# -*- coding: utf-8 -*- # # Copyright (C) 2021 Chris Caron # All rights reserved. # # This code is licensed under the MIT License. # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files(the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribute, sublicense, and / or sell # copies of the Software, and to permit persons to whom the Software is # furnished to do so, subject to the following conditions : # # The above copyright notice and this permission notice shall be included in # all copies or substantial portions of the Software. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # # Great Resources: # - Dev/Legacy API: # https://firebase.google.com/docs/cloud-messaging/http-server-ref # - Legacy API (v1) -> OAuth # - https://firebase.google.com/docs/cloud-messaging/migrate-v1 import io import os import six import sys import mock import pytest import requests import json from apprise import Apprise from apprise import plugins from helpers import AppriseURLTester try: from apprise.plugins.NotifyFCM.oauth import GoogleOAuth from apprise.plugins.NotifyFCM.common import FCM_MODES from apprise.plugins.NotifyFCM.priority import ( FCMPriorityManager, FCM_PRIORITIES) from apprise.plugins.NotifyFCM.color import FCMColorManager from cryptography.exceptions import UnsupportedAlgorithm except ImportError: # No problem; there is no cryptography support pass try: from json.decoder import JSONDecodeError except ImportError: # Python v2.7 Backwards Compatibility support JSONDecodeError = ValueError # Disable logging for a cleaner testing output import logging logging.disable(logging.CRITICAL) # Test files for KeyFile Directory PRIVATE_KEYFILE_DIR = os.path.join(os.path.dirname(__file__), 'var', 'fcm') # Our Testing URLs apprise_url_tests = ( ('fcm://', { # We failed to identify any valid authentication 'instance': TypeError, }), ('fcm://:@/', { # We failed to identify any valid authentication 'instance': TypeError, }), ('fcm://project@%20%20/', { # invalid apikey 'instance': TypeError, }), ('fcm://apikey/', { # no project id specified so we operate in legacy mode 'instance': plugins.NotifyFCM, # but there are no targets specified so we return False 'notify_response': False, }), ('fcm://apikey/device', { # Valid device 'instance': plugins.NotifyFCM, 'privacy_url': 'fcm://a...y/device', }), ('fcm://apikey/#topic', { # Valid topic 'instance': plugins.NotifyFCM, 'privacy_url': 'fcm://a...y/%23topic', }), ('fcm://apikey/device?mode=invalid', { # Valid device, invalid mode 'instance': TypeError, }), ('fcm://apikey/#topic1/device/%20/', { # Valid topic, valid device, and invalid entry 'instance': plugins.NotifyFCM, }), ('fcm://apikey?to=#topic1,device', { # Test to= 'instance': plugins.NotifyFCM, }), ('fcm://?apikey=abc123&to=device', { # Test apikey= to= 'instance': plugins.NotifyFCM, }), ('fcm://?apikey=abc123&to=device&image=yes', { # Test image boolean 'instance': plugins.NotifyFCM, }), ('fcm://?apikey=abc123&to=device&color=no', { # Disable colors 'instance': plugins.NotifyFCM, }), ('fcm://?apikey=abc123&to=device&color=aabbcc', { # custom colors 'instance': plugins.NotifyFCM, }), ('fcm://?apikey=abc123&to=device' '&image_url=http://example.com/interesting.jpg', { # Test image_url 'instance': plugins.NotifyFCM}), ('fcm://?apikey=abc123&to=device' '&image_url=http://example.com/interesting.jpg&image=no', { # Test image_url but set to no 'instance': plugins.NotifyFCM}), ('fcm://?apikey=abc123&to=device&+key=value&+key2=value2', { # Test apikey= to= and data arguments 'instance': plugins.NotifyFCM, }), ('fcm://%20?to=device&keyfile=/invalid/path', { # invalid Project ID 'instance': TypeError, }), ('fcm://project_id?to=device&keyfile=/invalid/path', { # Test to= and auto detection of oauth mode 'instance': plugins.NotifyFCM, # we'll fail to send our notification as a result 'response': False, }), ('fcm://?to=device&project=project_id&keyfile=/invalid/path', { # Test project= & to= and auto detection of oauth mode 'instance': plugins.NotifyFCM, # we'll fail to send our notification as a result 'response': False, }), ('fcm://project_id?to=device&mode=oauth2', { # no keyfile was specified 'instance': TypeError, }), ('fcm://project_id?to=device&mode=oauth2&keyfile=/invalid/path', { # Same test as above except we explicitly set our oauth2 mode # Test to= and auto detection of oauth mode 'instance': plugins.NotifyFCM, # we'll fail to send our notification as a result 'response': False, }), ('fcm://apikey/#topic1/device/?mode=legacy', { 'instance': plugins.NotifyFCM, # throw a bizzare code forcing us to fail to look it up 'response': False, 'requests_response_code': 999, }), ('fcm://apikey/#topic1/device/?mode=legacy', { 'instance': plugins.NotifyFCM, # Throws a series of connection and transfer exceptions when this flag # is set and tests that we gracfully handle them 'test_requests_exceptions': True, }), ('fcm://project/#topic1/device/?mode=oauth2&keyfile=file://{}'.format( os.path.join( os.path.dirname(__file__), 'var', 'fcm', 'service_account.json')), { 'instance': plugins.NotifyFCM, # throw a bizzare code forcing us to fail to look it up 'response': False, 'requests_response_code': 999, }), ('fcm://projectid/#topic1/device/?mode=oauth2&keyfile=file://{}'.format( os.path.join( os.path.dirname(__file__), 'var', 'fcm', 'service_account.json')), { 'instance': plugins.NotifyFCM, # Throws a series of connection and transfer exceptions when # this flag is set and tests that we gracfully handle them 'test_requests_exceptions': True, }), ) @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") def test_plugin_fcm_urls(): """ NotifyFCM() Apprise URLs """ # Run our general tests AppriseURLTester(tests=apprise_url_tests).run_all() @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") @mock.patch('requests.post') def test_plugin_fcm_general_legacy(mock_post): """ NotifyFCM() General Legacy/APIKey Checks """ # Disable Throttling to speed testing plugins.NotifyBase.request_rate_per_sec = 0 # Prepare a good response response = mock.Mock() response.status_code = requests.codes.ok mock_post.return_value = response # A valid Legacy URL obj = Apprise.instantiate( 'fcm://abc123/device/' '?+key=value&+key2=value2' '&image_url=https://example.com/interesting.png') # Send our notification assert obj.notify("test") is True # Test our call count assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://fcm.googleapis.com/fcm/send' payload = mock_post.mock_calls[0][2] data = json.loads(payload['data']) assert 'data' in data assert isinstance(data, dict) assert 'key' in data['data'] assert data['data']['key'] == 'value' assert 'key2' in data['data'] assert data['data']['key2'] == 'value2' assert 'notification' in data assert isinstance(data['notification'], dict) assert 'notification' in data['notification'] assert isinstance(data['notification']['notification'], dict) assert 'image' in data['notification']['notification'] assert data['notification']['notification']['image'] == \ 'https://example.com/interesting.png' # # Test priorities # mock_post.reset_mock() obj = Apprise.instantiate( 'fcm://abc123/device/?priority=low') assert mock_post.call_count == 0 # Send our notification assert obj.notify(title="title", body="body") is True # Test our call count assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://fcm.googleapis.com/fcm/send' payload = mock_post.mock_calls[0][2] data = json.loads(payload['data']) assert 'data' not in data assert 'notification' in data assert isinstance(data['notification'], dict) assert 'notification' in data['notification'] assert isinstance(data['notification']['notification'], dict) assert 'image' not in data['notification']['notification'] assert 'priority' in data # legacy can only switch between high/low assert data['priority'] == "normal" # # Test colors # mock_post.reset_mock() obj = Apprise.instantiate( 'fcm://abc123/device/?color=no') assert mock_post.call_count == 0 # Send our notification assert obj.notify(title="title", body="body") is True # Test our call count assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://fcm.googleapis.com/fcm/send' payload = mock_post.mock_calls[0][2] data = json.loads(payload['data']) assert 'data' not in data assert 'notification' in data assert isinstance(data['notification'], dict) assert 'notification' in data['notification'] assert isinstance(data['notification']['notification'], dict) assert 'image' not in data['notification']['notification'] assert 'color' not in data['notification']['notification'] mock_post.reset_mock() obj = Apprise.instantiate( 'fcm://abc123/device/?color=AA001b') assert mock_post.call_count == 0 # Send our notification assert obj.notify(title="title", body="body") is True # Test our call count assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://fcm.googleapis.com/fcm/send' payload = mock_post.mock_calls[0][2] data = json.loads(payload['data']) assert 'data' not in data assert 'notification' in data assert isinstance(data['notification'], dict) assert 'notification' in data['notification'] assert isinstance(data['notification']['notification'], dict) assert 'image' not in data['notification']['notification'] assert 'color' in data['notification']['notification'] assert data['notification']['notification']['color'] == '#aa001b' @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") @mock.patch('requests.post') def test_plugin_fcm_general_oauth(mock_post): """ NotifyFCM() General OAuth Checks """ # Valid Keyfile path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json') # Disable Throttling to speed testing plugins.NotifyBase.request_rate_per_sec = 0 # Prepare a good response response = mock.Mock() response.content = json.dumps({ "access_token": "ya29.c.abcd", "expires_in": 3599, "token_type": "Bearer", }) response.status_code = requests.codes.ok mock_post.return_value = response # Test having a valid keyfile, but not a valid project id match obj = Apprise.instantiate( 'fcm://invalid_project_id/device/?keyfile={}'.format(str(path))) # we'll fail as a result assert obj.notify("test") is False # Test our call count assert mock_post.call_count == 0 # Now we test using a valid Project ID but we can't open our file obj = Apprise.instantiate( 'fcm://mock-project-id/device/?keyfile={}'.format(str(path))) with mock.patch('io.open', side_effect=OSError): # we'll fail as a result assert obj.notify("test") is False # Test our call count assert mock_post.call_count == 0 # Now we test using a valid Project ID obj = Apprise.instantiate( 'fcm://mock-project-id/device/#topic/?keyfile={}'.format(str(path))) # send our notification assert obj.notify("test") is True # Test our call count assert mock_post.call_count == 3 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' assert mock_post.call_args_list[1][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' assert mock_post.call_args_list[2][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' mock_post.reset_mock() # Now we test using a valid Project ID and data parameters obj = Apprise.instantiate( 'fcm://mock-project-id/device/#topic/?keyfile={}' '&+key=value&+key2=value2' '&image_url=https://example.com/interesting.png'.format(str(path))) assert mock_post.call_count == 0 # send our notification assert obj.notify("test") is True # Test our call count assert mock_post.call_count == 3 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' assert mock_post.call_args_list[1][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' payload = mock_post.mock_calls[1][2] data = json.loads(payload['data']) assert 'message' in data assert isinstance(data['message'], dict) assert 'data' in data['message'] assert isinstance(data['message']['data'], dict) assert 'key' in data['message']['data'] assert data['message']['data']['key'] == 'value' assert 'key2' in data['message']['data'] assert data['message']['data']['key2'] == 'value2' assert 'notification' in data['message'] assert isinstance(data['message']['notification'], dict) assert 'image' in data['message']['notification'] assert data['message']['notification']['image'] == \ 'https://example.com/interesting.png' assert mock_post.call_args_list[2][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' payload = mock_post.mock_calls[2][2] data = json.loads(payload['data']) assert 'message' in data assert isinstance(data['message'], dict) assert 'data' in data['message'] assert isinstance(data['message']['data'], dict) assert 'key' in data['message']['data'] assert data['message']['data']['key'] == 'value' assert 'key2' in data['message']['data'] assert data['message']['data']['key2'] == 'value2' assert 'notification' in data['message'] assert isinstance(data['message']['notification'], dict) assert 'image' in data['message']['notification'] assert data['message']['notification']['image'] == \ 'https://example.com/interesting.png' # # Test priorities # mock_post.reset_mock() obj = Apprise.instantiate( 'fcm://mock-project-id/device/?keyfile={}' '&priority=high'.format(str(path))) assert mock_post.call_count == 0 # Send our notification assert obj.notify(title="title", body="body") is True # Test our call count assert mock_post.call_count == 2 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' assert mock_post.call_args_list[1][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' payload = mock_post.mock_calls[1][2] data = json.loads(payload['data']) assert 'message' in data assert isinstance(data['message'], dict) assert 'data' not in data['message'] assert 'notification' in data['message'] assert isinstance(data['message']['notification'], dict) assert 'image' not in data['message']['notification'] assert data['message']['apns']['headers']['apns-priority'] == "10" assert data['message']['webpush']['headers']['Urgency'] == "high" assert data['message']['android']['priority'] == "HIGH" # # Test colors # mock_post.reset_mock() obj = Apprise.instantiate( 'fcm://mock-project-id/device/?keyfile={}' '&color=no'.format(str(path))) assert mock_post.call_count == 0 # Send our notification assert obj.notify(title="title", body="body") is True # Test our call count assert mock_post.call_count == 2 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' assert mock_post.call_args_list[1][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' payload = mock_post.mock_calls[1][2] data = json.loads(payload['data']) assert 'message' in data assert isinstance(data['message'], dict) assert 'data' not in data['message'] assert 'notification' in data['message'] assert isinstance(data['message']['notification'], dict) assert 'color' not in data['message']['notification'] mock_post.reset_mock() obj = Apprise.instantiate( 'fcm://mock-project-id/device/?keyfile={}' '&color=#12AAbb'.format(str(path))) assert mock_post.call_count == 0 # Send our notification assert obj.notify(title="title", body="body") is True # Test our call count assert mock_post.call_count == 2 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' assert mock_post.call_args_list[1][0][0] == \ 'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send' payload = mock_post.mock_calls[1][2] data = json.loads(payload['data']) assert 'message' in data assert isinstance(data['message'], dict) assert 'data' not in data['message'] assert 'notification' in data['message'] assert isinstance(data['message']['notification'], dict) assert 'color' in data['message']['android']['notification'] assert data['message']['android']['notification']['color'] == '#12aabb' @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") @mock.patch('requests.post') def test_plugin_fcm_keyfile_parse(mock_post): """ NotifyFCM() KeyFile Tests """ # Prepare a good response response = mock.Mock() response.content = json.dumps({ "access_token": "ya29.c.abcd", "expires_in": 3599, "token_type": "Bearer", }) response.status_code = requests.codes.ok mock_post.return_value = response path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json') oauth = GoogleOAuth() # We can not get an Access Token without content loaded assert oauth.access_token is None # Load our content assert oauth.load(path) is True assert oauth.access_token is not None # Test our call count assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' mock_post.reset_mock() # a second call uses cache since our token hasn't expired yet assert oauth.access_token is not None assert mock_post.call_count == 0 # Same test case without expires_in entry mock_post.reset_mock() response.content = json.dumps({ "access_token": "ya29.c.abcd", "token_type": "Bearer", }) oauth = GoogleOAuth() assert oauth.load(path) is True assert oauth.access_token is not None # Test our call count assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' # Test user-agent override mock_post.reset_mock() oauth = GoogleOAuth(user_agent="test-agent-override") assert oauth.load(path) is True assert oauth.access_token is not None assert mock_post.call_count == 1 assert mock_post.call_args_list[0][0][0] == \ 'https://accounts.google.com/o/oauth2/token' # # Test some errors that can get thrown when trying to handle # the service_account.json file # # Reset our object mock_post.reset_mock() # Now we test a case where we can't access the file we've been pointed to: oauth = GoogleOAuth() with mock.patch('io.open', side_effect=OSError): # We will fail to retrieve our Access Token assert oauth.load(path) is False assert oauth.access_token is None oauth = GoogleOAuth() with mock.patch('json.loads', side_effect=([], )): # We will fail to retrieve our Access Token since we did not parse # a dictionary assert oauth.load(path) is False assert oauth.access_token is None # Case where we can't load the PEM key: oauth = GoogleOAuth() with mock.patch( 'cryptography.hazmat.primitives.serialization' '.load_pem_private_key', side_effect=ValueError("")): assert oauth.load(path) is False assert oauth.access_token is None # Case where we can't load the PEM key: oauth = GoogleOAuth() with mock.patch( 'cryptography.hazmat.primitives.serialization' '.load_pem_private_key', side_effect=TypeError("")): assert oauth.load(path) is False assert oauth.access_token is None # Case where we can't load the PEM key: oauth = GoogleOAuth() with mock.patch( 'cryptography.hazmat.primitives.serialization' '.load_pem_private_key', side_effect=UnsupportedAlgorithm("")): # Note: This test should be te assert oauth.load(path) is False assert oauth.access_token is None # Not one call was made to the web assert mock_post.call_count == 0 # # Test some web errors that can occur when speaking upstream # with Google to get our token generated # response.status_code = requests.codes.internal_server_error mock_post.reset_mock() oauth = GoogleOAuth() assert oauth.load(path) is True # We'll fail due to an bad web response assert oauth.access_token is None # Return our status code to how it was response.status_code = requests.codes.ok # No access token bad_response_1 = mock.Mock() bad_response_1.content = json.dumps({ "expires_in": 3599, "token_type": "Bearer", }) # Invalid JSON bad_response_2 = mock.Mock() bad_response_2.content = '{' mock_post.return_value = None # Throw an exception on the first call to requests.post() for side_effect in ( requests.RequestException(), bad_response_1, bad_response_2): mock_post.side_effect = side_effect # Test all of our bad side effects oauth = GoogleOAuth() assert oauth.load(path) is True # We'll fail due to an bad web response assert oauth.access_token is None @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") def test_plugin_fcm_bad_keyfile_parse(): """ NotifyFCM() KeyFile Bad Service Account Type Tests """ path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account-bad-type.json') oauth = GoogleOAuth() assert oauth.load(path) is False @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") def test_plugin_fcm_keyfile_missing_entries_parse(tmpdir): """ NotifyFCM() KeyFile Missing Entries Test """ # Prepare a base keyfile reference to use path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json') with io.open(path, mode="r", encoding='utf-8') as fp: content = json.loads(fp.read()) path = tmpdir.join('fcm_keyfile.json') # Test that we fail to load if the following keys are missing: for entry in ( 'client_email', 'private_key_id', 'private_key', 'type', 'project_id'): # Ensure the key actually exists in our file assert entry in content # Create a copy of our content content_copy = content.copy() # Remove our entry we expect to validate against del content_copy[entry] assert entry not in content_copy path.write(json.dumps(content_copy)) oauth = GoogleOAuth() assert oauth.load(str(path)) is False # Now write ourselves a bad JSON file path.write('{') oauth = GoogleOAuth() assert oauth.load(str(path)) is False @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") def test_plugin_fcm_priorities(): """ NotifyFCM() FCMPriorityManager() Testing """ for mode in FCM_MODES: for priority in FCM_PRIORITIES: instance = FCMPriorityManager(mode, priority) assert isinstance(instance.payload(), dict) # Verify it's not empty assert bool(instance) assert instance.payload() assert str(instance) == priority # We do not have to set a priority instance = FCMPriorityManager(mode) assert isinstance(instance.payload(), dict) # Dictionary is empty though assert not bool(instance) assert not instance.payload() assert str(instance) == '' with pytest.raises(TypeError): instance = FCMPriorityManager(mode, 'invalid') with pytest.raises(TypeError): instance = FCMPriorityManager('invald', 'high') # mode validation is done at the higher NotifyFCM() level so # it is not tested here (not required) @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") def test_plugin_fcm_colors(): """ NotifyFCM() FCMColorManager() Testing """ # No colors instance = FCMColorManager('no') assert bool(instance) is False assert instance.get() is None # We'll return that we are not defined assert str(instance) == 'no' # Asset colors instance = FCMColorManager('yes') assert isinstance(instance.get(), six.string_types) # Output: #rrggbb assert len(instance.get()) == 7 # Starts with has symbol assert instance.get()[0] == '#' # We'll return that we are defined but using default configuration assert str(instance) == 'yes' # We will be `true` because we can acquire a color based on what was # passed in assert bool(instance) is True # Custom color instance = FCMColorManager('#A2B3A4') assert isinstance(instance.get(), six.string_types) assert instance.get() == '#a2b3a4' assert bool(instance) is True # str() response does not include hashtag assert str(instance) == 'a2b3a4' # Custom color (no hashtag) instance = FCMColorManager('A2B3A4') assert isinstance(instance.get(), six.string_types) # Hashtag is always part of output assert instance.get() == '#a2b3a4' assert bool(instance) is True # str() response does not include hashtag assert str(instance) == 'a2b3a4' # Custom color (no hashtag) but only using 3 letter rgb values instance = FCMColorManager('AC4') assert isinstance(instance.get(), six.string_types) # Hashtag is always part of output assert instance.get() == '#aacc44' assert bool(instance) is True # str() response does not include hashtag assert str(instance) == 'aacc44' @pytest.mark.skipif( 'cryptography' in sys.modules, reason="Requires that cryptography NOT be installed") def test_plugin_fcm_cryptography_import_error(): """ NotifyFCM Cryptography loading failure """ # Prepare a base keyfile reference to use path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json') # Attempt to instantiate our object obj = Apprise.instantiate( 'fcm://mock-project-id/device/#topic/?keyfile={}'.format(str(path))) # It's not possible because our cryptography depedancy is missing assert obj is None @pytest.mark.skipif( 'cryptography' not in sys.modules, reason="Requires cryptography") @mock.patch('requests.post') def test_plugin_fcm_edge_cases(mock_post): """ NotifyFCM() Edge Cases """ # Disable Throttling to speed testing plugins.NotifyBase.request_rate_per_sec = 0 # Prepare a good response response = mock.Mock() response.status_code = requests.codes.ok mock_post.return_value = response # this tests an edge case where verify if the data_kwargs is a dictionary # or not. Below, we don't even define it, so it will be None (causing # the check to go). We'll still correctly instantiate a plugin: obj = plugins.NotifyFCM("project", "api:123", targets='device') assert obj is not None