@@ -92,6 +92,12 @@ def test_aliquot_modify(self):
9292 "https://fake.transcriptic.com/api/aliquots/23534245/modify_properties" ,
9393 json = {"id" : aliquot_id , "data" : {"delete" : [], "set" : props }},
9494 )
95+ self .assertTrue (
96+ session .headers .get ("X-Organization-Id" ) == connection .organization_id
97+ )
98+ self .assertTrue (
99+ session .headers .get ("X-Organization-Id" ) == connection .env_args ["org_id" ]
100+ )
95101
96102 def test_signing (self ):
97103 # Set up a connection with a key from a file
@@ -129,6 +135,12 @@ def test_signing(self):
129135 },
130136 )
131137 prepared_get = connection .session .prepare_request (get_request )
138+ self .assertTrue (
139+ prepared_get .headers ["X-Organization-Id" ] == connection .organization_id
140+ )
141+ self .assertTrue (
142+ prepared_get .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
143+ )
132144
133145 get_sig = prepared_get .headers ["authorization" ]
134146 self .assertEqual (
@@ -209,6 +221,13 @@ def test_signing_auth_header_not_set_when_calling_non_api_root_endpoint(self):
209221 )
210222 prepared_get = connection .session .prepare_request (get_request )
211223 self .assertFalse ("authorization" in prepared_get .headers )
224+ self .assertTrue (
225+ prepared_get .headers ["X-Organization-Id" ] == connection .organization_id
226+ )
227+ self .assertTrue (
228+ prepared_get .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
229+ )
230+ self .assertTrue (prepared_get .headers ["X-User-Email" ] == connection .email )
212231
213232 def test_signing_request_body_already_encoded (self ):
214233 # Set up a connection with a key from a file
@@ -249,6 +268,13 @@ def test_signing_request_body_already_encoded(self):
249268 )
250269 prepared_post = connection .session .prepare_request (post_request )
251270 self .assertTrue ("authorization" in prepared_post .headers )
271+ self .assertTrue (
272+ prepared_post .headers ["X-Organization-Id" ] == connection .organization_id
273+ )
274+ self .assertTrue (
275+ prepared_post .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
276+ )
277+ self .assertTrue (prepared_post .headers ["X-User-Email" ] == connection .email )
252278 self .assertTrue (isinstance (prepared_post .body , bytes ))
253279
254280 # Verify that when `data` is set in the request, the authorization header is generated without error
@@ -263,6 +289,13 @@ def test_signing_request_body_already_encoded(self):
263289 )
264290 prepared_post = connection .session .prepare_request (post_request )
265291 self .assertTrue ("authorization" in prepared_post .headers )
292+ self .assertTrue (
293+ prepared_post .headers ["X-Organization-Id" ] == connection .organization_id
294+ )
295+ self .assertTrue (
296+ prepared_post .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
297+ )
298+ self .assertTrue (prepared_post .headers ["X-User-Email" ] == connection .email )
266299 self .assertFalse (isinstance (prepared_post .body , bytes ))
267300
268301 def test_bearer_token (self ):
@@ -296,6 +329,13 @@ def test_bearer_token(self):
296329
297330 authorization_header_value = prepared_get .headers ["authorization" ]
298331 self .assertEqual (bearer_token , authorization_header_value )
332+ self .assertTrue (
333+ prepared_get .headers ["X-Organization-Id" ] == connection .organization_id
334+ )
335+ self .assertTrue (
336+ prepared_get .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
337+ )
338+ self .assertTrue (prepared_get .headers ["X-User-Email" ] == connection .email )
299339
300340 def test_bearer_token_not_set_when_calling_non_api_root_endpoint (self ):
301341 """Verify that the authorization header is NOT set when non-API root is called"""
@@ -326,6 +366,13 @@ def test_bearer_token_not_set_when_calling_non_api_root_endpoint(self):
326366 get_request = requests .Request ("GET" , "http://bar:5555/get" )
327367 prepared_get = connection .session .prepare_request (get_request )
328368 self .assertFalse ("authorization" in prepared_get .headers )
369+ self .assertTrue (
370+ prepared_get .headers ["X-Organization-Id" ] == connection .organization_id
371+ )
372+ self .assertTrue (
373+ prepared_get .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
374+ )
375+ self .assertTrue (prepared_get .headers ["X-User-Email" ] == connection .email )
329376
330377 def test_malformed_bearer_token (self ):
331378 """Verify that an exception is thrown when a malformed JWT bearer token is provided"""
@@ -369,4 +416,10 @@ def test_user_token_supersedes_bearer_token(self):
369416 get_request = requests .Request ("GET" , "http://foo:5555/get" )
370417 prepared_get = connection .session .prepare_request (get_request )
371418 self .assertFalse ("authorization" in prepared_get .headers )
372- self .assertTrue ("X-User-Email" in prepared_get .headers )
419+ self .assertTrue (
420+ prepared_get .headers ["X-Organization-Id" ] == connection .organization_id
421+ )
422+ self .assertTrue (
423+ prepared_get .headers ["X-Organization-Id" ] == connection .env_args ["org_id" ]
424+ )
425+ self .assertTrue (prepared_get .headers ["X-User-Email" ] == connection .email )
0 commit comments