@@ -181,11 +181,18 @@ def test_bad_access_key_services(
181
181
vuforia_database : VuforiaDatabase ,
182
182
) -> None :
183
183
"""
184
- If the server access key given does not match any database, a
185
- ``Fail`` response is returned.
184
+ If the server access key given does not match any database, a ``Fail``
185
+ response is returned.
186
186
"""
187
- keys = vuforia_database
188
- keys .server_access_key = 'example'
187
+ keys = VuforiaDatabase (
188
+ database_name = vuforia_database .database_name ,
189
+ server_access_key = 'example' ,
190
+ server_secret_key = vuforia_database .server_secret_key ,
191
+ client_access_key = vuforia_database .client_access_key ,
192
+ client_secret_key = vuforia_database .client_secret_key ,
193
+ targets = vuforia_database .targets ,
194
+ state = vuforia_database .state ,
195
+ )
189
196
response = get_vws_target (
190
197
target_id = uuid .uuid4 ().hex ,
191
198
vuforia_database = keys ,
@@ -206,12 +213,20 @@ def test_bad_access_key_query(
206
213
If the client access key given is incorrect, an
207
214
``UNAUTHORIZED`` response is returned.
208
215
"""
209
- vuforia_database .client_access_key = 'example'
216
+ keys = VuforiaDatabase (
217
+ database_name = vuforia_database .database_name ,
218
+ server_access_key = vuforia_database .server_access_key ,
219
+ server_secret_key = vuforia_database .server_secret_key ,
220
+ client_access_key = 'example' ,
221
+ client_secret_key = vuforia_database .client_secret_key ,
222
+ targets = vuforia_database .targets ,
223
+ state = vuforia_database .state ,
224
+ )
210
225
image_content = high_quality_image .getvalue ()
211
226
body = {'image' : ('image.jpeg' , image_content , 'image/jpeg' )}
212
227
213
228
response = query (
214
- vuforia_database = vuforia_database ,
229
+ vuforia_database = keys ,
215
230
body = body ,
216
231
)
217
232
@@ -244,8 +259,15 @@ def test_bad_secret_key_services(
244
259
If the server secret key given is incorrect, an
245
260
``AuthenticationFailure`` response is returned.
246
261
"""
247
- keys = vuforia_database
248
- keys .server_secret_key = 'example'
262
+ keys = VuforiaDatabase (
263
+ database_name = vuforia_database .database_name ,
264
+ server_access_key = vuforia_database .server_access_key ,
265
+ server_secret_key = 'example' ,
266
+ client_access_key = vuforia_database .client_access_key ,
267
+ client_secret_key = vuforia_database .client_secret_key ,
268
+ targets = vuforia_database .targets ,
269
+ state = vuforia_database .state ,
270
+ )
249
271
response = get_vws_target (
250
272
target_id = uuid .uuid4 ().hex ,
251
273
vuforia_database = keys ,
@@ -266,12 +288,20 @@ def test_bad_secret_key_query(
266
288
If the client secret key given is incorrect, an
267
289
``UNAUTHORIZED`` response is returned.
268
290
"""
269
- vuforia_database .client_secret_key = 'example'
291
+ keys = VuforiaDatabase (
292
+ database_name = vuforia_database .database_name ,
293
+ server_access_key = vuforia_database .server_access_key ,
294
+ server_secret_key = vuforia_database .server_secret_key ,
295
+ client_access_key = vuforia_database .client_access_key ,
296
+ client_secret_key = 'example' ,
297
+ targets = vuforia_database .targets ,
298
+ state = vuforia_database .state ,
299
+ )
270
300
image_content = high_quality_image .getvalue ()
271
301
body = {'image' : ('image.jpeg' , image_content , 'image/jpeg' )}
272
302
273
303
response = query (
274
- vuforia_database = vuforia_database ,
304
+ vuforia_database = keys ,
275
305
body = body ,
276
306
)
277
307
0 commit comments