1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204
|
from flask import json
from flask import jsonify
from authlib.integrations.flask_oauth2 import ResourceProtector
from authlib.integrations.flask_oauth2 import current_token
from authlib.integrations.sqla_oauth2 import create_bearer_token_validator
from .models import Client
from .models import Token
from .models import User
from .models import db
from .oauth2_server import TestCase
from .oauth2_server import create_authorization_server
require_oauth = ResourceProtector()
BearerTokenValidator = create_bearer_token_validator(db.session, Token)
require_oauth.register_token_validator(BearerTokenValidator())
def create_resource_server(app):
@app.route("/user")
@require_oauth("profile")
def user_profile():
user = current_token.user
return jsonify(id=user.id, username=user.username)
@app.route("/user/email")
@require_oauth("email")
def user_email():
user = current_token.user
return jsonify(email=user.username + "@example.com")
@app.route("/info")
@require_oauth()
def public_info():
return jsonify(status="ok")
@app.route("/operator-and")
@require_oauth(["profile email"])
def operator_and():
return jsonify(status="ok")
@app.route("/operator-or")
@require_oauth(["profile", "email"])
def operator_or():
return jsonify(status="ok")
@app.route("/acquire")
def test_acquire():
with require_oauth.acquire("profile") as token:
user = token.user
return jsonify(id=user.id, username=user.username)
@app.route("/optional")
@require_oauth("profile", optional=True)
def test_optional_token():
if current_token:
user = current_token.user
return jsonify(id=user.id, username=user.username)
else:
return jsonify(id=0, username="anonymous")
class AuthorizationTest(TestCase):
def test_none_grant(self):
create_authorization_server(self.app)
authorize_url = "/oauth/authorize?response_type=token&client_id=implicit-client"
rv = self.client.get(authorize_url)
assert b"unsupported_response_type" in rv.data
rv = self.client.post(authorize_url, data={"user_id": "1"})
assert rv.status != 200
rv = self.client.post(
"/oauth/token",
data={
"grant_type": "authorization_code",
"code": "x",
},
)
data = json.loads(rv.data)
assert data["error"] == "unsupported_grant_type"
class ResourceTest(TestCase):
def prepare_data(self):
create_resource_server(self.app)
user = User(username="foo")
db.session.add(user)
db.session.commit()
client = Client(
user_id=user.id,
client_id="resource-client",
client_secret="resource-secret",
)
client.set_client_metadata(
{
"scope": "profile",
"redirect_uris": ["http://localhost/authorized"],
}
)
db.session.add(client)
db.session.commit()
def create_token(self, expires_in=3600):
token = Token(
user_id=1,
client_id="resource-client",
token_type="bearer",
access_token="a1",
scope="profile",
expires_in=expires_in,
)
db.session.add(token)
db.session.commit()
def create_bearer_header(self, token):
return {"Authorization": "Bearer " + token}
def test_invalid_token(self):
self.prepare_data()
rv = self.client.get("/user")
assert rv.status_code == 401
resp = json.loads(rv.data)
assert resp["error"] == "missing_authorization"
headers = {"Authorization": "invalid token"}
rv = self.client.get("/user", headers=headers)
assert rv.status_code == 401
resp = json.loads(rv.data)
assert resp["error"] == "unsupported_token_type"
headers = self.create_bearer_header("invalid")
rv = self.client.get("/user", headers=headers)
assert rv.status_code == 401
resp = json.loads(rv.data)
assert resp["error"] == "invalid_token"
def test_expired_token(self):
self.prepare_data()
self.create_token(-10)
headers = self.create_bearer_header("a1")
rv = self.client.get("/user", headers=headers)
assert rv.status_code == 401
resp = json.loads(rv.data)
assert resp["error"] == "invalid_token"
rv = self.client.get("/acquire", headers=headers)
assert rv.status_code == 401
def test_insufficient_token(self):
self.prepare_data()
self.create_token()
headers = self.create_bearer_header("a1")
rv = self.client.get("/user/email", headers=headers)
assert rv.status_code == 403
resp = json.loads(rv.data)
assert resp["error"] == "insufficient_scope"
def test_access_resource(self):
self.prepare_data()
self.create_token()
headers = self.create_bearer_header("a1")
rv = self.client.get("/user", headers=headers)
resp = json.loads(rv.data)
assert resp["username"] == "foo"
rv = self.client.get("/acquire", headers=headers)
resp = json.loads(rv.data)
assert resp["username"] == "foo"
rv = self.client.get("/info", headers=headers)
resp = json.loads(rv.data)
assert resp["status"] == "ok"
def test_scope_operator(self):
self.prepare_data()
self.create_token()
headers = self.create_bearer_header("a1")
rv = self.client.get("/operator-and", headers=headers)
assert rv.status_code == 403
resp = json.loads(rv.data)
assert resp["error"] == "insufficient_scope"
rv = self.client.get("/operator-or", headers=headers)
assert rv.status_code == 200
def test_optional_token(self):
self.prepare_data()
rv = self.client.get("/optional")
assert rv.status_code == 200
resp = json.loads(rv.data)
assert resp["username"] == "anonymous"
self.create_token()
headers = self.create_bearer_header("a1")
rv = self.client.get("/optional", headers=headers)
assert rv.status_code == 200
resp = json.loads(rv.data)
assert resp["username"] == "foo"
|