Fix in tests when setting a hook.

This commit is contained in:
juanifioren 2015-03-30 15:37:48 -03:00
parent d3824bbe97
commit 07e80d5d5c

View file

@ -15,8 +15,7 @@ from oidc_provider.views import *
class AuthorizationCodeFlowTestCase(TestCase): class AuthorizationCodeFlowTestCase(TestCase):
""" """
An Authentication Request is an OAuth 2.0 Authorization Request that Test cases for Authorize Endpoint using Authorization Code Flow.
requests that the End-User be authenticated by the Authorization Server.
""" """
def setUp(self): def setUp(self):
@ -114,14 +113,11 @@ class AuthorizationCodeFlowTestCase(TestCase):
See: http://openid.net/specs/openid-connect-core-1_0.html#Consent See: http://openid.net/specs/openid-connect-core-1_0.html#Consent
""" """
response_type = 'code'
state = 'openid email'
query_str = urllib.urlencode({ query_str = urllib.urlencode({
'client_id': self.client.client_id, 'client_id': self.client.client_id,
'response_type': response_type, 'response_type': 'code',
'redirect_uri': self.client.default_redirect_uri, 'redirect_uri': self.client.default_redirect_uri,
'scope': state, 'scope': 'openid email',
'state': self.state, 'state': self.state,
}).replace('+', '%20') }).replace('+', '%20')
@ -131,7 +127,11 @@ class AuthorizationCodeFlowTestCase(TestCase):
# Simulate that the user is logged. # Simulate that the user is logged.
request.user = self.user request.user = self.user
response = AuthorizeView.as_view()(request) # Remove the hook, because we want to test default behaviour.
OIDC_AFTER_USERLOGIN_HOOK = settings.default_settings.OIDC_AFTER_USERLOGIN_HOOK
with self.settings(
OIDC_AFTER_USERLOGIN_HOOK=OIDC_AFTER_USERLOGIN_HOOK):
response = AuthorizeView.as_view()(request)
# Check if hidden inputs exists in the form, # Check if hidden inputs exists in the form,
# also if their values are valid. # also if their values are valid.
@ -140,7 +140,7 @@ class AuthorizationCodeFlowTestCase(TestCase):
to_check = { to_check = {
'client_id': self.client.client_id, 'client_id': self.client.client_id,
'redirect_uri': self.client.default_redirect_uri, 'redirect_uri': self.client.default_redirect_uri,
'response_type': response_type, 'response_type': 'code',
} }
for key, value in to_check.iteritems(): for key, value in to_check.iteritems():
@ -213,6 +213,29 @@ class AuthorizationCodeFlowTestCase(TestCase):
class AuthorizationImplicitFlowTestCase(TestCase): class AuthorizationImplicitFlowTestCase(TestCase):
""" """
TODO. Test cases for Authorize Endpoint using Implicit Flow.
""" """
pass
def setUp(self):
self.factory = RequestFactory()
self.user = create_fake_user()
self.client = create_fake_client(response_type='id_token token')
self.state = uuid.uuid4().hex
# TODO
def test_something(self):
query_str = urllib.urlencode({
'client_id': self.client.client_id,
'response_type': 'id_token token',
'redirect_uri': self.client.default_redirect_uri,
'scope': 'openid email',
'state': self.state,
}).replace('+', '%20')
url = reverse('oidc_provider:authorize') + '#' + query_str
request = self.factory.get(url)
# Simulate that the user is logged.
request.user = self.user
response = AuthorizeView.as_view()(request)