|
26 | 26 | from firebase_admin import tenant_mgt |
27 | 27 | from firebase_admin import _auth_providers |
28 | 28 | from firebase_admin import _user_mgt |
29 | | -from firebase_admin.multi_factor_config_mgt import MultiFactorConfig |
30 | | -from firebase_admin.multi_factor_config_mgt import MultiFactorServerConfig |
31 | | -from firebase_admin.multi_factor_config_mgt import ProviderConfig |
32 | | -from firebase_admin.multi_factor_config_mgt import TOTPProviderConfig |
| 29 | +from firebase_admin import multi_factor_config_mgt |
33 | 30 | from tests import testutils |
34 | 31 | from tests import test_token_gen |
35 | 32 |
|
@@ -258,11 +255,11 @@ def test_invalid_multi_factor_configs(self, multi_factor_config, tenant_mgt_app) |
258 | 255 |
|
259 | 256 | def test_create_tenant(self, tenant_mgt_app): |
260 | 257 | _, recorder = _instrument_tenant_mgt(tenant_mgt_app, 200, GET_TENANT_RESPONSE) |
261 | | - mfa_object = MultiFactorConfig( |
| 258 | + mfa_object = multi_factor_config_mgt.MultiFactorConfig( |
262 | 259 | provider_configs=[ |
263 | | - ProviderConfig( |
264 | | - state=ProviderConfig.State.ENABLED, |
265 | | - totp_provider_config=TOTPProviderConfig( |
| 260 | + multi_factor_config_mgt.ProviderConfig( |
| 261 | + state=multi_factor_config_mgt.ProviderConfig.State.ENABLED, |
| 262 | + totp_provider_config=multi_factor_config_mgt.TOTPProviderConfig( |
266 | 263 | adjacent_intervals=5 |
267 | 264 | ) |
268 | 265 | ) |
@@ -377,11 +374,11 @@ def test_update_tenant_no_args(self, tenant_mgt_app): |
377 | 374 |
|
378 | 375 | def test_update_tenant(self, tenant_mgt_app): |
379 | 376 | _, recorder = _instrument_tenant_mgt(tenant_mgt_app, 200, GET_TENANT_RESPONSE) |
380 | | - mfa_object = MultiFactorConfig( |
| 377 | + mfa_object = multi_factor_config_mgt.MultiFactorConfig( |
381 | 378 | provider_configs=[ |
382 | | - ProviderConfig( |
383 | | - state=ProviderConfig.State.ENABLED, |
384 | | - totp_provider_config=TOTPProviderConfig( |
| 379 | + multi_factor_config_mgt.ProviderConfig( |
| 380 | + state=multi_factor_config_mgt.ProviderConfig.State.ENABLED, |
| 381 | + totp_provider_config=multi_factor_config_mgt.TOTPProviderConfig( |
385 | 382 | adjacent_intervals=5 |
386 | 383 | ) |
387 | 384 | ) |
@@ -1066,14 +1063,15 @@ def test_custom_token_with_claims(self, tenant_aware_custom_token_app): |
1066 | 1063 | custom_token, expected_claims=claims, tenant_id='test-tenant') |
1067 | 1064 |
|
1068 | 1065 | def _assert_multi_factor_config(mfa_config): |
1069 | | - assert isinstance(mfa_config, MultiFactorServerConfig) |
| 1066 | + assert isinstance(mfa_config, multi_factor_config_mgt.MultiFactorServerConfig) |
1070 | 1067 | assert len(mfa_config.provider_configs) == 1 |
1071 | 1068 | assert isinstance(mfa_config.provider_configs, list) |
1072 | 1069 | for provider_config in mfa_config.provider_configs: |
1073 | | - assert isinstance(provider_config, MultiFactorServerConfig.ProviderConfigServerConfig) |
| 1070 | + assert isinstance(provider_config, multi_factor_config_mgt.MultiFactorServerConfig.\ |
| 1071 | + ProviderConfigServerConfig) |
1074 | 1072 | assert provider_config.state == 'ENABLED' |
1075 | 1073 | assert isinstance(provider_config.totp_provider_config, |
1076 | | - MultiFactorServerConfig.ProviderConfigServerConfig |
| 1074 | + multi_factor_config_mgt.MultiFactorServerConfig.ProviderConfigServerConfig |
1077 | 1075 | .TOTPProviderServerConfig) |
1078 | 1076 | assert provider_config.totp_provider_config.adjacent_intervals == 5 |
1079 | 1077 |
|
|
0 commit comments