Fix in tests when setting a hook.
This commit is contained in:
parent
d3824bbe97
commit
07e80d5d5c
|
@ -15,8 +15,7 @@ from oidc_provider.views import *
|
||||||
|
|
||||||
class AuthorizationCodeFlowTestCase(TestCase):
|
class AuthorizationCodeFlowTestCase(TestCase):
|
||||||
"""
|
"""
|
||||||
An Authentication Request is an OAuth 2.0 Authorization Request that
|
Test cases for Authorize Endpoint using Authorization Code Flow.
|
||||||
requests that the End-User be authenticated by the Authorization Server.
|
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def setUp(self):
|
def setUp(self):
|
||||||
|
@ -114,14 +113,11 @@ class AuthorizationCodeFlowTestCase(TestCase):
|
||||||
|
|
||||||
See: http://openid.net/specs/openid-connect-core-1_0.html#Consent
|
See: http://openid.net/specs/openid-connect-core-1_0.html#Consent
|
||||||
"""
|
"""
|
||||||
response_type = 'code'
|
|
||||||
state = 'openid email'
|
|
||||||
|
|
||||||
query_str = urllib.urlencode({
|
query_str = urllib.urlencode({
|
||||||
'client_id': self.client.client_id,
|
'client_id': self.client.client_id,
|
||||||
'response_type': response_type,
|
'response_type': 'code',
|
||||||
'redirect_uri': self.client.default_redirect_uri,
|
'redirect_uri': self.client.default_redirect_uri,
|
||||||
'scope': state,
|
'scope': 'openid email',
|
||||||
'state': self.state,
|
'state': self.state,
|
||||||
}).replace('+', '%20')
|
}).replace('+', '%20')
|
||||||
|
|
||||||
|
@ -131,7 +127,11 @@ class AuthorizationCodeFlowTestCase(TestCase):
|
||||||
# Simulate that the user is logged.
|
# Simulate that the user is logged.
|
||||||
request.user = self.user
|
request.user = self.user
|
||||||
|
|
||||||
response = AuthorizeView.as_view()(request)
|
# Remove the hook, because we want to test default behaviour.
|
||||||
|
OIDC_AFTER_USERLOGIN_HOOK = settings.default_settings.OIDC_AFTER_USERLOGIN_HOOK
|
||||||
|
with self.settings(
|
||||||
|
OIDC_AFTER_USERLOGIN_HOOK=OIDC_AFTER_USERLOGIN_HOOK):
|
||||||
|
response = AuthorizeView.as_view()(request)
|
||||||
|
|
||||||
# Check if hidden inputs exists in the form,
|
# Check if hidden inputs exists in the form,
|
||||||
# also if their values are valid.
|
# also if their values are valid.
|
||||||
|
@ -140,7 +140,7 @@ class AuthorizationCodeFlowTestCase(TestCase):
|
||||||
to_check = {
|
to_check = {
|
||||||
'client_id': self.client.client_id,
|
'client_id': self.client.client_id,
|
||||||
'redirect_uri': self.client.default_redirect_uri,
|
'redirect_uri': self.client.default_redirect_uri,
|
||||||
'response_type': response_type,
|
'response_type': 'code',
|
||||||
}
|
}
|
||||||
|
|
||||||
for key, value in to_check.iteritems():
|
for key, value in to_check.iteritems():
|
||||||
|
@ -213,6 +213,29 @@ class AuthorizationCodeFlowTestCase(TestCase):
|
||||||
|
|
||||||
class AuthorizationImplicitFlowTestCase(TestCase):
|
class AuthorizationImplicitFlowTestCase(TestCase):
|
||||||
"""
|
"""
|
||||||
TODO.
|
Test cases for Authorize Endpoint using Implicit Flow.
|
||||||
"""
|
"""
|
||||||
pass
|
|
||||||
|
def setUp(self):
|
||||||
|
self.factory = RequestFactory()
|
||||||
|
self.user = create_fake_user()
|
||||||
|
self.client = create_fake_client(response_type='id_token token')
|
||||||
|
self.state = uuid.uuid4().hex
|
||||||
|
|
||||||
|
# TODO
|
||||||
|
def test_something(self):
|
||||||
|
query_str = urllib.urlencode({
|
||||||
|
'client_id': self.client.client_id,
|
||||||
|
'response_type': 'id_token token',
|
||||||
|
'redirect_uri': self.client.default_redirect_uri,
|
||||||
|
'scope': 'openid email',
|
||||||
|
'state': self.state,
|
||||||
|
}).replace('+', '%20')
|
||||||
|
|
||||||
|
url = reverse('oidc_provider:authorize') + '#' + query_str
|
||||||
|
|
||||||
|
request = self.factory.get(url)
|
||||||
|
# Simulate that the user is logged.
|
||||||
|
request.user = self.user
|
||||||
|
|
||||||
|
response = AuthorizeView.as_view()(request)
|
Loading…
Reference in a new issue