Skip to content
This repository has been archived by the owner on Jan 18, 2025. It is now read-only.

Commit

Permalink
Try to revoke token with POST when getting a 405 (#662)
Browse files Browse the repository at this point in the history
The OAuth spec does not specify the HTTP verb explicitly but it does hint that POST is the correct verb.
When using the client library with other OAuth services that implement revocation token via a POST, revoking the token will fail.

This commit adds the ability to re-try the revocation process if we get a 405 with the POST verb.
  • Loading branch information
LiraNuna authored and Jon Wayne Parrott committed Oct 6, 2016
1 parent 3f9fdbd commit 999de3a
Show file tree
Hide file tree
Showing 2 changed files with 43 additions and 19 deletions.
4 changes: 4 additions & 0 deletions oauth2client/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -836,6 +836,10 @@ def _do_revoke(self, http, token):
token_revoke_uri = _helpers.update_query_params(
self.revoke_uri, query_params)
resp, content = transport.request(http, token_revoke_uri)
if resp.status == http_client.METHOD_NOT_ALLOWED:
body = urllib.parse.urlencode(query_params)
resp, content = transport.request(http, token_revoke_uri,
method='POST', body=body)
if resp.status == http_client.OK:
self.invalid = True
else:
Expand Down
58 changes: 39 additions & 19 deletions tests/test_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -819,8 +819,8 @@ def locked_delete(self):
self.delete_called = True


def _token_revoke_test_helper(testcase, status, revoke_raise,
valid_bool_value, token_attr):
def _token_revoke_test_helper(testcase, revoke_raise, valid_bool_value,
token_attr, http_mock):
current_store = getattr(testcase.credentials, 'store', None)

dummy_store = DummyDeleteStorage()
Expand All @@ -834,12 +834,11 @@ def do_revoke_stub(http, token):
return actual_do_revoke(http, token)
testcase.credentials._do_revoke = do_revoke_stub

http = http_mock.HttpMock(headers={'status': status})
if revoke_raise:
testcase.assertRaises(client.TokenRevokeError,
testcase.credentials.revoke, http)
testcase.credentials.revoke, http_mock)
else:
testcase.credentials.revoke(http)
testcase.credentials.revoke(http_mock)

testcase.assertEqual(getattr(testcase.credentials, token_attr),
testcase.token_from_revoke)
Expand Down Expand Up @@ -922,21 +921,38 @@ def test_token_refresh_failure(self):
self.assertEqual(None, self.credentials.token_response)

def test_token_revoke_success(self):
http = http_mock.HttpMock(headers={'status': http_client.OK})
_token_revoke_test_helper(
self, '200', revoke_raise=False,
valid_bool_value=True, token_attr='refresh_token')
self, revoke_raise=False, valid_bool_value=True,
token_attr='refresh_token', http_mock=http)

def test_token_revoke_failure(self):
http = http_mock.HttpMock(headers={'status': http_client.BAD_REQUEST})
_token_revoke_test_helper(
self, '400', revoke_raise=True,
valid_bool_value=False, token_attr='refresh_token')
self, revoke_raise=True, valid_bool_value=False,
token_attr='refresh_token', http_mock=http)

def test_token_revoke_fallback(self):
original_credentials = self.credentials.to_json()
self.credentials.refresh_token = None

http = http_mock.HttpMock(headers={'status': http_client.OK})
_token_revoke_test_helper(
self, revoke_raise=False, valid_bool_value=True,
token_attr='access_token', http_mock=http)
self.credentials = self.credentials.from_json(original_credentials)

def test_token_revoke_405(self):
original_credentials = self.credentials.to_json()
self.credentials.refresh_token = None

http = http_mock.HttpMockSequence([
({'status': http_client.METHOD_NOT_ALLOWED}, b''),
({'status': http_client.OK}, b''),
])
_token_revoke_test_helper(
self, '200', revoke_raise=False,
valid_bool_value=True, token_attr='access_token')
self, revoke_raise=False, valid_bool_value=True,
token_attr='access_token', http_mock=http)
self.credentials = self.credentials.from_json(original_credentials)

def test_non_401_error_response(self):
Expand Down Expand Up @@ -1483,14 +1499,16 @@ def test_token_refresh_success(self):
resp, content = transport.request(http, 'http://example.com')

def test_token_revoke_success(self):
http = http_mock.HttpMock(headers={'status': http_client.OK})
_token_revoke_test_helper(
self, '200', revoke_raise=False,
valid_bool_value=True, token_attr='access_token')
self, revoke_raise=False, valid_bool_value=True,
token_attr='access_token', http_mock=http)

def test_token_revoke_failure(self):
http = http_mock.HttpMock(headers={'status': http_client.BAD_REQUEST})
_token_revoke_test_helper(
self, '400', revoke_raise=True,
valid_bool_value=False, token_attr='access_token')
self, revoke_raise=True, valid_bool_value=False,
token_attr='access_token', http_mock=http)

def test_non_401_error_response(self):
http = http_mock.HttpMock(headers={'status': http_client.BAD_REQUEST})
Expand Down Expand Up @@ -1543,14 +1561,16 @@ def test_assertion_refresh(self):
self.assertEqual(b'Bearer 1/3w', content[b'Authorization'])

def test_token_revoke_success(self):
http = http_mock.HttpMock(headers={'status': http_client.OK})
_token_revoke_test_helper(
self, '200', revoke_raise=False,
valid_bool_value=True, token_attr='access_token')
self, revoke_raise=False, valid_bool_value=True,
token_attr='access_token', http_mock=http)

def test_token_revoke_failure(self):
http = http_mock.HttpMock(headers={'status': http_client.BAD_REQUEST})
_token_revoke_test_helper(
self, '400', revoke_raise=True,
valid_bool_value=False, token_attr='access_token')
self, revoke_raise=True, valid_bool_value=False,
token_attr='access_token', http_mock=http)

def test_sign_blob_abstract(self):
credentials = client.AssertionCredentials(None)
Expand Down

0 comments on commit 999de3a

Please sign in to comment.