Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 1 | #!/usr/bin/python2.4 |
| 2 | # |
| 3 | # Copyright 2010 Google Inc. |
| 4 | # |
| 5 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 6 | # you may not use this file except in compliance with the License. |
| 7 | # You may obtain a copy of the License at |
| 8 | # |
| 9 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | # |
| 11 | # Unless required by applicable law or agreed to in writing, software |
| 12 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 | # See the License for the specific language governing permissions and |
| 15 | # limitations under the License. |
| 16 | |
| 17 | |
| 18 | """Discovery document tests |
| 19 | |
| 20 | Unit tests for objects created from discovery documents. |
| 21 | """ |
| 22 | |
| 23 | __author__ = 'jcgregorio@google.com (Joe Gregorio)' |
| 24 | |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 25 | import base64 |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 26 | import datetime |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 27 | import httplib2 |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 28 | import time |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 29 | import unittest |
| 30 | import urlparse |
| 31 | |
| 32 | try: |
| 33 | from urlparse import parse_qs |
| 34 | except ImportError: |
| 35 | from cgi import parse_qs |
| 36 | |
Joe Gregorio | 8b4c173 | 2011-12-06 11:28:29 -0500 | [diff] [blame] | 37 | import dev_appserver |
| 38 | dev_appserver.fix_sys_path() |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 39 | import webapp2 |
Joe Gregorio | 8b4c173 | 2011-12-06 11:28:29 -0500 | [diff] [blame] | 40 | |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 41 | from apiclient.http import HttpMockSequence |
| 42 | from google.appengine.api import apiproxy_stub |
| 43 | from google.appengine.api import apiproxy_stub_map |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 44 | from google.appengine.api import app_identity |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 45 | from google.appengine.api import users |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 46 | from google.appengine.api import memcache |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 47 | from google.appengine.api.memcache import memcache_stub |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 48 | from google.appengine.ext import db |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 49 | from google.appengine.ext import testbed |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 50 | from google.appengine.runtime import apiproxy_errors |
Joe Gregorio | 549230c | 2012-01-11 10:38:05 -0500 | [diff] [blame] | 51 | from oauth2client.anyjson import simplejson |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 52 | from oauth2client.appengine import AppAssertionCredentials |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 53 | from oauth2client.appengine import CredentialsModel |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 54 | from oauth2client.appengine import OAuth2Decorator |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 55 | from oauth2client.appengine import OAuth2Handler |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 56 | from oauth2client.appengine import StorageByKeyName |
Joe Gregorio | 549230c | 2012-01-11 10:38:05 -0500 | [diff] [blame] | 57 | from oauth2client.client import AccessTokenRefreshError |
| 58 | from oauth2client.client import FlowExchangeError |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 59 | from oauth2client.client import OAuth2Credentials |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 60 | from webtest import TestApp |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 61 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 62 | class UserMock(object): |
| 63 | """Mock the app engine user service""" |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 64 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 65 | def user_id(self): |
| 66 | return 'foo_user' |
| 67 | |
| 68 | |
| 69 | class Http2Mock(object): |
| 70 | """Mock httplib2.Http""" |
| 71 | status = 200 |
| 72 | content = { |
| 73 | 'access_token': 'foo_access_token', |
| 74 | 'refresh_token': 'foo_refresh_token', |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 75 | 'expires_in': 3600, |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 76 | } |
| 77 | |
| 78 | def request(self, token_uri, method, body, headers, *args, **kwargs): |
| 79 | self.body = body |
| 80 | self.headers = headers |
| 81 | return (self, simplejson.dumps(self.content)) |
| 82 | |
| 83 | |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 84 | class TestAppAssertionCredentials(unittest.TestCase): |
| 85 | account_name = "service_account_name@appspot.com" |
| 86 | signature = "signature" |
| 87 | |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 88 | |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 89 | class AppIdentityStubImpl(apiproxy_stub.APIProxyStub): |
| 90 | |
| 91 | def __init__(self): |
| 92 | super(TestAppAssertionCredentials.AppIdentityStubImpl, self).__init__( |
| 93 | 'app_identity_service') |
| 94 | |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 95 | def _Dynamic_GetAccessToken(self, request, response): |
| 96 | response.set_access_token('a_token_123') |
| 97 | response.set_expiration_time(time.time() + 1800) |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 98 | |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 99 | |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 100 | class ErroringAppIdentityStubImpl(apiproxy_stub.APIProxyStub): |
| 101 | |
| 102 | def __init__(self): |
| 103 | super(TestAppAssertionCredentials.ErroringAppIdentityStubImpl, self).__init__( |
| 104 | 'app_identity_service') |
| 105 | |
| 106 | def _Dynamic_GetAccessToken(self, request, response): |
| 107 | raise app_identity.BackendDeadlineExceeded() |
| 108 | |
| 109 | def test_raise_correct_type_of_exception(self): |
| 110 | app_identity_stub = self.ErroringAppIdentityStubImpl() |
| 111 | apiproxy_stub_map.apiproxy = apiproxy_stub_map.APIProxyStubMap() |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 112 | apiproxy_stub_map.apiproxy.RegisterStub("app_identity_service", |
| 113 | app_identity_stub) |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 114 | apiproxy_stub_map.apiproxy.RegisterStub( |
| 115 | 'memcache', memcache_stub.MemcacheServiceStub()) |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 116 | |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 117 | scope = "http://www.googleapis.com/scope" |
| 118 | try: |
| 119 | credentials = AppAssertionCredentials(scope) |
| 120 | http = httplib2.Http() |
| 121 | credentials.refresh(http) |
| 122 | self.fail('Should have raised an AccessTokenRefreshError') |
| 123 | except AccessTokenRefreshError: |
| 124 | pass |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 125 | |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 126 | def test_get_access_token_on_refresh(self): |
| 127 | app_identity_stub = self.AppIdentityStubImpl() |
| 128 | apiproxy_stub_map.apiproxy = apiproxy_stub_map.APIProxyStubMap() |
| 129 | apiproxy_stub_map.apiproxy.RegisterStub("app_identity_service", |
| 130 | app_identity_stub) |
| 131 | apiproxy_stub_map.apiproxy.RegisterStub( |
| 132 | 'memcache', memcache_stub.MemcacheServiceStub()) |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 133 | |
Joe Gregorio | d84d6b8 | 2012-02-28 14:53:00 -0500 | [diff] [blame] | 134 | scope = "http://www.googleapis.com/scope" |
| 135 | credentials = AppAssertionCredentials(scope) |
| 136 | http = httplib2.Http() |
| 137 | credentials.refresh(http) |
| 138 | self.assertEqual('a_token_123', credentials.access_token) |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 139 | |
| 140 | |
Joe Gregorio | e84c944 | 2012-03-12 08:45:57 -0400 | [diff] [blame^] | 141 | def _http_request(*args, **kwargs): |
| 142 | resp = httplib2.Response({'status': '200'}) |
| 143 | content = simplejson.dumps({'access_token': 'bar'}) |
| 144 | |
| 145 | return resp, content |
| 146 | |
| 147 | |
| 148 | class StorageByKeyNameTest(unittest.TestCase): |
| 149 | |
| 150 | def setUp(self): |
| 151 | self.testbed = testbed.Testbed() |
| 152 | self.testbed.activate() |
| 153 | self.testbed.init_datastore_v3_stub() |
| 154 | self.testbed.init_memcache_stub() |
| 155 | self.testbed.init_user_stub() |
| 156 | |
| 157 | access_token = "foo" |
| 158 | client_id = "some_client_id" |
| 159 | client_secret = "cOuDdkfjxxnv+" |
| 160 | refresh_token = "1/0/a.df219fjls0" |
| 161 | token_expiry = datetime.datetime.utcnow() |
| 162 | token_uri = "https://www.google.com/accounts/o8/oauth2/token" |
| 163 | user_agent = "refresh_checker/1.0" |
| 164 | self.credentials = OAuth2Credentials( |
| 165 | access_token, client_id, client_secret, |
| 166 | refresh_token, token_expiry, token_uri, |
| 167 | user_agent) |
| 168 | |
| 169 | def tearDown(self): |
| 170 | self.testbed.deactivate() |
| 171 | |
| 172 | def test_get_and_put_simple(self): |
| 173 | storage = StorageByKeyName( |
| 174 | CredentialsModel, 'foo', 'credentials') |
| 175 | |
| 176 | self.assertEqual(None, storage.get()) |
| 177 | self.credentials.set_store(storage) |
| 178 | |
| 179 | self.credentials._refresh(_http_request) |
| 180 | credmodel = CredentialsModel.get_by_key_name('foo') |
| 181 | self.assertEqual('bar', credmodel.credentials.access_token) |
| 182 | |
| 183 | def test_get_and_put_cached(self): |
| 184 | storage = StorageByKeyName( |
| 185 | CredentialsModel, 'foo', 'credentials', cache=memcache) |
| 186 | |
| 187 | self.assertEqual(None, storage.get()) |
| 188 | self.credentials.set_store(storage) |
| 189 | |
| 190 | self.credentials._refresh(_http_request) |
| 191 | credmodel = CredentialsModel.get_by_key_name('foo') |
| 192 | self.assertEqual('bar', credmodel.credentials.access_token) |
| 193 | |
| 194 | # Now remove the item from the cache. |
| 195 | memcache.delete('foo') |
| 196 | |
| 197 | # Check that getting refreshes the cache. |
| 198 | credentials = storage.get() |
| 199 | self.assertEqual('bar', credentials.access_token) |
| 200 | self.assertNotEqual(None, memcache.get('foo')) |
| 201 | |
| 202 | # Deleting should clear the cache. |
| 203 | storage.delete() |
| 204 | credentials = storage.get() |
| 205 | self.assertEqual(None, credentials) |
| 206 | self.assertEqual(None, memcache.get('foo')) |
| 207 | |
| 208 | |
| 209 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 210 | class DecoratorTests(unittest.TestCase): |
| 211 | |
| 212 | def setUp(self): |
| 213 | self.testbed = testbed.Testbed() |
| 214 | self.testbed.activate() |
| 215 | self.testbed.init_datastore_v3_stub() |
| 216 | self.testbed.init_memcache_stub() |
| 217 | self.testbed.init_user_stub() |
| 218 | |
| 219 | decorator = OAuth2Decorator(client_id='foo_client_id', |
| 220 | client_secret='foo_client_secret', |
Johan Euphrosine | acf517f | 2012-02-13 21:08:33 +0100 | [diff] [blame] | 221 | scope=['foo_scope', 'bar_scope'], |
| 222 | user_agent='foo') |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 223 | self.decorator = decorator |
| 224 | |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 225 | class TestRequiredHandler(webapp2.RequestHandler): |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 226 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 227 | @decorator.oauth_required |
| 228 | def get(self): |
| 229 | pass |
| 230 | |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 231 | class TestAwareHandler(webapp2.RequestHandler): |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 232 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 233 | @decorator.oauth_aware |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 234 | def get(self, *args, **kwargs): |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 235 | self.response.out.write('Hello World!') |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 236 | assert(kwargs['year'] == '2012') |
| 237 | assert(kwargs['month'] == '01') |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 238 | |
| 239 | |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 240 | application = webapp2.WSGIApplication([ |
| 241 | ('/oauth2callback', OAuth2Handler), |
| 242 | ('/foo_path', TestRequiredHandler), |
| 243 | webapp2.Route(r'/bar_path/<year:\d{4}>/<month:\d{2}>', |
| 244 | handler=TestAwareHandler, name='bar')], |
| 245 | debug=True) |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 246 | self.app = TestApp(application) |
| 247 | users.get_current_user = UserMock |
Joe Gregorio | 922b78c | 2011-05-26 21:36:34 -0400 | [diff] [blame] | 248 | self.httplib2_orig = httplib2.Http |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 249 | httplib2.Http = Http2Mock |
| 250 | |
| 251 | def tearDown(self): |
| 252 | self.testbed.deactivate() |
Joe Gregorio | 922b78c | 2011-05-26 21:36:34 -0400 | [diff] [blame] | 253 | httplib2.Http = self.httplib2_orig |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 254 | |
| 255 | def test_required(self): |
| 256 | # An initial request to an oauth_required decorated path should be a |
| 257 | # redirect to start the OAuth dance. |
| 258 | response = self.app.get('/foo_path') |
| 259 | self.assertTrue(response.status.startswith('302')) |
| 260 | q = parse_qs(response.headers['Location'].split('?', 1)[1]) |
| 261 | self.assertEqual('http://localhost/oauth2callback', q['redirect_uri'][0]) |
| 262 | self.assertEqual('foo_client_id', q['client_id'][0]) |
Joe Gregorio | f2f8a5a | 2011-10-14 15:11:29 -0400 | [diff] [blame] | 263 | self.assertEqual('foo_scope bar_scope', q['scope'][0]) |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 264 | self.assertEqual('http://localhost/foo_path', q['state'][0]) |
| 265 | self.assertEqual('code', q['response_type'][0]) |
| 266 | self.assertEqual(False, self.decorator.has_credentials()) |
| 267 | |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 268 | # Now simulate the callback to /oauth2callback. |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 269 | response = self.app.get('/oauth2callback', { |
| 270 | 'code': 'foo_access_code', |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 271 | 'state': 'foo_path', |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 272 | }) |
| 273 | self.assertEqual('http://localhost/foo_path', response.headers['Location']) |
| 274 | self.assertEqual(None, self.decorator.credentials) |
| 275 | |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 276 | # Now requesting the decorated path should work. |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 277 | response = self.app.get('/foo_path') |
| 278 | self.assertEqual('200 OK', response.status) |
| 279 | self.assertEqual(True, self.decorator.has_credentials()) |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 280 | self.assertEqual('foo_refresh_token', |
| 281 | self.decorator.credentials.refresh_token) |
| 282 | self.assertEqual('foo_access_token', |
| 283 | self.decorator.credentials.access_token) |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 284 | |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 285 | # Invalidate the stored Credentials. |
Joe Gregorio | 9da2ad8 | 2011-09-11 14:04:44 -0400 | [diff] [blame] | 286 | self.decorator.credentials.invalid = True |
| 287 | self.decorator.credentials.store.put(self.decorator.credentials) |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 288 | |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 289 | # Invalid Credentials should start the OAuth dance again. |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 290 | response = self.app.get('/foo_path') |
| 291 | self.assertTrue(response.status.startswith('302')) |
| 292 | q = parse_qs(response.headers['Location'].split('?', 1)[1]) |
| 293 | self.assertEqual('http://localhost/oauth2callback', q['redirect_uri'][0]) |
| 294 | |
Joe Gregorio | ec75dc1 | 2012-02-06 13:40:42 -0500 | [diff] [blame] | 295 | def test_storage_delete(self): |
| 296 | # An initial request to an oauth_required decorated path should be a |
| 297 | # redirect to start the OAuth dance. |
| 298 | response = self.app.get('/foo_path') |
| 299 | self.assertTrue(response.status.startswith('302')) |
| 300 | |
| 301 | # Now simulate the callback to /oauth2callback. |
| 302 | response = self.app.get('/oauth2callback', { |
| 303 | 'code': 'foo_access_code', |
| 304 | 'state': 'foo_path', |
| 305 | }) |
| 306 | self.assertEqual('http://localhost/foo_path', response.headers['Location']) |
| 307 | self.assertEqual(None, self.decorator.credentials) |
| 308 | |
| 309 | # Now requesting the decorated path should work. |
| 310 | response = self.app.get('/foo_path') |
| 311 | |
| 312 | # Invalidate the stored Credentials. |
| 313 | self.decorator.credentials.store.delete() |
| 314 | |
| 315 | # Invalid Credentials should start the OAuth dance again. |
| 316 | response = self.app.get('/foo_path') |
| 317 | self.assertTrue(response.status.startswith('302')) |
| 318 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 319 | def test_aware(self): |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 320 | # An initial request to an oauth_aware decorated path should not redirect. |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 321 | response = self.app.get('/bar_path/2012/01') |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 322 | self.assertEqual('Hello World!', response.body) |
| 323 | self.assertEqual('200 OK', response.status) |
| 324 | self.assertEqual(False, self.decorator.has_credentials()) |
| 325 | url = self.decorator.authorize_url() |
| 326 | q = parse_qs(url.split('?', 1)[1]) |
| 327 | self.assertEqual('http://localhost/oauth2callback', q['redirect_uri'][0]) |
| 328 | self.assertEqual('foo_client_id', q['client_id'][0]) |
Joe Gregorio | f2f8a5a | 2011-10-14 15:11:29 -0400 | [diff] [blame] | 329 | self.assertEqual('foo_scope bar_scope', q['scope'][0]) |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 330 | self.assertEqual('http://localhost/bar_path/2012/01', q['state'][0]) |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 331 | self.assertEqual('code', q['response_type'][0]) |
| 332 | |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 333 | # Now simulate the callback to /oauth2callback. |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 334 | url = self.decorator.authorize_url() |
| 335 | response = self.app.get('/oauth2callback', { |
| 336 | 'code': 'foo_access_code', |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 337 | 'state': 'bar_path', |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 338 | }) |
| 339 | self.assertEqual('http://localhost/bar_path', response.headers['Location']) |
| 340 | self.assertEqual(False, self.decorator.has_credentials()) |
| 341 | |
Joe Gregorio | 562b731 | 2011-09-15 09:06:38 -0400 | [diff] [blame] | 342 | # Now requesting the decorated path will have credentials. |
Joe Gregorio | 1777497 | 2012-03-01 11:11:59 -0500 | [diff] [blame] | 343 | response = self.app.get('/bar_path/2012/01') |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 344 | self.assertEqual('200 OK', response.status) |
| 345 | self.assertEqual('Hello World!', response.body) |
| 346 | self.assertEqual(True, self.decorator.has_credentials()) |
JacobMoshenko | 8e90510 | 2011-06-20 09:53:10 -0400 | [diff] [blame] | 347 | self.assertEqual('foo_refresh_token', |
| 348 | self.decorator.credentials.refresh_token) |
| 349 | self.assertEqual('foo_access_token', |
| 350 | self.decorator.credentials.access_token) |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 351 | |
Joe Gregorio | 1adde1a | 2012-01-06 12:30:35 -0500 | [diff] [blame] | 352 | |
| 353 | def test_kwargs_are_passed_to_underlying_flow(self): |
| 354 | decorator = OAuth2Decorator(client_id='foo_client_id', |
| 355 | client_secret='foo_client_secret', |
Johan Euphrosine | acf517f | 2012-02-13 21:08:33 +0100 | [diff] [blame] | 356 | user_agent='foo_user_agent', |
Joe Gregorio | 1adde1a | 2012-01-06 12:30:35 -0500 | [diff] [blame] | 357 | scope=['foo_scope', 'bar_scope'], |
| 358 | access_type='offline', |
| 359 | approval_prompt='force') |
| 360 | self.assertEqual('offline', decorator.flow.params['access_type']) |
| 361 | self.assertEqual('force', decorator.flow.params['approval_prompt']) |
Johan Euphrosine | acf517f | 2012-02-13 21:08:33 +0100 | [diff] [blame] | 362 | self.assertEqual('foo_user_agent', decorator.flow.user_agent) |
| 363 | self.assertEqual(None, decorator.flow.params.get('user_agent', None)) |
Joe Gregorio | 1adde1a | 2012-01-06 12:30:35 -0500 | [diff] [blame] | 364 | |
| 365 | |
Joe Gregorio | 432f17e | 2011-05-22 23:18:00 -0400 | [diff] [blame] | 366 | if __name__ == '__main__': |
| 367 | unittest.main() |