a829726be8
* Log create_uri_response exceptions to logger.exception * Support grant type password - basics * Add tests for Resource Owner Password Credentials Flow * Password Grant -Response according to specification * Better tests for errors, disable grant type password by default * Add documentation for grant type password * User authentication failure to return 403 * Add id_token to response * skipping consent only works for confidential clients * fix URI fragment example not working URL `http://localhost:8100/#/auth/callback/` * OIDC_POST_END_SESSION_HOOK + tests * Explicit function naming * Remove print statements * No need for semicolons, this is Python * Update CHANGELOG.md * fixed logger message * Improved `exp` value calculation * rename OIDC_POST_END_SESSION_HOOK to OIDC_AFTER_END_SESSION_HOOK * added docs for OIDC_AFTER_END_SESSION_HOOK * Replaces `LOGIN_URL` with `OIDC_LOGIN_URL` so users can use a different login path for their oidc requests. * Adds a setting variable for custom template paths * Updates documentation * Fixed bad try/except/finally block * Adds test for OIDC_TEMPLATES settings * Determine value for op_browser_state from session_key or default * Do not use cookie for browser_state. It may not yet be there * Add docs on new setting OIDC_UNAUTHENTICATED_SESSION_MANAGEMENT_KEY * Fix compatibility for older versions of Django * solved merging typo for missing @property
54 lines
1.9 KiB
Python
54 lines
1.9 KiB
Python
from django.core.management import call_command
|
|
from django.core.urlresolvers import reverse
|
|
from django.test import TestCase
|
|
|
|
from oidc_provider.lib.utils.token import (
|
|
create_id_token,
|
|
encode_id_token,
|
|
)
|
|
from oidc_provider import settings
|
|
from oidc_provider.tests.app.utils import (
|
|
create_fake_client,
|
|
create_fake_user,
|
|
)
|
|
import mock
|
|
|
|
|
|
class EndSessionTestCase(TestCase):
|
|
"""
|
|
See: http://openid.net/specs/openid-connect-session-1_0.html#RPLogout
|
|
"""
|
|
|
|
def setUp(self):
|
|
call_command('creatersakey')
|
|
self.user = create_fake_user()
|
|
|
|
self.oidc_client = create_fake_client('id_token')
|
|
self.LOGOUT_URL = 'http://example.com/logged-out/'
|
|
self.oidc_client.post_logout_redirect_uris = [self.LOGOUT_URL]
|
|
self.oidc_client.save()
|
|
|
|
self.url = reverse('oidc_provider:end-session')
|
|
|
|
def test_redirects(self):
|
|
query_params = {
|
|
'post_logout_redirect_uri': self.LOGOUT_URL,
|
|
}
|
|
response = self.client.get(self.url, query_params)
|
|
# With no id_token the OP MUST NOT redirect to the requested redirect_uri.
|
|
self.assertRedirects(response, settings.get('OIDC_LOGIN_URL'), fetch_redirect_response=False)
|
|
|
|
id_token_dic = create_id_token(user=self.user, aud=self.oidc_client.client_id)
|
|
id_token = encode_id_token(id_token_dic, self.oidc_client)
|
|
|
|
query_params['id_token_hint'] = id_token
|
|
|
|
response = self.client.get(self.url, query_params)
|
|
self.assertRedirects(response, self.LOGOUT_URL, fetch_redirect_response=False)
|
|
|
|
@mock.patch(settings.get('OIDC_AFTER_END_SESSION_HOOK'))
|
|
def test_call_post_end_session_hook(self, hook_function):
|
|
self.client.get(self.url)
|
|
self.assertTrue(hook_function.called, 'OIDC_AFTER_END_SESSION_HOOK should be called')
|
|
self.assertTrue(hook_function.call_count == 1, 'OIDC_AFTER_END_SESSION_HOOK should be called once but was {}'.format(hook_function.call_count))
|
|
|