@@ -151,22 +151,6 @@ def test_it_returns_success_if_user_id_is_correct(self):
151
151
self .assertEqual (response ["state" ], "CHALLENGE_SUCCEEDED" )
152
152
self .assertTrue (response ["is_valid" ])
153
153
154
- @responses .activate
155
- def test_it_returns_isValid_false_user_id_is_incorrect (self ):
156
- responses .add (responses .POST , f"{ base_challenge_url } /validate" ,
157
- json = {
158
- 'isValid' : False ,
159
- 'error' : 'User is invalid.' ,
160
- },
161
- status = 200
162
- )
163
-
164
- response = self .authsignal_client .validate_challenge (user_id = "malicious_user_id" , token = self .jwt_token )
165
-
166
- # self.assertEqual(response["error"], "CHALLENGE_SUCCEEDED")
167
- self .assertFalse (response ["is_valid" ])
168
-
169
-
170
154
@responses .activate
171
155
def test_delete_user_authenticator (self ):
172
156
self .authsignal_client = client .Client (api_key = 'test_api_key' )
@@ -195,6 +179,21 @@ def test_it_returns_success_false_if_user_id_is_incorrect(self):
195
179
self .assertFalse (response ['is_valid' ])
196
180
self .assertEqual (response .get ("error" ), "User is invalid." )
197
181
182
+ @responses .activate
183
+ def test_it_returns_isValid_false_if_action_is_incorrect (self ):
184
+ responses .add (responses .POST , f"{ base_challenge_url } /validate" ,
185
+ json = {
186
+ 'isValid' : False ,
187
+ 'error' : 'Action is invalid.' ,
188
+ },
189
+ status = 200
190
+ )
191
+
192
+ response = self .authsignal_client .validate_challenge (action = "malicious_action_id" , token = self .jwt_token )
193
+
194
+ # self.assertEqual(response["error"], "CHALLENGE_SUCCEEDED")
195
+ self .assertFalse (response ["is_valid" ])
196
+
198
197
@responses .activate
199
198
def test_it_returns_success_true_if_no_user_id_is_provided (self ):
200
199
responses .add (responses .POST , f"{ base_challenge_url } /validate" ,
0 commit comments