File: test_implicit_grant.py

package info (click to toggle)
python-authlib 1.6.1-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 3,016 kB
  • sloc: python: 26,998; makefile: 53; sh: 14
file content (86 lines) | stat: -rw-r--r-- 3,068 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
from authlib.oauth2.rfc6749.grants import ImplicitGrant

from .models import Client
from .models import User
from .models import db
from .oauth2_server import TestCase
from .oauth2_server import create_authorization_server


class ImplicitTest(TestCase):
    def prepare_data(self, is_confidential=False, response_type="token"):
        server = create_authorization_server(self.app)
        server.register_grant(ImplicitGrant)
        self.server = server

        user = User(username="foo")
        db.session.add(user)
        db.session.commit()
        if is_confidential:
            client_secret = "implicit-secret"
            token_endpoint_auth_method = "client_secret_basic"
        else:
            client_secret = ""
            token_endpoint_auth_method = "none"

        client = Client(
            user_id=user.id,
            client_id="implicit-client",
            client_secret=client_secret,
        )
        client.set_client_metadata(
            {
                "redirect_uris": ["http://localhost/authorized"],
                "scope": "profile",
                "response_types": [response_type],
                "grant_types": ["implicit"],
                "token_endpoint_auth_method": token_endpoint_auth_method,
            }
        )
        self.authorize_url = (
            "/oauth/authorize?response_type=token&client_id=implicit-client"
        )
        db.session.add(client)
        db.session.commit()

    def test_get_authorize(self):
        self.prepare_data()
        rv = self.client.get(self.authorize_url)
        assert rv.data == b"ok"

    def test_confidential_client(self):
        self.prepare_data(True)
        rv = self.client.get(self.authorize_url)
        assert b"invalid_client" in rv.data

    def test_unsupported_client(self):
        self.prepare_data(response_type="code")
        rv = self.client.get(self.authorize_url)
        assert "unauthorized_client" in rv.location

    def test_invalid_authorize(self):
        self.prepare_data()
        rv = self.client.post(self.authorize_url)
        assert "#error=access_denied" in rv.location

        self.server.scopes_supported = ["profile"]
        rv = self.client.post(self.authorize_url + "&scope=invalid")
        assert "#error=invalid_scope" in rv.location

    def test_authorize_token(self):
        self.prepare_data()
        rv = self.client.post(self.authorize_url, data={"user_id": "1"})
        assert "access_token=" in rv.location

        url = self.authorize_url + "&state=bar&scope=profile"
        rv = self.client.post(url, data={"user_id": "1"})
        assert "access_token=" in rv.location
        assert "state=bar" in rv.location
        assert "scope=profile" in rv.location

    def test_token_generator(self):
        m = "tests.flask.test_oauth2.oauth2_server:token_generator"
        self.app.config.update({"OAUTH2_ACCESS_TOKEN_GENERATOR": m})
        self.prepare_data()
        rv = self.client.post(self.authorize_url, data={"user_id": "1"})
        assert "access_token=i-implicit.1." in rv.location