summaryrefslogtreecommitdiff
path: root/tests
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch 'master' into fix-oidc-testsfix-oidc-testsJonathan Huot2018-09-077-3/+65
|\
| * Write a test for authorization grant w/ no scope.Theron Luhn2018-09-031-0/+6
| |
| * Fix test_error_catching.Theron Luhn2018-09-021-1/+3
| |
| * Merge branch 'master' into 445_confirm_redirectJonathan Huot2018-08-201-0/+5
| |\
| | * Remove headers from request attributesJonathan Huot2018-08-181-0/+5
| | |
| * | Merge branch 'master' into 445_confirm_redirectJonathan Huot2018-08-154-2/+20
| |\ \ | | |/
| | * Merge branch 'master' into get_default_redirJonathan Huot2018-08-123-2/+4
| | |\
| | | * Merge branch 'master' into 569_expires_in_implicitJonathan Huot2018-08-121-0/+2
| | | |\
| | | | * $ and ' are allowed to be unencoded in query strings (#564)Chris Utz2018-08-121-0/+2
| | | | |
| | | * | Implicit was not converting expires_in into integersJonathan Huot2018-08-062-2/+2
| | | |/
| | * | Add syntax check of get_default_redirect_uriJonathan Huot2018-07-301-0/+16
| | |/ | | | | | | | | | Authorization Code was missing this check, whereas Implicit was checking it.
| * | Add test when no redirecturi & no defaultJonathan Huot2018-08-151-0/+9
| | |
| * | Restore confirm = False testJonathan Huot2018-08-151-0/+2
| | |
| * | confirm_r. is called after auth_clientJonathan Huot2018-07-301-1/+0
| | |
| * | Call get_default_redirect_uri if no redirect_uri in token reqJonathan Huot2018-07-301-0/+21
| |/
* | Fix tested grants.Pieter Ennes2018-07-241-3/+3
| |
* | Remove recently invalidated test for id_token_hint.Pieter Ennes2018-07-242-11/+0
| |
* | Fix more import errors.Pieter Ennes2018-07-241-1/+1
| |
* | Unmute ignored OIDC tests.Pieter Ennes2018-07-2112-24/+19
|/
* Remove handling of nonstandard parameter "expires" (#506)Seth Davis2018-06-301-11/+0
|
* OpenID Connect split (#525)Wiliam Souza2018-06-0515-656/+865
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add command to clean up builds to makefile * Fix docs strings for endpoints pre_configured * Chnage grant_types.openid_connect to include a deprecation warning be a backward compatible * Fix doc string for rfc6749.request_validator * Remove unused import * Change import to be explicity * Move JWTTokenTestCase to openid.connect.core.test_token * Move JWTToken to oauthlib.openid.connect.core.tokens * Move to openid connect test * Move openid connect exceptions to its own file * Remove openid connect from oauth2 server * Remove JWTToken from oauth tokens * Remove grant_types.openid_connect file * Add oauthlib/openid estructure and tests
* Merge branch 'master' into oauth2-introspectPieter Ennes2018-05-265-6/+378
|\
| * Check that the Bearer header is properly formatted (#491)Mattia Procopio2018-05-261-0/+81
| |
| * Add test coverage (#544)Florian Strzelecki2018-05-212-5/+137
| | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add testcase for prepare_token_request() * Add testcase for InsecureTransportError in add_token() * Fix typo in testcase of add_token() for MAC token type * Add testcase for TokenExpiredError in add_token() * Add testcase for prepare_request_body without private key * Add testcase for optional kwargs in prepare_request_body()
| * Avoid populating spurious token credentials (#542)Pieter Ennes2018-05-082-0/+31
| |
| * Openid connect jwt (#488)Wiliam Souza2018-01-301-0/+128
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add JWT token with it the server knows how to validate this new type of token in resource requests * Change find_token_type sorted function to reverse result and choose the valued estimated token handler * Add validate_id_token method to RequestValidator * Added unittest for JWTToken model * Updated version of Mock * Add get_jwt_bearer_token and validate_jwt_bearer_token oauthlib.oauth2.RequestValidator and change oauthlib.oauth2.tokens JWTToken to use it * Change to improve token type estimate test * Add a note in RequestValidator.validate_jwt_bearer_token about error 5xx rather 4xx
| * Fix cliend_id in web request body (#505)Antoine Bertin2018-01-291-1/+1
| | | | | | | | | | | | Previously, cliend_id was always included in the request body in the Authorization Code flow and the client_id parameter was ignored in contradiction with the docs. Fixes #495
* | Added initial introspect supportJonathan Huot2017-12-181-0/+132
|/
* Add support for HMAC-SHA256 (builds on PR#388) (#498)Viktor Haag2017-11-141-2/+38
| | | | | | | | | | | | * Add support for HMAC-SHA256 * Add explicit declaration of HMAC-SHA1 and point HMAC at it To avoid confusion, HMAC constant name should explicitly state which SHA variant is used, but for backwards compatibility, SIGNATURE_HMAC is still needed * add support for HMAC-SHA256 including tests and comments * constructor tests verify client built with correct signer method
* OpenID connect improvements (#484)Wiliam Souza2017-10-014-7/+119
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Change create_token_response to only save access_token when it's present in request.response_type * Remove unused import, fix indentation and improve comment * Fix AuthorizationEndpoint response_type for OpenID Connect hybrid flow * Add new ImplicitTokenGrantDispatcher Changes AuthorizationEndpoint response_type `'token'`, `'id_token'` and `'id_token token'` to work with OpenID Connect and OAuth2 implicit flow in a transparent way * Add new AuthTokenGrantDispatcher Change AuthorizationEndpoint grant_types `'authorization_code'` to work with OpenID Connect and OAuth2 authorization flow in a transparent way * Change tests to include required client_id and redirect_uri * Remove AuthorizationEndpoint grant_types `'openid'` Now OpenID Connect and OAuth2 authorization flow can use `authorization_code` in a transparent way * Add sone blank lines and fix indentation * Change AuthorizationEndpoint grant type id_token and id_token token to use openid_connect_implicit direct * Change default empty value to None and fix a typo * Add assert called to AuthTokenGrantDispatcher tests * Add request to get_authorization_code_scopes
* Add test for nonce parameter preservation.Pieter Ennes2017-09-171-0/+12
|
* Sorted imports.Omer Katz2017-09-1737-147/+196
|
* Merge pull request #473 from jdufresne/assertequalOmer Katz2017-07-302-19/+18
|\ | | | | Replace all uses of assertEquals with assertEqual
| * Replace all uses of assertEquals with assertEqualJon Dufresne2017-04-162-19/+18
| | | | | | | | | | | | | | | | | | | | | | | | assertEquals is deprecated in favor of assertEqual. When running tests, fixes warnings of the form: DeprecationWarning: Please use assertEqual instead. For more information, see: https://docs.python.org/3/library/unittest.html#deprecated-aliases
* | Fix tests for hybrid fragments.Pieter Ennes2017-07-292-3/+14
| |
* | adjust the test for the new exceptionOren Mazor2017-06-143-3/+3
|/
* Add test for prompt=none exclusiveness.Pieter Ennes2017-04-021-0/+18
|
* Merge pull request #453 from kippandrew/fix-revocation-public-clientsOmer Katz2017-03-311-14/+24
|\ | | | | Public clients should be validated when revoking tokens
| * Python 3 fixesAndy Kipp2016-12-061-1/+1
| |
| * Fix testsAndy Kipp2016-12-061-13/+23
| |
* | Merge pull request #464 from cknave/case-insensitive-dict-updateOmer Katz2017-03-311-0/+5
|\ \ | | | | | | Update proxy keys on CaseInsensitiveDict.update()
| * | Update proxy keys on CaseInsensitiveDict.update()Kevin Vance2017-02-231-0/+5
| | |
* | | Merge pull request #455 from bjmc/prompt_bugOmer Katz2017-03-191-0/+50
|\ \ \ | |/ / |/| | Fixes bug with 'prompt' parameter
| * | Adds failing testBrendan McCollam2016-12-201-0/+50
| |/
* | Update custom validator testsBrendan McCollam2016-12-225-45/+79
| |
* | Adds tests for custom grant validatorsBrendan McCollam2016-12-225-0/+95
|/
* Fix a typoJoel Stevenson2016-11-221-1/+1
|
* Normalize handling of request.scopes listJoel Stevenson2016-11-212-24/+60
| | | | | | | | | | | | | | | | | | | | | Use the scope_to_list() util to initalize the request.scopes list from the request.scope request parameter in two place where it was instead being set to None. - AuthorizationEndpoint.validate_authorization_request() - TokenEndpoint.create_token_response() In both cases the Request should be properly populated before it is passed to the client's validator. In the case of the TokenEndpoint - there are OAuth2 workflows that allow an optional scope parameter so we should have been doing this for them anyway. Since scope_to_list() may return None, also update the openid_connect code to behave properly when this is the case. Fixes #436
* Merge pull request #416 from joelstevenson/openid_connectOmer Katz2016-08-288-10/+466
|\ | | | | Openid connect
| * Reworking the handling of claims. @bjmc was quite right to question the ↵Joel Stevenson2016-05-061-0/+107
| | | | | | | | haste-y inclusion in the Resource endpoint. It is an optional parameter to the Authorization Code endpoint and so needs to be stored with both the generated authorization code grant and any subsequent access token issued to that authorization code.