canaille-globuzma/tests/oidc/test_password_flow.py

102 lines
2.8 KiB
Python
Raw Normal View History

from canaille.app import models
2020-08-19 07:09:22 +00:00
2021-12-20 22:57:27 +00:00
from . import client_credentials
2020-08-19 07:09:22 +00:00
def test_password_flow_basic(testclient, user, client, backend):
2020-08-19 07:09:22 +00:00
res = testclient.post(
"/oauth/token",
2020-08-19 08:28:28 +00:00
params=dict(
2020-08-19 07:09:22 +00:00
grant_type="password",
username="user",
password="correct horse battery staple",
2022-07-07 14:05:34 +00:00
scope="openid profile groups",
2020-08-19 07:09:22 +00:00
),
2020-08-19 08:28:28 +00:00
headers={"Authorization": f"Basic {client_credentials(client)}"},
2020-10-30 18:19:34 +00:00
status=200,
2020-08-19 07:09:22 +00:00
)
2021-06-03 15:24:36 +00:00
assert res.json["scope"] == "openid profile groups"
2020-08-19 07:09:22 +00:00
assert res.json["token_type"] == "Bearer"
access_token = res.json["access_token"]
token = backend.get(models.Token, access_token=access_token)
2020-08-19 08:28:28 +00:00
assert token is not None
2020-09-25 09:26:41 +00:00
res = testclient.get(
2020-10-30 18:19:34 +00:00
"/oauth/userinfo",
headers={"Authorization": f"Bearer {access_token}"},
status=200,
2020-09-25 09:26:41 +00:00
)
2022-12-24 00:44:16 +00:00
assert res.json["name"] == "John (johnny) Doe"
def test_password_flow_post(testclient, user, client, backend):
client.token_endpoint_auth_method = "client_secret_post"
backend.save(client)
res = testclient.post(
"/oauth/token",
params=dict(
grant_type="password",
username="user",
password="correct horse battery staple",
2022-07-07 14:05:34 +00:00
scope="openid profile groups",
client_id=client.client_id,
2022-10-17 15:49:52 +00:00
client_secret=client.client_secret,
),
status=200,
)
assert res.json["scope"] == "openid profile groups"
assert res.json["token_type"] == "Bearer"
access_token = res.json["access_token"]
token = backend.get(models.Token, access_token=access_token)
assert token is not None
res = testclient.get(
"/oauth/userinfo",
headers={"Authorization": f"Bearer {access_token}"},
status=200,
)
2022-12-24 00:44:16 +00:00
assert res.json["name"] == "John (johnny) Doe"
2022-11-01 11:25:21 +00:00
def test_invalid_user(testclient, user, client):
res = testclient.post(
"/oauth/token",
params=dict(
grant_type="password",
username="invalid",
password="invalid",
scope="openid profile groups",
),
headers={"Authorization": f"Basic {client_credentials(client)}"},
status=400,
)
assert res.json == {
"error": "invalid_request",
"error_description": 'Invalid "username" or "password" in request.',
}
2022-11-01 11:25:21 +00:00
def test_invalid_credentials(testclient, user, client):
res = testclient.post(
"/oauth/token",
params=dict(
grant_type="password",
username="user",
password="invalid",
scope="openid profile groups",
),
headers={"Authorization": f"Basic {client_credentials(client)}"},
status=400,
)
assert res.json == {
"error": "invalid_request",
"error_description": 'Invalid "username" or "password" in request.',
}