def test_validation_error(self): returnDoc = { 'error' : 'invalid_instance', 'error_description' : 'the instance was invalid' } util.setup_expected_instance_discovery_request(400, cp['authorityHosts']['global'], returnDoc, self.nonHardCodedAuthorizeEndpoint) with self.assertRaisesRegexp(Exception, 'instance was invalid'): token_response = adal.acquire_token_with_client_credentials( self.nonHardCodedAuthority, cp['clientId'], cp['clientSecret'], cp['resource'])
def test_http_error(self): util.setup_expected_instance_discovery_request(500, cp['authorityHosts']['global'], None, self.nonHardCodedAuthorizeEndpoint) with six.assertRaisesRegex(self, Exception, '500'): context = adal.AuthenticationContext(self.nonHardCodedAuthority) token_response = context.acquire_token_with_client_credentials( cp['resource'], cp['clientId'], cp['clientSecret'])
def test_http_error(self): util.setup_expected_instance_discovery_request( 500, cp["authorityHosts"]["global"], None, self.nonHardCodedAuthorizeEndpoint ) with six.assertRaisesRegex(self, Exception, "500"): context = adal.AuthenticationContext(self.nonHardCodedAuthority) token_response = context.acquire_token_with_client_credentials( cp["resource"], cp["clientId"], cp["clientSecret"] )
def test_validation_error(self): returnDoc = {"error": "invalid_instance", "error_description": "the instance was invalid"} util.setup_expected_instance_discovery_request( 400, cp["authorityHosts"]["global"], returnDoc, self.nonHardCodedAuthorizeEndpoint ) with six.assertRaisesRegex(self, Exception, "instance was invalid"): context = adal.AuthenticationContext(self.nonHardCodedAuthority) token_response = context.acquire_token_with_client_credentials( cp["resource"], cp["clientId"], cp["clientSecret"] )
def test_url_extra_slashes(self): util.setup_expected_instance_discovery_request( 200, cp['authorityHosts']['global'], {'tenant_discovery_endpoint': 'http://foobar'}, self.nonHardCodedAuthorizeEndpoint) authority_url = self.nonHardCodedAuthority + '/' # This should pass for one or more than one slashes authority = Authority(authority_url, True) obj = util.create_empty_adal_object() authority.validate(obj['call_context']) req = httpretty.last_request() util.match_standard_request_headers(req)
def test_url_extra_path_elements(self): util.setup_expected_instance_discovery_request( 200, cp["authorityHosts"]["global"], {"tenant_discovery_endpoint": "http://foobar"}, self.nonHardCodedAuthorizeEndpoint, ) authority_url = self.nonHardCodedAuthority + "/extra/path" authority = Authority(authority_url, True) obj = util.create_empty_adal_object() authority.validate(obj["call_context"]) req = httpretty.last_request() util.match_standard_request_headers(req)
def test_url_extra_path_elements(self): util.setup_expected_instance_discovery_request(200, cp['authorityHosts']['global'], { 'tenant_discovery_endpoint' : 'http://foobar' }, self.nonHardCodedAuthorizeEndpoint) authority_url = self.nonHardCodedAuthority + '/extra/path' authority = Authority(authority_url, True) obj = util.create_empty_adal_object() def callback(err): if err: self.assertFalse(err, 'Received unexpected error: ' + err.args[0]) req = httpretty.last_request() util.match_standard_request_headers(req) authority.validate(obj['call_context'], callback)
def test_success_dynamic_instance_discovery(self): instanceDiscoveryRequest = util.setup_expected_instance_discovery_request( 200, cp['authorityHosts']['global'], {'tenant_discovery_endpoint' : 'http://foobar'}, self.nonHardCodedAuthorizeEndpoint ) responseOptions = { 'authority' : self.nonHardCodedAuthority} response = util.create_response(responseOptions) wireResponse = response['wireResponse'] util.setup_expected_client_cred_token_request_response(200, wireResponse, self.nonHardCodedAuthority) token_response = adal.acquire_token_with_client_credentials( self.nonHardCodedAuthority, cp['clientId'], cp['clientSecret'], response['resource']) self.assertTrue( util.is_match_token_response(response['cachedResponse'], token_response), 'The response does not match what was expected.: ' + str(token_response) )
def test_success_dynamic_instance_discovery(self): instanceDiscoveryRequest = util.setup_expected_instance_discovery_request( 200, cp["authorityHosts"]["global"], {"tenant_discovery_endpoint": "http://foobar"}, self.nonHardCodedAuthorizeEndpoint, ) responseOptions = {"authority": self.nonHardCodedAuthority} response = util.create_response(responseOptions) wireResponse = response["wireResponse"] util.setup_expected_client_cred_token_request_response(200, wireResponse, self.nonHardCodedAuthority) context = adal.AuthenticationContext(self.nonHardCodedAuthority) token_response = context.acquire_token_with_client_credentials( response["resource"], cp["clientId"], cp["clientSecret"] ) self.assertTrue( util.is_match_token_response(response["cachedResponse"], token_response), "The response does not match what was expected.: " + str(token_response), )
def test_http_error(self): util.setup_expected_instance_discovery_request(500, cp['authorityHosts']['global'], None, self.nonHardCodedAuthorizeEndpoint) with self.assertRaisesRegexp(Exception, '500'): token_response = adal.acquire_token_with_client_credentials( self.nonHardCodedAuthority, cp['clientId'], cp['clientSecret'], cp['resource'])