示例#1
0
def fetch_user_data(request):
    try:
        sso_client = SSOClient(**request.access_token)
        response = sso_client.post(SSOClient.user_data_url)
        response.raise_for_status()

        identity = response.json(object_hook=as_local_identity)
        login_user(request, identity)

    except AssertionError as e:
        resp, content = e.args

        message = "Could not fetch user data. Response was {0} - {1}".format(
            resp.get('status'), content
        )
        logging.error(message)
        return HttpResponseServerError(content=message)

    except ValueError as e:
        message = "Invalid user data: {0}".format(raw_user_data)
        logging.error(message)
        return HttpResponseServerError(content=message)

    next_url = request.session.get(REDIRECT_FIELD_NAME, settings.LOGIN_REDIRECT_URL)

    return HttpResponseRedirect(next_url)
    def test_default_realms(self):
        sso_client = SSOClient()
        with identity_client.tests.use_sso_cassette('fetch_request_token/default_realms') as recorded:
            request_token = sso_client.fetch_request_token()
            request = recorded.requests[0]

        self.assertEqual(request.headers['Authorization'][:32], 'OAuth realm="sso:fetch_userdata"')
示例#3
0
def fetch_user_data(request):
    try:
        sso_client = SSOClient(**request.access_token)
        response = sso_client.post(SSOClient.user_data_url)
        response.raise_for_status()

        identity = response.json(object_hook=as_local_identity)
        login_user(request, identity)

    except AssertionError as e:
        resp, content = e.args

        message = "Could not fetch user data. Response was {0} - {1}".format(
            resp.get('status'), content)
        logging.error(message)
        return HttpResponseServerError(content=message)

    except ValueError as e:
        message = "Invalid user data: {0}".format(raw_user_data)
        logging.error(message)
        return HttpResponseServerError(content=message)

    next_url = request.session.get(REDIRECT_FIELD_NAME,
                                   settings.LOGIN_REDIRECT_URL)

    return HttpResponseRedirect(next_url)
示例#4
0
    def test_default_realms(self):
        sso_client = SSOClient()
        with identity_client.tests.use_sso_cassette(
                'fetch_request_token/default_realms') as recorded:
            request_token = sso_client.fetch_request_token()
            request = recorded.requests[0]

        self.assertEqual(request.headers['Authorization'][:32],
                         'OAuth realm="sso:fetch_userdata"')
class SSOClientAuthorize(TestCase):

    AUTHORIZATION_URL = 'https://sandbox.app.passaporteweb.com.br/sso/authorize/?oauth_token=HsLM5nlBdCpARdrt'
    CALLBACK_URL = 'http://127.0.0.1:9000/sso/callback/?oauth_token=HsLM5nlBdCpARdrt&oauth_verifier=56967615'

    def setUp(self):
        self.sso_client = SSOClient()

    def _get_real_session(self, client):
        if 'django.contrib.sessions' in settings.INSTALLED_APPS:
            engine = import_module(settings.SESSION_ENGINE)
            cookie = client.cookies.get(settings.SESSION_COOKIE_NAME, None)
            return engine.SessionStore(cookie and cookie.value or None)

    @patch.object(SSOClient, 'fetch_request_token', Mock(return_value={'oauth_token':'key', 'oauth_token_secret':'secret'}))
    def test_authorize_invokes_fetch_request_token(self):
        self.sso_client.fetch_request_token.reset_mock()

        request = HttpRequest()
        request.session = self._get_real_session(self.client)
        with identity_client.tests.use_sso_cassette('noop'):
            authorization_url = self.sso_client.authorize(request)

        self.assertTrue(self.sso_client.fetch_request_token.called)
        self.assertEquals(self.sso_client.fetch_request_token.call_count, 1)
        self.assertEquals(self.sso_client.fetch_request_token.call_args, ((), {}))

    def test_authorize_stores_request_token_in_session(self):
        request = HttpRequest()
        request.session = self._get_real_session(self.client)
        with identity_client.tests.use_sso_cassette('fetch_request_token/success'):
            authorization_url = self.sso_client.authorize(request)

        self.assertTrue('request_token' in request.session.keys())
        self.assertEquals(request.session['request_token'], {
            SSOClientRequestToken.REQUEST_TOKEN['oauth_token']: SSOClientRequestToken.REQUEST_TOKEN['oauth_token_secret']
        })

    def test_authorize_stores_next_url_in_session(self):
        request = HttpRequest()
        request.GET = {REDIRECT_FIELD_NAME: '/oauth-protected-view/'}
        request.session = self._get_real_session(self.client)
        with identity_client.tests.use_sso_cassette('fetch_request_token/success'):
            authorization_url = self.sso_client.authorize(request)

        self.assertTrue(REDIRECT_FIELD_NAME in request.session.keys())
        self.assertEquals(request.session[REDIRECT_FIELD_NAME], '/oauth-protected-view/')

    def test_authorization_url_is_generated_correctly(self):
        request = HttpRequest()
        request.GET = {REDIRECT_FIELD_NAME: '/oauth-protected-view/'}
        request.session = self._get_real_session(self.client)
        with identity_client.tests.use_sso_cassette('fetch_request_token/success'):
            authorization_url = self.sso_client.authorize(request)

        self.assertEquals(authorization_url, SSOClientAuthorize.AUTHORIZATION_URL)
    def test_requested_realms_can_be_changed_via_project_settings(self, settings_mock):
        settings_mock.APPLICATION_HOST = 'http://127.0.0.1:8000'
        settings_mock.PASSAPORTE_WEB = settings.PASSAPORTE_WEB
        settings_mock.PASSAPORTE_WEB['REALMS'] = ['auth:api', 'sso:fetch_userdata', 'account_manager:api:service_accounts_root_api']
        sso_client = SSOClient()
        with identity_client.tests.use_sso_cassette('fetch_request_token/changed_realms') as recorded:
            request_token = sso_client.fetch_request_token()
            request = recorded.requests[0]

        self.assertEqual(
            request.headers['Authorization'][:87],
            'OAuth realm="auth:api sso:fetch_userdata account_manager:api:service_accounts_root_api"'
        )
示例#7
0
def initiate(request):
    authorization_url = SSOClient().authorize(request)

    session_key = request.COOKIES.get(settings.SESSION_COOKIE_NAME, None)
    logging.debug("Session %s data: %s", session_key, request.session.items())

    return HttpResponseRedirect(authorization_url)
示例#8
0
 def test_token_request_is_denied_when_app_credentials_are_invalid(
         self, settings_mock):
     settings_mock.PASSAPORTE_WEB = {
         'CONSUMER_TOKEN': 'not a valid token',
         'CONSUMER_SECRET': 'not a valid secret',
     }
     sso_client = SSOClient()
     with identity_client.tests.use_sso_cassette(
             'fetch_request_token/invalid_credentials'):
         self.assertRaises(TokenRequestDenied,
                           sso_client.fetch_request_token)
示例#9
0
 def test_abnormal_exceptions_are_not_handled(self):
     sso_client = SSOClient()
     self.assertRaises(MemoryError, sso_client.fetch_request_token)
    def test_fetch_request_token_success(self):
        sso_client = SSOClient()
        with identity_client.tests.use_sso_cassette('fetch_request_token/success'):
            request_token = sso_client.fetch_request_token()

        self.assertEqual(SSOClientRequestToken.REQUEST_TOKEN, request_token)
 def setUp(self):
     self.sso_client = SSOClient()
 def setUp(self):
     self.sso_client = SSOClient(
         resource_owner_key = SSOClientRequestToken.REQUEST_TOKEN['oauth_token'],
         resource_owner_secret = SSOClientRequestToken.REQUEST_TOKEN['oauth_token_secret'],
         verifier = SSOClientAccessToken.VERIFIER
     )
class SSOClientAccessToken(TestCase):

    VERIFIER = '56967615'
    ACCESS_TOKEN = {
        'oauth_token': 'wT06MCzJYkEVmcLE',
        'oauth_token_secret': 'Xq2U3m3oaKkVfQZ6',
        'oauth_callback_confirmed': 'false',
    }

    def setUp(self):
        self.sso_client = SSOClient(
            resource_owner_key = SSOClientRequestToken.REQUEST_TOKEN['oauth_token'],
            resource_owner_secret = SSOClientRequestToken.REQUEST_TOKEN['oauth_token_secret'],
            verifier = SSOClientAccessToken.VERIFIER
        )

    def test_fetch_access_token_success(self):
        with identity_client.tests.use_sso_cassette('fetch_access_token/success'):
            access_token = self.sso_client.fetch_access_token()

        self.assertEqual(SSOClientAccessToken.ACCESS_TOKEN, access_token)

    @patch('identity_client.sso.client.settings')
    def test_access_token_request_is_denied_when_app_credentials_are_invalid(self, settings_mock):
        settings_mock.PASSAPORTE_WEB = {
            'CONSUMER_TOKEN': 'not a valid token',
            'CONSUMER_SECRET': 'not a valid secret',
        }
        sso_client = SSOClient(
            resource_owner_key = SSOClientRequestToken.REQUEST_TOKEN['oauth_token'],
            resource_owner_secret = SSOClientRequestToken.REQUEST_TOKEN['oauth_token_secret'],
            verifier = SSOClientAccessToken.VERIFIER
        )
        with identity_client.tests.use_sso_cassette('fetch_access_token/invalid_credentials'):
            self.assertRaises(
                TokenRequestDenied, sso_client.fetch_access_token
            )

    def test_access_token_request_is_denied_when_owner_key_is_invalid(self):
        sso_client = SSOClient(
            resource_owner_key = 'invalid owner key',
            resource_owner_secret = SSOClientRequestToken.REQUEST_TOKEN['oauth_token_secret'],
            verifier = SSOClientAccessToken.VERIFIER
        )
        with identity_client.tests.use_sso_cassette('fetch_access_token/invalid_owner_key'):
            self.assertRaises(
                TokenRequestDenied, sso_client.fetch_access_token
            )

    def test_access_token_request_is_denied_when_owner_secret_is_invalid(self):
        sso_client = SSOClient(
            resource_owner_key = SSOClientRequestToken.REQUEST_TOKEN['oauth_token'],
            resource_owner_secret = 'invalid owner secret',
            verifier = SSOClientAccessToken.VERIFIER
        )
        with identity_client.tests.use_sso_cassette('fetch_access_token/invalid_owner_secret'):
            self.assertRaises(
                TokenRequestDenied, sso_client.fetch_access_token
            )

    def test_access_token_request_is_denied_when_verifier_is_invalid(self):
        sso_client = SSOClient(
            resource_owner_key = SSOClientRequestToken.REQUEST_TOKEN['oauth_token'],
            resource_owner_secret = SSOClientRequestToken.REQUEST_TOKEN['oauth_token_secret'],
            verifier = 'invalid verifier'
        )
        with identity_client.tests.use_sso_cassette('fetch_access_token/invalid_verifier'):
            self.assertRaises(
                TokenRequestDenied, sso_client.fetch_access_token
            )

    def test_malformed_response_generates_ValueError(self):
        sso_client = SSOClient()
        with identity_client.tests.use_sso_cassette('fetch_access_token/malformed_response'):
            self.assertRaises(ValueError, sso_client.fetch_access_token)

    @patch_request(Mock(side_effect=MemoryError))
    def test_abnormal_exceptions_are_not_handled(self):
        self.assertRaises(MemoryError, self.sso_client.fetch_access_token)