@@ -685,7 +685,7 @@ async def test_get_current_user_disabled_auth(self, mock_settings):
685685 """Test get_current_user when authentication is disabled"""
686686 mock_settings .disable_auth = True
687687
688- result = get_current_user (None )
688+ result = await get_current_user (None )
689689
690690 assert isinstance (result , UserInfo )
691691 assert result .sub == "local-dev-user"
@@ -700,7 +700,7 @@ async def test_get_current_user_missing_credentials(self, mock_settings):
700700 mock_settings .auth_mode = "oauth2"
701701
702702 with pytest .raises (HTTPException ) as exc_info :
703- get_current_user (None )
703+ await get_current_user (None )
704704
705705 assert exc_info .value .status_code == status .HTTP_401_UNAUTHORIZED
706706 assert "Missing authorization header" in str (exc_info .value .detail )
@@ -717,7 +717,7 @@ async def test_get_current_user_empty_credentials(self, mock_settings):
717717 empty_creds = HTTPAuthorizationCredentials (scheme = "Bearer" , credentials = "" )
718718
719719 with pytest .raises (HTTPException ) as exc_info :
720- get_current_user (empty_creds )
720+ await get_current_user (empty_creds )
721721
722722 assert exc_info .value .status_code == status .HTTP_401_UNAUTHORIZED
723723 assert "Missing bearer token" in str (exc_info .value .detail )
@@ -736,7 +736,7 @@ async def test_get_current_user_valid_token(self, mock_settings, valid_token):
736736 expected_user = UserInfo (
sub = "test-user" ,
email = "[email protected] " )
737737 mock_verify .return_value = expected_user
738738
739- result = get_current_user (creds )
739+ result = await get_current_user (creds )
740740
741741 assert result == expected_user
742742 mock_verify .assert_called_once_with (valid_token )
@@ -753,7 +753,7 @@ async def test_require_scope_success(self, mock_settings):
753753 user = UserInfo (sub = "test-user" , scope = "read write admin" )
754754 scope_dependency = require_scope ("read" )
755755
756- result = scope_dependency (user )
756+ result = await scope_dependency (user )
757757 assert result == user
758758
759759 @pytest .mark .asyncio
@@ -765,7 +765,7 @@ async def test_require_scope_failure(self, mock_settings):
765765 scope_dependency = require_scope ("admin" )
766766
767767 with pytest .raises (HTTPException ) as exc_info :
768- scope_dependency (user )
768+ await scope_dependency (user )
769769
770770 assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
771771 assert "Insufficient permissions" in str (exc_info .value .detail )
@@ -780,7 +780,7 @@ async def test_require_scope_no_scope(self, mock_settings):
780780 scope_dependency = require_scope ("read" )
781781
782782 with pytest .raises (HTTPException ) as exc_info :
783- scope_dependency (user )
783+ await scope_dependency (user )
784784
785785 assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
786786
@@ -792,7 +792,7 @@ async def test_require_scope_disabled_auth(self, mock_settings):
792792 user = UserInfo (sub = "test-user" , scope = None )
793793 scope_dependency = require_scope ("admin" )
794794
795- result = scope_dependency (user )
795+ result = await scope_dependency (user )
796796 assert result == user
797797
798798 @pytest .mark .asyncio
@@ -803,7 +803,7 @@ async def test_require_role_success(self, mock_settings):
803803 user = UserInfo (sub = "test-user" , roles = ["user" , "admin" ])
804804 role_dependency = require_role ("admin" )
805805
806- result = role_dependency (user )
806+ result = await role_dependency (user )
807807 assert result == user
808808
809809 @pytest .mark .asyncio
@@ -815,7 +815,7 @@ async def test_require_role_failure(self, mock_settings):
815815 role_dependency = require_role ("admin" )
816816
817817 with pytest .raises (HTTPException ) as exc_info :
818- role_dependency (user )
818+ await role_dependency (user )
819819
820820 assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
821821 assert "Insufficient permissions" in str (exc_info .value .detail )
@@ -830,7 +830,7 @@ async def test_require_role_no_roles(self, mock_settings):
830830 role_dependency = require_role ("admin" )
831831
832832 with pytest .raises (HTTPException ) as exc_info :
833- role_dependency (user )
833+ await role_dependency (user )
834834
835835 assert exc_info .value .status_code == status .HTTP_403_FORBIDDEN
836836
@@ -842,7 +842,7 @@ async def test_require_role_disabled_auth(self, mock_settings):
842842 user = UserInfo (sub = "test-user" , roles = None )
843843 role_dependency = require_role ("admin" )
844844
845- result = role_dependency (user )
845+ result = await role_dependency (user )
846846 assert result == user
847847
848848
0 commit comments