1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
|
from flask import json
from authlib.oauth2.rfc6749.grants import ClientCredentialsGrant
from .models import Client
from .models import User
from .models import db
from .oauth2_server import TestCase
from .oauth2_server import create_authorization_server
class ClientCredentialsTest(TestCase):
def prepare_data(self, grant_type="client_credentials"):
server = create_authorization_server(self.app)
server.register_grant(ClientCredentialsGrant)
self.server = server
user = User(username="foo")
db.session.add(user)
db.session.commit()
client = Client(
user_id=user.id,
client_id="credential-client",
client_secret="credential-secret",
)
client.set_client_metadata(
{
"scope": "profile",
"redirect_uris": ["http://localhost/authorized"],
"grant_types": [grant_type],
}
)
db.session.add(client)
db.session.commit()
def test_invalid_client(self):
self.prepare_data()
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "client_credentials",
},
)
resp = json.loads(rv.data)
assert resp["error"] == "invalid_client"
headers = self.create_basic_header("credential-client", "invalid-secret")
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "client_credentials",
},
headers=headers,
)
resp = json.loads(rv.data)
assert resp["error"] == "invalid_client"
def test_invalid_grant_type(self):
self.prepare_data(grant_type="invalid")
headers = self.create_basic_header("credential-client", "credential-secret")
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "client_credentials",
},
headers=headers,
)
resp = json.loads(rv.data)
assert resp["error"] == "unauthorized_client"
def test_invalid_scope(self):
self.prepare_data()
self.server.scopes_supported = ["profile"]
headers = self.create_basic_header("credential-client", "credential-secret")
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "client_credentials",
"scope": "invalid",
},
headers=headers,
)
resp = json.loads(rv.data)
assert resp["error"] == "invalid_scope"
def test_authorize_token(self):
self.prepare_data()
headers = self.create_basic_header("credential-client", "credential-secret")
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "client_credentials",
},
headers=headers,
)
resp = json.loads(rv.data)
assert "access_token" in resp
def test_token_generator(self):
m = "tests.flask.test_oauth2.oauth2_server:token_generator"
self.app.config.update({"OAUTH2_ACCESS_TOKEN_GENERATOR": m})
self.prepare_data()
headers = self.create_basic_header("credential-client", "credential-secret")
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "client_credentials",
},
headers=headers,
)
resp = json.loads(rv.data)
assert "access_token" in resp
assert "c-client_credentials." in resp["access_token"]
|