1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
|
from authlib.oauth2.rfc6749.grants import ImplicitGrant
from .models import Client
from .models import User
from .models import db
from .oauth2_server import TestCase
from .oauth2_server import create_authorization_server
class ImplicitTest(TestCase):
def prepare_data(self, is_confidential=False, response_type="token"):
server = create_authorization_server(self.app)
server.register_grant(ImplicitGrant)
self.server = server
user = User(username="foo")
db.session.add(user)
db.session.commit()
if is_confidential:
client_secret = "implicit-secret"
token_endpoint_auth_method = "client_secret_basic"
else:
client_secret = ""
token_endpoint_auth_method = "none"
client = Client(
user_id=user.id,
client_id="implicit-client",
client_secret=client_secret,
)
client.set_client_metadata(
{
"redirect_uris": ["http://localhost/authorized"],
"scope": "profile",
"response_types": [response_type],
"grant_types": ["implicit"],
"token_endpoint_auth_method": token_endpoint_auth_method,
}
)
self.authorize_url = (
"/oauth/authorize?response_type=token&client_id=implicit-client"
)
db.session.add(client)
db.session.commit()
def test_get_authorize(self):
self.prepare_data()
rv = self.client.get(self.authorize_url)
assert rv.data == b"ok"
def test_confidential_client(self):
self.prepare_data(True)
rv = self.client.get(self.authorize_url)
assert b"invalid_client" in rv.data
def test_unsupported_client(self):
self.prepare_data(response_type="code")
rv = self.client.get(self.authorize_url)
assert "unauthorized_client" in rv.location
def test_invalid_authorize(self):
self.prepare_data()
rv = self.client.post(self.authorize_url)
assert "#error=access_denied" in rv.location
self.server.scopes_supported = ["profile"]
rv = self.client.post(self.authorize_url + "&scope=invalid")
assert "#error=invalid_scope" in rv.location
def test_authorize_token(self):
self.prepare_data()
rv = self.client.post(self.authorize_url, data={"user_id": "1"})
assert "access_token=" in rv.location
url = self.authorize_url + "&state=bar&scope=profile"
rv = self.client.post(url, data={"user_id": "1"})
assert "access_token=" in rv.location
assert "state=bar" in rv.location
assert "scope=profile" in rv.location
def test_token_generator(self):
m = "tests.flask.test_oauth2.oauth2_server:token_generator"
self.app.config.update({"OAUTH2_ACCESS_TOKEN_GENERATOR": m})
self.prepare_data()
rv = self.client.post(self.authorize_url, data={"user_id": "1"})
assert "access_token=i-implicit.1." in rv.location
|