missing authorization header" in str (exc_info .value .detail )
@@ -717,7 +717,7 @@ async def test_get_current_user_empty_credentials(self, mock_settings):
717
717
empty_creds = HTTPAuthorizationCredentials (scheme = "Bearer" , credentials = "" )
718
718
719
719
with pytest .raises (HTTPException ) as exc_info :
720
- get_current_user (empty_creds )
720
+ await get_current_user (empty_creds )
721
721
722
722
assert exc_info .value .status_code == status .HTTP_401_UNAUTHORIZED
723
723
assert "Missing bearer token" in str (exc_info .value .detail )
@@ -736,7 +736,7 @@ async def test_get_current_user_valid_token(self, mock_settings, valid_token):
736
736
expected_user = UserInfo (
sub = "test-user" ,
email = "[email protected] " )
737
737
mock_verify .return_value = expected_user
738
738
739
- result = get_current_user (creds )
739
+ result = await get_current_user (creds )
740
740
741
741
assert result == expected_user
742
742
mock_verify .assert_called_once_with (valid_token )
@@ -753,7 +753,7 @@ async def test_require_scope_success(self, mock_settings):
753
753
user = UserInfo (sub = "test-user" , scope = "read write admin" )
754
754
scope_dependency = require_scope ("read" )
755
755
756
- result = scope_dependency (user )
756
+ result = await scope_dependency (user )
757
757
assert result == user
758
758
759
759
@pytest .mark .asyncio
@@ -765,7 +765,7 @@ async def test_require_scope_failure(self, mock_settings):
765
765
scope_dependency = require_scope ("admin" )
766
766
767
767
with pytest .raises (HTTPException ) as exc_info :
768
- scope_dependency (user )
768
+ await scope_dependency (user )
769
769
770
770
assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
771
771
assert "Insufficient permissions" in str (exc_info .value .detail )
@@ -780,7 +780,7 @@ async def test_require_scope_no_scope(self, mock_settings):
780
780
scope_dependency = require_scope ("read" )
781
781
782
782
with pytest .raises (HTTPException ) as exc_info :
783
- scope_dependency (user )
783
+ await scope_dependency (user )
784
784
785
785
assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
786
786
@@ -792,7 +792,7 @@ async def test_require_scope_disabled_auth(self, mock_settings):
792
792
user = UserInfo (sub = "test-user" , scope = None )
793
793
scope_dependency = require_scope ("admin" )
794
794
795
- result = scope_dependency (user )
795
+ result = await scope_dependency (user )
796
796
assert result == user
797
797
798
798
@pytest .mark .asyncio
@@ -803,7 +803,7 @@ async def test_require_role_success(self, mock_settings):
803
803
user = UserInfo (sub = "test-user" , roles = ["user" , "admin" ])
804
804
role_dependency = require_role ("admin" )
805
805
806
- result = role_dependency (user )
806
+ result = await role_dependency (user )
807
807
assert result == user
808
808
809
809
@pytest .mark .asyncio
@@ -815,7 +815,7 @@ async def test_require_role_failure(self, mock_settings):
815
815
role_dependency = require_role ("admin" )
816
816
817
817
with pytest .raises (HTTPException ) as exc_info :
818
- role_dependency (user )
818
+ await role_dependency (user )
819
819
820
820
assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
821
821
assert "Insufficient permissions" in str (exc_info .value .detail )
@@ -830,7 +830,7 @@ async def test_require_role_no_roles(self, mock_settings):
830
830
role_dependency = require_role ("admin" )
831
831
832
832
with pytest .raises (HTTPException ) as exc_info :
833
- role_dependency (user )
833
+ await role_dependency (user )
834
834
835
835
assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
836
836
@@ -842,7 +842,7 @@ async def test_require_role_disabled_auth(self, mock_settings):
842
842
user = UserInfo (sub = "test-user" , roles = None )
843
843
role_dependency = require_role ("admin" )
844
844
845
- result = role_dependency (user )
845
+ result = await role_dependency (user )
846
846
assert result == user
847
847
848
848
0 commit comments