|
1 | | -import unittest |
2 | 1 | import time |
| 2 | +import unittest |
3 | 3 |
|
4 | 4 | from cryptography.hazmat.backends import default_backend |
5 | 5 | from cryptography.hazmat.primitives.asymmetric import rsa |
|
11 | 11 | ) |
12 | 12 |
|
13 | 13 | from twilio.http.validation_client import ValidationPayload |
14 | | -from twilio.jwt import Jwt |
15 | 14 | from twilio.jwt.validation import ClientValidationJwt |
16 | 15 |
|
17 | 16 |
|
@@ -231,12 +230,12 @@ def test_jwt_payload(self): |
231 | 230 |
|
232 | 231 | jwt = ClientValidationJwt('AC123', 'SK123', 'CR123', 'secret', vp) |
233 | 232 |
|
234 | | - self.assertDictContainsSubset({ |
| 233 | + self.assertEqual(jwt.payload, {**jwt.payload, **{ |
235 | 234 | 'hrh': 'authorization;host', |
236 | 235 | 'rqh': expected_hash, |
237 | 236 | 'iss': 'SK123', |
238 | 237 | 'sub': 'AC123', |
239 | | - }, jwt.payload) |
| 238 | + }}) |
240 | 239 | self.assertGreaterEqual(jwt.payload['exp'], time.time(), 'JWT exp is before now') |
241 | 240 | self.assertLessEqual(jwt.payload['exp'], time.time() + 301, 'JWT exp is after now + 5mins') |
242 | 241 | self.assertDictEqual({ |
@@ -268,12 +267,12 @@ def test_jwt_signing(self): |
268 | 267 | jwt = ClientValidationJwt('AC123', 'SK123', 'CR123', private_key, vp) |
269 | 268 | decoded = ClientValidationJwt.from_jwt(jwt.to_jwt(), public_key) |
270 | 269 |
|
271 | | - self.assertDictContainsSubset({ |
| 270 | + self.assertEqual(decoded.payload, {**decoded.payload, **{ |
272 | 271 | 'hrh': 'authorization;host', |
273 | 272 | 'rqh': expected_hash, |
274 | 273 | 'iss': 'SK123', |
275 | 274 | 'sub': 'AC123', |
276 | | - }, decoded.payload) |
| 275 | + }}) |
277 | 276 | self.assertGreaterEqual(decoded.payload['exp'], time.time(), 'JWT exp is before now') |
278 | 277 | self.assertLessEqual(decoded.payload['exp'], time.time() + 501, 'JWT exp is after now + 5m') |
279 | 278 | self.assertDictEqual({ |
|
0 commit comments