1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143
|
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# Copyright 2025 Confluent Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
import pytest
import time
from unittest.mock import AsyncMock, patch
from confluent_kafka.schema_registry._async.schema_registry_client import _AsyncOAuthClient, AsyncSchemaRegistryClient
from confluent_kafka.schema_registry._async.schema_registry_client import _AsyncCustomOAuthClient
from confluent_kafka.schema_registry.common.schema_registry_client import _StaticFieldProvider
from confluent_kafka.schema_registry.error import OAuthTokenError
"""
Tests to ensure OAuth client is set up correctly.
"""
async def custom_oauth_function(config: dict) -> dict:
return config
TEST_TOKEN = 'token123'
TEST_CLUSTER = 'lsrc-cluster'
TEST_POOL = 'pool-id'
TEST_FUNCTION = custom_oauth_function
TEST_CONFIG = {'bearer.auth.token': TEST_TOKEN, 'bearer.auth.logical.cluster': TEST_CLUSTER,
'bearer.auth.identity.pool.id': TEST_POOL}
TEST_URL = 'http://SchemaRegistry:65534'
def test_expiry():
oauth_client = _AsyncOAuthClient('id', 'secret', 'scope', 'endpoint', TEST_CLUSTER, TEST_POOL, 2, 1000, 20000)
oauth_client.token = {'expires_at': time.time() + 2, 'expires_in': 1}
assert not oauth_client.token_expired()
time.sleep(1.5)
assert oauth_client.token_expired()
async def test_get_token():
oauth_client = _AsyncOAuthClient('id', 'secret', 'scope', 'endpoint', TEST_CLUSTER, TEST_POOL, 2, 1000, 20000)
def update_token1():
oauth_client.token = {'expires_at': 0, 'expires_in': 1, 'access_token': '123'}
def update_token2():
oauth_client.token = {'expires_at': time.time() + 2, 'expires_in': 1, 'access_token': '1234'}
oauth_client.generate_access_token = AsyncMock(side_effect=update_token1)
await oauth_client.get_access_token()
assert oauth_client.generate_access_token.call_count == 1
assert oauth_client.token['access_token'] == '123'
oauth_client.generate_access_token = AsyncMock(side_effect=update_token2)
await oauth_client.get_access_token()
# Call count resets to 1 after reassigning generate_access_token
assert oauth_client.generate_access_token.call_count == 1
assert oauth_client.token['access_token'] == '1234'
await oauth_client.get_access_token()
assert oauth_client.generate_access_token.call_count == 1
async def test_generate_token_retry_logic():
oauth_client = _AsyncOAuthClient('id', 'secret', 'scope', 'endpoint', TEST_CLUSTER, TEST_POOL, 5, 1000, 20000)
with (patch("confluent_kafka.schema_registry._async.schema_registry_client.asyncio.sleep") as mock_sleep,
patch("confluent_kafka.schema_registry._async.schema_registry_client.full_jitter") as mock_jitter):
with pytest.raises(OAuthTokenError):
await oauth_client.generate_access_token()
assert mock_sleep.call_count == 5
assert mock_jitter.call_count == 5
def test_static_field_provider():
static_field_provider = _StaticFieldProvider(TEST_TOKEN, TEST_CLUSTER, TEST_POOL)
bearer_fields = static_field_provider.get_bearer_fields()
assert bearer_fields == TEST_CONFIG
async def test_custom_oauth_client():
custom_oauth_client = _AsyncCustomOAuthClient(TEST_FUNCTION, TEST_CONFIG)
assert await custom_oauth_client.get_bearer_fields() == TEST_CONFIG
async def test_bearer_field_headers_missing():
async def empty_custom(config):
return {}
conf = {'url': TEST_URL,
'bearer.auth.credentials.source': 'CUSTOM',
'bearer.auth.custom.provider.function': empty_custom,
'bearer.auth.custom.provider.config': TEST_CONFIG}
headers = {'Accept': "application/vnd.schemaregistry.v1+json,"
" application/vnd.schemaregistry+json,"
" application/json"}
client = AsyncSchemaRegistryClient(conf)
with pytest.raises(ValueError, match=r"Missing required bearer auth fields, "
r"needs to be set in config or custom function: (.*)"):
await client._rest_client.handle_bearer_auth(headers)
async def test_bearer_field_headers_valid():
conf = {'url': TEST_URL,
'bearer.auth.credentials.source': 'CUSTOM',
'bearer.auth.custom.provider.function': TEST_FUNCTION,
'bearer.auth.custom.provider.config': TEST_CONFIG}
client = AsyncSchemaRegistryClient(conf)
headers = {'Accept': "application/vnd.schemaregistry.v1+json,"
" application/vnd.schemaregistry+json,"
" application/json"}
await client._rest_client.handle_bearer_auth(headers)
assert 'Authorization' in headers
assert 'Confluent-Identity-Pool-Id' in headers
assert 'target-sr-cluster' in headers
assert headers['Authorization'] == "Bearer {}".format(TEST_CONFIG['bearer.auth.token'])
assert headers['Confluent-Identity-Pool-Id'] == TEST_CONFIG['bearer.auth.identity.pool.id']
assert headers['target-sr-cluster'] == TEST_CONFIG['bearer.auth.logical.cluster']
|