1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174
|
import unittest
import pytest
from authlib.oidc.discovery import OpenIDProviderMetadata
from authlib.oidc.discovery import get_well_known_url
WELL_KNOWN_URL = "/.well-known/openid-configuration"
class WellKnownTest(unittest.TestCase):
def test_no_suffix_issuer(self):
assert get_well_known_url("https://authlib.org") == WELL_KNOWN_URL
assert get_well_known_url("https://authlib.org/") == WELL_KNOWN_URL
def test_with_suffix_issuer(self):
assert (
get_well_known_url("https://authlib.org/issuer1")
== "/issuer1" + WELL_KNOWN_URL
)
assert (
get_well_known_url("https://authlib.org/a/b/c") == "/a/b/c" + WELL_KNOWN_URL
)
def test_with_external(self):
assert (
get_well_known_url("https://authlib.org", external=True)
== "https://authlib.org" + WELL_KNOWN_URL
)
class OpenIDProviderMetadataTest(unittest.TestCase):
def test_validate_jwks_uri(self):
# required
metadata = OpenIDProviderMetadata()
with pytest.raises(ValueError, match='"jwks_uri" is required'):
metadata.validate_jwks_uri()
metadata = OpenIDProviderMetadata({"jwks_uri": "http://authlib.org/jwks.json"})
with pytest.raises(ValueError, match="https"):
metadata.validate_jwks_uri()
metadata = OpenIDProviderMetadata({"jwks_uri": "https://authlib.org/jwks.json"})
metadata.validate_jwks_uri()
def test_validate_acr_values_supported(self):
self._call_validate_array(
"acr_values_supported", ["urn:mace:incommon:iap:silver"]
)
def test_validate_subject_types_supported(self):
self._call_validate_array(
"subject_types_supported", ["pairwise", "public"], required=True
)
self._call_contains_invalid_value("subject_types_supported", ["invalid"])
def test_validate_id_token_signing_alg_values_supported(self):
self._call_validate_array(
"id_token_signing_alg_values_supported",
["RS256"],
required=True,
)
metadata = OpenIDProviderMetadata(
{"id_token_signing_alg_values_supported": ["none"]}
)
with pytest.raises(ValueError, match="RS256"):
metadata.validate_id_token_signing_alg_values_supported()
def test_validate_id_token_encryption_alg_values_supported(self):
self._call_validate_array(
"id_token_encryption_alg_values_supported", ["A128KW"]
)
def test_validate_id_token_encryption_enc_values_supported(self):
self._call_validate_array(
"id_token_encryption_enc_values_supported", ["A128GCM"]
)
def test_validate_userinfo_signing_alg_values_supported(self):
self._call_validate_array("userinfo_signing_alg_values_supported", ["RS256"])
def test_validate_userinfo_encryption_alg_values_supported(self):
self._call_validate_array(
"userinfo_encryption_alg_values_supported", ["A128KW"]
)
def test_validate_userinfo_encryption_enc_values_supported(self):
self._call_validate_array(
"userinfo_encryption_enc_values_supported", ["A128GCM"]
)
def test_validate_request_object_signing_alg_values_supported(self):
self._call_validate_array(
"request_object_signing_alg_values_supported", ["none", "RS256"]
)
def test_validate_request_object_encryption_alg_values_supported(self):
self._call_validate_array(
"request_object_encryption_alg_values_supported", ["A128KW"]
)
def test_validate_request_object_encryption_enc_values_supported(self):
self._call_validate_array(
"request_object_encryption_enc_values_supported", ["A128GCM"]
)
def test_validate_display_values_supported(self):
self._call_validate_array("display_values_supported", ["page", "touch"])
self._call_contains_invalid_value("display_values_supported", ["invalid"])
def test_validate_claim_types_supported(self):
self._call_validate_array("claim_types_supported", ["normal"])
self._call_contains_invalid_value("claim_types_supported", ["invalid"])
metadata = OpenIDProviderMetadata()
assert metadata.claim_types_supported == ["normal"]
def test_validate_claims_supported(self):
self._call_validate_array("claims_supported", ["sub"])
def test_validate_claims_locales_supported(self):
self._call_validate_array("claims_locales_supported", ["en-US"])
def test_validate_claims_parameter_supported(self):
self._call_validate_boolean("claims_parameter_supported")
def test_validate_request_parameter_supported(self):
self._call_validate_boolean("request_parameter_supported")
def test_validate_request_uri_parameter_supported(self):
self._call_validate_boolean("request_uri_parameter_supported", True)
def test_validate_require_request_uri_registration(self):
self._call_validate_boolean("require_request_uri_registration")
def _call_validate_boolean(self, key, default_value=False):
def _validate(metadata):
getattr(metadata, "validate_" + key)()
metadata = OpenIDProviderMetadata()
_validate(metadata)
assert getattr(metadata, key) == default_value
metadata = OpenIDProviderMetadata({key: "str"})
with pytest.raises(ValueError, match="MUST be boolean"):
_validate(metadata)
metadata = OpenIDProviderMetadata({key: True})
_validate(metadata)
def _call_validate_array(self, key, valid_value, required=False):
def _validate(metadata):
getattr(metadata, "validate_" + key)()
metadata = OpenIDProviderMetadata()
if required:
with pytest.raises(ValueError, match=f'"{key}" is required'):
_validate(metadata)
else:
_validate(metadata)
# not array
metadata = OpenIDProviderMetadata({key: "foo"})
with pytest.raises(ValueError, match="JSON array"):
_validate(metadata)
# valid
metadata = OpenIDProviderMetadata({key: valid_value})
_validate(metadata)
def _call_contains_invalid_value(self, key, invalid_value):
metadata = OpenIDProviderMetadata({key: invalid_value})
with pytest.raises(ValueError, match=f'"{key}" contains invalid values'):
getattr(metadata, "validate_" + key)()
|