55from datetime import datetime , timezone
66
77from tests .conftest import with_jwks_mock
8- from workos .session import SessionModule
8+ from workos .session import Session
99from workos .types .user_management .authentication_response import (
1010 RefreshTokenAuthenticationResponse ,
1111)
@@ -73,7 +73,7 @@ def mock_user_management():
7373
7474@with_jwks_mock
7575def test_initialize_session_module (TEST_CONSTANTS , mock_user_management ):
76- session = SessionModule (
76+ session = Session (
7777 user_management = mock_user_management ,
7878 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
7979 session_data = TEST_CONSTANTS ["SESSION_DATA" ],
@@ -87,7 +87,7 @@ def test_initialize_session_module(TEST_CONSTANTS, mock_user_management):
8787@with_jwks_mock
8888def test_initialize_without_cookie_password (TEST_CONSTANTS , mock_user_management ):
8989 with pytest .raises (ValueError , match = "cookie_password is required" ):
90- SessionModule (
90+ Session (
9191 user_management = mock_user_management ,
9292 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
9393 session_data = TEST_CONSTANTS ["SESSION_DATA" ],
@@ -97,7 +97,7 @@ def test_initialize_without_cookie_password(TEST_CONSTANTS, mock_user_management
9797
9898@with_jwks_mock
9999def test_authenticate_no_session_cookie_provided (TEST_CONSTANTS , mock_user_management ):
100- session = SessionModule (
100+ session = Session (
101101 user_management = mock_user_management ,
102102 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
103103 session_data = None ,
@@ -114,7 +114,7 @@ def test_authenticate_no_session_cookie_provided(TEST_CONSTANTS, mock_user_manag
114114
115115@with_jwks_mock
116116def test_authenticate_invalid_session_cookie (TEST_CONSTANTS , mock_user_management ):
117- session = SessionModule (
117+ session = Session (
118118 user_management = mock_user_management ,
119119 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
120120 session_data = "invalid_session_data" ,
@@ -131,10 +131,10 @@ def test_authenticate_invalid_session_cookie(TEST_CONSTANTS, mock_user_managemen
131131
132132@with_jwks_mock
133133def test_authenticate_invalid_jwt (TEST_CONSTANTS , mock_user_management ):
134- invalid_session_data = SessionModule .seal_data (
134+ invalid_session_data = Session .seal_data (
135135 {"access_token" : "invalid_session_data" }, TEST_CONSTANTS ["COOKIE_PASSWORD" ]
136136 )
137- session = SessionModule (
137+ session = Session (
138138 user_management = mock_user_management ,
139139 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
140140 session_data = invalid_session_data ,
@@ -143,12 +143,14 @@ def test_authenticate_invalid_jwt(TEST_CONSTANTS, mock_user_management):
143143
144144 response = session .authenticate ()
145145
146+ print (response )
147+
146148 assert response .reason == AuthenticateWithSessionCookieFailureReason .INVALID_JWT
147149
148150
149151@with_jwks_mock
150152def test_authenticate_success (TEST_CONSTANTS , mock_user_management ):
151- session = SessionModule (
153+ session = Session (
152154 user_management = mock_user_management ,
153155 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
154156 session_data = TEST_CONSTANTS ["SESSION_DATA" ],
@@ -192,7 +194,7 @@ def test_authenticate_success(TEST_CONSTANTS, mock_user_management):
192194
193195 with (
194196 # Mock unsealing the session data
195- patch .object (SessionModule , "unseal_data" , return_value = mock_session ),
197+ patch .object (Session , "unseal_data" , return_value = mock_session ),
196198 # Mock JWT validation
197199 patch .object (session , "is_valid_jwt" , return_value = True ),
198200 # Mock JWT decoding
@@ -219,7 +221,7 @@ def test_authenticate_success(TEST_CONSTANTS, mock_user_management):
219221
220222@with_jwks_mock
221223def test_refresh_invalid_session_cookie (TEST_CONSTANTS , mock_user_management ):
222- session = SessionModule (
224+ session = Session (
223225 user_management = mock_user_management ,
224226 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
225227 session_data = "invalid_session_data" ,
@@ -248,7 +250,7 @@ def test_refresh_success(TEST_CONSTANTS, mock_user_management):
248250 "updated_at" : TEST_CONSTANTS ["CURRENT_TIMESTAMP" ],
249251 }
250252
251- session_data = SessionModule .seal_data (
253+ session_data = Session .seal_data (
252254 {"refresh_token" : "refresh_token_12345" , "user" : test_user },
253255 TEST_CONSTANTS ["COOKIE_PASSWORD" ],
254256 )
@@ -264,7 +266,7 @@ def test_refresh_success(TEST_CONSTANTS, mock_user_management):
264266 RefreshTokenAuthenticationResponse (** mock_response )
265267 )
266268
267- session = SessionModule (
269+ session = Session (
268270 user_management = mock_user_management ,
269271 client_id = TEST_CONSTANTS ["CLIENT_ID" ],
270272 session_data = session_data ,
@@ -303,16 +305,19 @@ def test_refresh_success(TEST_CONSTANTS, mock_user_management):
303305
304306def test_seal_data (TEST_CONSTANTS ):
305307 test_data = {"test" : "data" }
306- sealed = SessionModule .seal_data (test_data , TEST_CONSTANTS ["COOKIE_PASSWORD" ])
308+ sealed = Session .seal_data (test_data , TEST_CONSTANTS ["COOKIE_PASSWORD" ])
307309 assert isinstance (sealed , str )
308310
309311 # Test unsealing
310- unsealed = SessionModule .unseal_data (sealed , TEST_CONSTANTS ["COOKIE_PASSWORD" ])
312+ unsealed = Session .unseal_data (sealed , TEST_CONSTANTS ["COOKIE_PASSWORD" ])
313+ print (test_data )
314+ print (unsealed )
315+
311316 assert unsealed == test_data
312317
313318
314319def test_unseal_invalid_data (TEST_CONSTANTS ):
315320 with pytest .raises (Exception ): # Adjust exception type based on your implementation
316- SessionModule .unseal_data (
321+ Session .unseal_data (
317322 "invalid_sealed_data" , TEST_CONSTANTS ["COOKIE_PASSWORD" ]
318323 )
0 commit comments