Skip to content

Commit

Permalink
Fix datetime timezone utc
Browse files Browse the repository at this point in the history
  • Loading branch information
tarsil committed May 21, 2024
1 parent 6b7feb4 commit 238684d
Show file tree
Hide file tree
Showing 7 changed files with 51 additions and 51 deletions.
14 changes: 7 additions & 7 deletions tests/databases/edgy/test_middleware_data.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import random
import string
from datetime import UTC, datetime, timedelta
from datetime import datetime, timedelta, timezone
from typing import AsyncGenerator
from uuid import uuid4

Expand Down Expand Up @@ -68,7 +68,7 @@ def generate_user_token(user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -106,7 +106,7 @@ async def authenticate(self) -> str:
is_password_valid = await user.check_password(self.password)
if is_password_valid and self.user_can_authenticate(user):
# Using the access_token_lifetime from the JWT config directly
time = datetime.now(UTC) + jwt_config.access_token_lifetime
time = datetime.now(timezone.utc) + jwt_config.access_token_lifetime
return self.generate_user_token(user, time=time)

def user_can_authenticate(self, user):
Expand All @@ -121,7 +121,7 @@ def generate_user_token(self, user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -206,7 +206,7 @@ async def test_cannot_access_endpoint_without_header(test_client_factory, async_


async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -219,7 +219,7 @@ async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, a


async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -234,7 +234,7 @@ async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, as


async def test_can_access_endpoint_with_valid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(minutes=20)
time = datetime.now(timezone.utc) + timedelta(minutes=20)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand Down
14 changes: 7 additions & 7 deletions tests/databases/edgy/test_middleware_payload.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import random
import string
from datetime import UTC, datetime, timedelta
from datetime import datetime, timedelta, timezone
from typing import AsyncGenerator
from uuid import uuid4

Expand Down Expand Up @@ -68,7 +68,7 @@ def generate_user_token(user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -106,7 +106,7 @@ async def authenticate(self) -> str:
is_password_valid = await user.check_password(self.password)
if is_password_valid and self.user_can_authenticate(user):
# Using the access_token_lifetime from the JWT config directly
time = datetime.now(UTC) + jwt_config.access_token_lifetime
time = datetime.now(timezone.utc) + jwt_config.access_token_lifetime
return self.generate_user_token(user, time=time)

def user_can_authenticate(self, user):
Expand All @@ -121,7 +121,7 @@ def generate_user_token(self, user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -206,7 +206,7 @@ async def test_cannot_access_endpoint_without_header(test_client_factory, async_


async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -219,7 +219,7 @@ async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, a


async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -234,7 +234,7 @@ async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, as


async def test_can_access_endpoint_with_valid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(minutes=20)
time = datetime.now(timezone.utc) + timedelta(minutes=20)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand Down
14 changes: 7 additions & 7 deletions tests/databases/mongoz/test_middleware_data.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import random
import string
from datetime import UTC, datetime, timedelta
from datetime import datetime, timedelta, timezone
from typing import AsyncGenerator
from uuid import uuid4

Expand Down Expand Up @@ -52,7 +52,7 @@ def generate_user_token(user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -89,7 +89,7 @@ async def authenticate(self) -> str:
is_password_valid = await user.check_password(self.password)
if is_password_valid and self.user_can_authenticate(user):
# Using the access_token_lifetime from the JWT config directly
time = datetime.now(UTC) + jwt_config.access_token_lifetime
time = datetime.now(timezone.utc) + jwt_config.access_token_lifetime
return self.generate_user_token(user, time=time)

def user_can_authenticate(self, user):
Expand All @@ -104,7 +104,7 @@ def generate_user_token(self, user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -189,7 +189,7 @@ async def test_cannot_access_endpoint_without_header(test_client_factory, async_


async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -202,7 +202,7 @@ async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, a


async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -217,7 +217,7 @@ async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, as


async def test_can_access_endpoint_with_valid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(minutes=20)
time = datetime.now(timezone.utc) + timedelta(minutes=20)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand Down
16 changes: 8 additions & 8 deletions tests/databases/mongoz/test_middleware_payload_on_gateway.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import random
import string
from datetime import UTC, datetime, timedelta
from datetime import datetime, timedelta, timezone
from typing import AsyncGenerator
from uuid import uuid4

Expand Down Expand Up @@ -52,7 +52,7 @@ def generate_user_token(user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -89,7 +89,7 @@ async def authenticate(self) -> str:
is_password_valid = await user.check_password(self.password)
if is_password_valid and self.user_can_authenticate(user):
# Using the access_token_lifetime from the JWT config directly
time = datetime.now(UTC) + jwt_config.access_token_lifetime
time = datetime.now(timezone.utc) + jwt_config.access_token_lifetime
return self.generate_user_token(user, time=time)

def user_can_authenticate(self, user):
Expand All @@ -104,7 +104,7 @@ def generate_user_token(self, user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -193,7 +193,7 @@ async def test_cannot_access_endpoint_without_header(test_client_factory, async_


async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -206,7 +206,7 @@ async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, a


async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -223,7 +223,7 @@ async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, as
async def test_cannot_access_endpoint_with_invalid_token_on_gateway(
test_client_factory, async_client
):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand All @@ -233,7 +233,7 @@ async def test_cannot_access_endpoint_with_invalid_token_on_gateway(


async def test_can_access_endpoint_with_valid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(minutes=20)
time = datetime.now(timezone.utc) + timedelta(minutes=20)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand Down
16 changes: 8 additions & 8 deletions tests/databases/mongoz/test_middleware_payload_on_handler.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import random
import string
from datetime import UTC, datetime, timedelta
from datetime import datetime, timedelta, timezone
from typing import AsyncGenerator
from uuid import uuid4

Expand Down Expand Up @@ -52,7 +52,7 @@ def generate_user_token(user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -89,7 +89,7 @@ async def authenticate(self) -> str:
is_password_valid = await user.check_password(self.password)
if is_password_valid and self.user_can_authenticate(user):
# Using the access_token_lifetime from the JWT config directly
time = datetime.now(UTC) + jwt_config.access_token_lifetime
time = datetime.now(timezone.utc) + jwt_config.access_token_lifetime
return self.generate_user_token(user, time=time)

def user_can_authenticate(self, user):
Expand All @@ -104,7 +104,7 @@ def generate_user_token(self, user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -192,7 +192,7 @@ async def test_cannot_access_endpoint_without_header(test_client_factory, async_


async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -205,7 +205,7 @@ async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, a


async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -222,7 +222,7 @@ async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, as
async def test_cannot_access_endpoint_with_invalid_token_on_handler(
test_client_factory, async_client
):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand All @@ -232,7 +232,7 @@ async def test_cannot_access_endpoint_with_invalid_token_on_handler(


async def test_can_access_endpoint_with_valid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(minutes=20)
time = datetime.now(timezone.utc) + timedelta(minutes=20)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand Down
14 changes: 7 additions & 7 deletions tests/databases/saffier/test_middleware_data.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import random
import string
from datetime import UTC, datetime, timedelta
from datetime import datetime, timedelta, timezone
from typing import AsyncGenerator
from uuid import uuid4

Expand Down Expand Up @@ -68,7 +68,7 @@ def generate_user_token(user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -106,7 +106,7 @@ async def authenticate(self) -> str:
is_password_valid = await user.check_password(self.password)
if is_password_valid and self.user_can_authenticate(user):
# Using the access_token_lifetime from the JWT config directly
time = datetime.now(UTC) + jwt_config.access_token_lifetime
time = datetime.now(timezone.utc) + jwt_config.access_token_lifetime
return self.generate_user_token(user, time=time)

def user_can_authenticate(self, user):
Expand All @@ -121,7 +121,7 @@ def generate_user_token(self, user: User, time=None):
Generates a user token
"""
if not time:
later = datetime.now(UTC) + timedelta(minutes=20)
later = datetime.now(timezone.utc) + timedelta(minutes=20)
else:
later = time

Expand Down Expand Up @@ -206,7 +206,7 @@ async def test_cannot_access_endpoint_without_header(test_client_factory, async_


async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -219,7 +219,7 @@ async def test_cannot_access_endpoint_with_invalid_header(test_client_factory, a


async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(seconds=1)
time = datetime.now(timezone.utc) + timedelta(seconds=1)
token = await get_user_and_token(time=time)

with create_client(
Expand All @@ -234,7 +234,7 @@ async def test_cannot_access_endpoint_with_invalid_token(test_client_factory, as


async def test_can_access_endpoint_with_valid_token(test_client_factory, async_client):
time = datetime.now(UTC) + timedelta(minutes=20)
time = datetime.now(timezone.utc) + timedelta(minutes=20)
token = await get_user_and_token(time=time)

response = await async_client.get(
Expand Down
Loading

0 comments on commit 238684d

Please sign in to comment.