2020-10-23 09:31:16 +00:00
|
|
|
import datetime
|
2021-12-20 22:57:27 +00:00
|
|
|
|
2023-04-09 14:14:38 +00:00
|
|
|
from canaille.commands import cli
|
2022-01-11 18:49:06 +00:00
|
|
|
from canaille.oidc.models import AuthorizationCode
|
|
|
|
from canaille.oidc.models import Token
|
2020-10-23 09:31:16 +00:00
|
|
|
from werkzeug.security import gen_salt
|
|
|
|
|
|
|
|
|
|
|
|
def test_clean_command(testclient, slapd_connection, client, user):
|
2023-01-30 18:58:00 +00:00
|
|
|
valid_code = AuthorizationCode(
|
2022-02-16 17:00:30 +00:00
|
|
|
authorization_code_id=gen_salt(48),
|
2023-01-30 18:58:00 +00:00
|
|
|
code="my-valid-code",
|
2023-03-08 22:53:53 +00:00
|
|
|
client=client,
|
|
|
|
subject=user,
|
2022-01-11 16:57:58 +00:00
|
|
|
redirect_uri="https://foo.bar/callback",
|
|
|
|
response_type="code",
|
|
|
|
scope="openid profile",
|
|
|
|
nonce="nonce",
|
2023-03-17 23:38:56 +00:00
|
|
|
issue_date=datetime.datetime.now(datetime.timezone.utc).replace(microsecond=0),
|
2023-01-30 18:58:00 +00:00
|
|
|
lifetime=3600,
|
2022-01-11 16:57:58 +00:00
|
|
|
challenge="challenge",
|
|
|
|
challenge_method="method",
|
|
|
|
revokation="",
|
2020-10-23 09:31:16 +00:00
|
|
|
)
|
2023-01-30 18:58:00 +00:00
|
|
|
valid_code.save()
|
|
|
|
expired_code = AuthorizationCode(
|
|
|
|
authorization_code_id=gen_salt(48),
|
|
|
|
code="my-expired-code",
|
2023-03-08 22:53:53 +00:00
|
|
|
client=client,
|
|
|
|
subject=user,
|
2023-01-30 18:58:00 +00:00
|
|
|
redirect_uri="https://foo.bar/callback",
|
|
|
|
response_type="code",
|
|
|
|
scope="openid profile",
|
|
|
|
nonce="nonce",
|
|
|
|
issue_date=(
|
2023-03-17 23:38:56 +00:00
|
|
|
datetime.datetime.now(datetime.timezone.utc).replace(microsecond=0)
|
|
|
|
- datetime.timedelta(days=1)
|
2023-01-30 18:58:00 +00:00
|
|
|
),
|
|
|
|
lifetime=3600,
|
|
|
|
challenge="challenge",
|
|
|
|
challenge_method="method",
|
|
|
|
revokation="",
|
|
|
|
)
|
|
|
|
expired_code.save()
|
2020-10-23 09:31:16 +00:00
|
|
|
|
2023-01-30 18:58:00 +00:00
|
|
|
valid_token = Token(
|
|
|
|
token_id=gen_salt(48),
|
|
|
|
access_token="my-valid-token",
|
2023-03-08 22:53:53 +00:00
|
|
|
client=client,
|
|
|
|
subject=user,
|
2023-01-30 18:58:00 +00:00
|
|
|
type=None,
|
|
|
|
refresh_token=gen_salt(48),
|
|
|
|
scope="openid profile",
|
2023-03-17 23:38:56 +00:00
|
|
|
issue_date=(
|
|
|
|
datetime.datetime.now(datetime.timezone.utc).replace(microsecond=0)
|
|
|
|
),
|
2023-01-30 18:58:00 +00:00
|
|
|
lifetime=3600,
|
|
|
|
)
|
|
|
|
valid_token.save()
|
|
|
|
expired_token = Token(
|
2022-02-16 17:00:30 +00:00
|
|
|
token_id=gen_salt(48),
|
2023-01-30 18:58:00 +00:00
|
|
|
access_token="my-expired-token",
|
2023-03-08 22:53:53 +00:00
|
|
|
client=client,
|
|
|
|
subject=user,
|
2022-01-11 16:57:58 +00:00
|
|
|
type=None,
|
|
|
|
refresh_token=gen_salt(48),
|
|
|
|
scope="openid profile",
|
2023-01-30 18:58:00 +00:00
|
|
|
issue_date=(
|
2023-03-17 23:38:56 +00:00
|
|
|
datetime.datetime.now(datetime.timezone.utc).replace(microsecond=0)
|
|
|
|
- datetime.timedelta(days=1)
|
2023-01-30 18:58:00 +00:00
|
|
|
),
|
|
|
|
lifetime=3600,
|
2020-10-23 09:31:16 +00:00
|
|
|
)
|
2023-01-30 18:58:00 +00:00
|
|
|
expired_token.save()
|
2020-10-23 09:31:16 +00:00
|
|
|
|
2023-01-30 18:58:00 +00:00
|
|
|
assert AuthorizationCode.get(code="my-expired-code")
|
|
|
|
assert Token.get(access_token="my-expired-token")
|
|
|
|
assert expired_code.is_expired()
|
|
|
|
assert expired_token.is_expired()
|
2020-10-23 09:31:16 +00:00
|
|
|
|
|
|
|
runner = testclient.app.test_cli_runner()
|
2023-04-09 12:35:58 +00:00
|
|
|
res = runner.invoke(cli, ["clean"])
|
|
|
|
assert res.exit_code == 0, res.stdout
|
2020-10-23 09:31:16 +00:00
|
|
|
|
2023-03-07 13:49:44 +00:00
|
|
|
assert AuthorizationCode.query() == [valid_code]
|
|
|
|
assert Token.query() == [valid_token]
|