canaille-globuzma/tests/oidc/test_hybrid_flow.py

101 lines
2.9 KiB
Python
Raw Normal View History

2021-12-20 22:57:27 +00:00
from urllib.parse import parse_qs
from urllib.parse import urlsplit
2020-08-21 09:11:39 +00:00
from authlib.jose import jwt
2021-12-20 22:57:27 +00:00
from canaille.models import AuthorizationCode
from canaille.models import Token
from canaille.models import User
2020-08-20 14:02:14 +00:00
2020-08-21 09:11:39 +00:00
def test_oauth_hybrid(testclient, slapd_connection, user, client):
2021-12-08 14:01:35 +00:00
User.ldap_object_attributes(slapd_connection)
2020-08-20 14:02:14 +00:00
res = testclient.get(
"/oauth/authorize",
params=dict(
2020-08-21 08:06:53 +00:00
response_type="code token",
2020-08-20 14:02:14 +00:00
client_id=client.oauthClientID,
scope="openid profile",
nonce="somenonce",
),
2020-10-30 22:41:02 +00:00
status=200,
2020-08-20 14:02:14 +00:00
)
2020-10-30 22:41:02 +00:00
assert "text/html" == res.content_type, res.json
2020-08-20 14:02:14 +00:00
res.form["login"] = user.name
res.form["password"] = "correct horse battery staple"
2020-10-30 22:41:02 +00:00
res = res.form.submit(status=302)
2020-08-20 14:02:14 +00:00
2020-10-30 22:41:02 +00:00
res = res.follow(status=200)
assert "text/html" == res.content_type, res.json
2020-08-20 14:02:14 +00:00
2020-10-30 22:41:02 +00:00
res = res.form.submit(name="answer", value="accept", status=302)
2020-08-20 14:02:14 +00:00
assert res.location.startswith(client.oauthRedirectURIs[0])
2020-08-21 08:06:53 +00:00
params = parse_qs(urlsplit(res.location).fragment)
2020-08-20 14:02:14 +00:00
code = params["code"][0]
authcode = AuthorizationCode.get(code, conn=slapd_connection)
assert authcode is not None
2020-08-21 08:06:53 +00:00
access_token = params["access_token"][0]
2020-08-20 14:02:14 +00:00
token = Token.get(access_token, conn=slapd_connection)
assert token is not None
2020-09-25 09:26:41 +00:00
res = testclient.get(
2020-10-30 18:19:34 +00:00
"/oauth/userinfo",
headers={"Authorization": f"Bearer {access_token}"},
status=200,
2020-09-25 09:26:41 +00:00
)
2021-09-28 07:30:41 +00:00
assert {
2021-12-06 14:40:30 +00:00
"name": "John (johnny) Doe",
2021-09-28 07:30:41 +00:00
"family_name": "Doe",
"sub": "user",
"groups": [],
} == res.json
2020-08-21 09:11:39 +00:00
2021-10-13 09:52:02 +00:00
def test_oidc_hybrid(
testclient, slapd_connection, logged_user, client, keypair, other_client
):
2020-08-21 09:11:39 +00:00
res = testclient.get(
"/oauth/authorize",
params=dict(
response_type="code id_token token",
client_id=client.oauthClientID,
scope="openid profile",
nonce="somenonce",
),
)
2020-10-30 22:41:02 +00:00
assert "text/html" == res.content_type, res.json
2020-08-21 09:11:39 +00:00
2020-10-30 22:41:02 +00:00
res = res.form.submit(name="answer", value="accept", status=302)
2020-08-21 09:11:39 +00:00
assert res.location.startswith(client.oauthRedirectURIs[0])
params = parse_qs(urlsplit(res.location).fragment)
code = params["code"][0]
authcode = AuthorizationCode.get(code, conn=slapd_connection)
assert authcode is not None
access_token = params["access_token"][0]
token = Token.get(access_token, conn=slapd_connection)
assert token is not None
id_token = params["id_token"][0]
2020-08-28 14:07:39 +00:00
claims = jwt.decode(id_token, keypair[1])
2020-08-24 08:03:48 +00:00
assert logged_user.uid[0] == claims["sub"]
assert logged_user.cn[0] == claims["name"]
2021-10-13 09:52:02 +00:00
assert [client.oauthClientID, other_client.oauthClientID] == claims["aud"]
2020-08-21 09:11:39 +00:00
2020-09-25 09:26:41 +00:00
res = testclient.get(
2020-10-30 18:19:34 +00:00
"/oauth/userinfo",
headers={"Authorization": f"Bearer {access_token}"},
status=200,
2020-09-25 09:26:41 +00:00
)
2021-09-28 07:30:41 +00:00
assert {
2021-12-06 14:40:30 +00:00
"name": "John (johnny) Doe",
2021-09-28 07:30:41 +00:00
"family_name": "Doe",
"sub": "user",
"groups": [],
} == res.json