|
26 | 26 | from firebase_admin import tenant_mgt
|
27 | 27 | from firebase_admin import _auth_providers
|
28 | 28 | from firebase_admin import _user_mgt
|
29 |
| -from firebase_admin.multi_factor_config_mgt import MultiFactorConfig |
30 |
| -from firebase_admin.multi_factor_config_mgt import MultiFactorServerConfig |
31 |
| -from firebase_admin.multi_factor_config_mgt import ProviderConfig |
32 |
| -from firebase_admin.multi_factor_config_mgt import TOTPProviderConfig |
| 29 | +from firebase_admin import multi_factor_config_mgt |
33 | 30 | from tests import testutils
|
34 | 31 | from tests import test_token_gen
|
35 | 32 |
|
@@ -258,11 +255,11 @@ def test_invalid_multi_factor_configs(self, multi_factor_config, tenant_mgt_app)
|
258 | 255 |
|
259 | 256 | def test_create_tenant(self, tenant_mgt_app):
|
260 | 257 | _, recorder = _instrument_tenant_mgt(tenant_mgt_app, 200, GET_TENANT_RESPONSE)
|
261 |
| - mfa_object = MultiFactorConfig( |
| 258 | + mfa_object = multi_factor_config_mgt.MultiFactorConfig( |
262 | 259 | provider_configs=[
|
263 |
| - ProviderConfig( |
264 |
| - state=ProviderConfig.State.ENABLED, |
265 |
| - totp_provider_config=TOTPProviderConfig( |
| 260 | + multi_factor_config_mgt.ProviderConfig( |
| 261 | + state=multi_factor_config_mgt.ProviderConfig.State.ENABLED, |
| 262 | + totp_provider_config=multi_factor_config_mgt.TOTPProviderConfig( |
266 | 263 | adjacent_intervals=5
|
267 | 264 | )
|
268 | 265 | )
|
@@ -377,11 +374,11 @@ def test_update_tenant_no_args(self, tenant_mgt_app):
|
377 | 374 |
|
378 | 375 | def test_update_tenant(self, tenant_mgt_app):
|
379 | 376 | _, recorder = _instrument_tenant_mgt(tenant_mgt_app, 200, GET_TENANT_RESPONSE)
|
380 |
| - mfa_object = MultiFactorConfig( |
| 377 | + mfa_object = multi_factor_config_mgt.MultiFactorConfig( |
381 | 378 | provider_configs=[
|
382 |
| - ProviderConfig( |
383 |
| - state=ProviderConfig.State.ENABLED, |
384 |
| - totp_provider_config=TOTPProviderConfig( |
| 379 | + multi_factor_config_mgt.ProviderConfig( |
| 380 | + state=multi_factor_config_mgt.ProviderConfig.State.ENABLED, |
| 381 | + totp_provider_config=multi_factor_config_mgt.TOTPProviderConfig( |
385 | 382 | adjacent_intervals=5
|
386 | 383 | )
|
387 | 384 | )
|
@@ -1066,14 +1063,15 @@ def test_custom_token_with_claims(self, tenant_aware_custom_token_app):
|
1066 | 1063 | custom_token, expected_claims=claims, tenant_id='test-tenant')
|
1067 | 1064 |
|
1068 | 1065 | def _assert_multi_factor_config(mfa_config):
|
1069 |
| - assert isinstance(mfa_config, MultiFactorServerConfig) |
| 1066 | + assert isinstance(mfa_config, multi_factor_config_mgt.MultiFactorServerConfig) |
1070 | 1067 | assert len(mfa_config.provider_configs) == 1
|
1071 | 1068 | assert isinstance(mfa_config.provider_configs, list)
|
1072 | 1069 | for provider_config in mfa_config.provider_configs:
|
1073 |
| - assert isinstance(provider_config, MultiFactorServerConfig.ProviderConfigServerConfig) |
| 1070 | + assert isinstance(provider_config, multi_factor_config_mgt.MultiFactorServerConfig.\ |
| 1071 | + ProviderConfigServerConfig) |
1074 | 1072 | assert provider_config.state == 'ENABLED'
|
1075 | 1073 | assert isinstance(provider_config.totp_provider_config,
|
1076 |
| - MultiFactorServerConfig.ProviderConfigServerConfig |
| 1074 | + multi_factor_config_mgt.MultiFactorServerConfig.ProviderConfigServerConfig |
1077 | 1075 | .TOTPProviderServerConfig)
|
1078 | 1076 | assert provider_config.totp_provider_config.adjacent_intervals == 5
|
1079 | 1077 |
|
|
0 commit comments