-
-
Notifications
You must be signed in to change notification settings - Fork 228
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
f6c6f96
commit dc6de2d
Showing
6 changed files
with
547 additions
and
13 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,90 @@ | ||
import sys | ||
import unittest | ||
import base64 | ||
from flask import Flask, g | ||
from flask_httpauth import HTTPBasicAuth | ||
import pytest | ||
|
||
|
||
@pytest.mark.skipif(sys.version_info < (3, 7), reason='requires python3.7') | ||
class HTTPAuthTestCase(unittest.TestCase): | ||
use_old_style_callback = False | ||
|
||
def setUp(self): | ||
app = Flask(__name__) | ||
app.config['SECRET_KEY'] = 'my secret' | ||
|
||
basic_verify_auth = HTTPBasicAuth() | ||
|
||
@basic_verify_auth.verify_password | ||
async def basic_verify_auth_verify_password(username, password): | ||
if self.use_old_style_callback: | ||
g.anon = False | ||
if username == 'john': | ||
return password == 'hello' | ||
elif username == 'susan': | ||
return password == 'bye' | ||
elif username == '': | ||
g.anon = True | ||
return True | ||
return False | ||
else: | ||
g.anon = False | ||
if username == 'john' and password == 'hello': | ||
return 'john' | ||
elif username == 'susan' and password == 'bye': | ||
return 'susan' | ||
elif username == '': | ||
g.anon = True | ||
return '' | ||
|
||
@basic_verify_auth.error_handler | ||
async def error_handler(): | ||
self.assertIsNone(basic_verify_auth.current_user()) | ||
return 'error', 403 # use a custom error status | ||
|
||
@app.route('/') | ||
async def index(): | ||
return 'index' | ||
|
||
@app.route('/basic-verify') | ||
@basic_verify_auth.login_required | ||
async def basic_verify_auth_route(): | ||
if self.use_old_style_callback: | ||
return 'basic_verify_auth:' + basic_verify_auth.username() + \ | ||
' anon:' + str(g.anon) | ||
else: | ||
return 'basic_verify_auth:' + \ | ||
basic_verify_auth.current_user() + ' anon:' + str(g.anon) | ||
|
||
self.app = app | ||
self.basic_verify_auth = basic_verify_auth | ||
self.client = app.test_client() | ||
|
||
def test_verify_auth_login_valid(self): | ||
creds = base64.b64encode(b'susan:bye').decode('utf-8') | ||
response = self.client.get( | ||
'/basic-verify', headers={'Authorization': 'Basic ' + creds}) | ||
self.assertEqual(response.data, b'basic_verify_auth:susan anon:False') | ||
|
||
def test_verify_auth_login_empty(self): | ||
response = self.client.get('/basic-verify') | ||
self.assertEqual(response.data, b'basic_verify_auth: anon:True') | ||
|
||
def test_verify_auth_login_invalid(self): | ||
creds = base64.b64encode(b'john:bye').decode('utf-8') | ||
response = self.client.get( | ||
'/basic-verify', headers={'Authorization': 'Basic ' + creds}) | ||
self.assertEqual(response.status_code, 403) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
|
||
def test_verify_auth_login_malformed_password(self): | ||
creds = 'eyJhbGciOieyJp==' | ||
response = self.client.get('/basic-verify', | ||
headers={'Authorization': 'Basic ' + creds}) | ||
self.assertEqual(response.status_code, 403) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
|
||
|
||
class HTTPAuthTestCaseOldStyle(HTTPAuthTestCase): | ||
use_old_style_callback = True |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,151 @@ | ||
import base64 | ||
import sys | ||
import unittest | ||
from flask import Flask | ||
from flask_httpauth import HTTPBasicAuth, HTTPTokenAuth, MultiAuth | ||
import pytest | ||
|
||
|
||
@pytest.mark.skipif(sys.version_info < (3, 7), reason='requires python3.7') | ||
class HTTPAuthTestCase(unittest.TestCase): | ||
def setUp(self): | ||
app = Flask(__name__) | ||
app.config['SECRET_KEY'] = 'my secret' | ||
|
||
basic_auth = HTTPBasicAuth() | ||
token_auth = HTTPTokenAuth('MyToken') | ||
custom_token_auth = HTTPTokenAuth(header='X-Token') | ||
multi_auth = MultiAuth(basic_auth, token_auth, custom_token_auth) | ||
|
||
@basic_auth.verify_password | ||
async def verify_password(username, password): | ||
if username == 'john' and password == 'hello': | ||
return 'john' | ||
|
||
@basic_auth.get_user_roles | ||
async def get_basic_role(username): | ||
if username == 'john': | ||
return ['foo', 'bar'] | ||
|
||
@token_auth.verify_token | ||
async def verify_token(token): | ||
return token == 'this-is-the-token!' | ||
|
||
@token_auth.get_user_roles | ||
async def get_token_role(auth): | ||
if auth['token'] == 'this-is-the-token!': | ||
return 'foo' | ||
return | ||
|
||
@token_auth.error_handler | ||
async def error_handler(): | ||
return 'error', 401, {'WWW-Authenticate': 'MyToken realm="Foo"'} | ||
|
||
@custom_token_auth.verify_token | ||
async def verify_custom_token(token): | ||
return token == 'this-is-the-custom-token!' | ||
|
||
@custom_token_auth.get_user_roles | ||
async def get_custom_token_role(auth): | ||
if auth['token'] == 'this-is-the-custom-token!': | ||
return 'foo' | ||
return | ||
|
||
@app.route('/') | ||
async def index(): | ||
return 'index' | ||
|
||
@app.route('/protected') | ||
@multi_auth.login_required | ||
async def auth_route(): | ||
return 'access granted:' + str(multi_auth.current_user()) | ||
|
||
@app.route('/protected-with-role') | ||
@multi_auth.login_required(role='foo') | ||
async def auth_role_route(): | ||
return 'role access granted' | ||
|
||
self.app = app | ||
self.client = app.test_client() | ||
|
||
def test_multi_auth_prompt(self): | ||
response = self.client.get('/protected') | ||
self.assertEqual(response.status_code, 401) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
self.assertEqual(response.headers['WWW-Authenticate'], | ||
'Basic realm="Authentication Required"') | ||
|
||
def test_multi_auth_login_valid_basic(self): | ||
creds = base64.b64encode(b'john:hello').decode('utf-8') | ||
response = self.client.get( | ||
'/protected', headers={'Authorization': 'Basic ' + creds}) | ||
self.assertEqual(response.data.decode('utf-8'), 'access granted:john') | ||
|
||
def test_multi_auth_login_invalid_basic(self): | ||
creds = base64.b64encode(b'john:bye').decode('utf-8') | ||
response = self.client.get( | ||
'/protected', headers={'Authorization': 'Basic ' + creds}) | ||
self.assertEqual(response.status_code, 401) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
self.assertEqual(response.headers['WWW-Authenticate'], | ||
'Basic realm="Authentication Required"') | ||
|
||
def test_multi_auth_login_valid_token(self): | ||
response = self.client.get( | ||
'/protected', headers={'Authorization': | ||
'MyToken this-is-the-token!'}) | ||
self.assertEqual(response.data.decode('utf-8'), 'access granted:None') | ||
|
||
def test_multi_auth_login_invalid_token(self): | ||
response = self.client.get( | ||
'/protected', headers={'Authorization': | ||
'MyToken this-is-not-the-token!'}) | ||
self.assertEqual(response.status_code, 401) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
self.assertEqual(response.headers['WWW-Authenticate'], | ||
'MyToken realm="Foo"') | ||
|
||
def test_multi_auth_login_valid_custom_token(self): | ||
response = self.client.get( | ||
'/protected', headers={'X-Token': 'this-is-the-custom-token!'}) | ||
self.assertEqual(response.data.decode('utf-8'), 'access granted:None') | ||
|
||
def test_multi_auth_login_invalid_custom_token(self): | ||
response = self.client.get( | ||
'/protected', headers={'X-Token': 'this-is-not-the-token!'}) | ||
self.assertEqual(response.status_code, 401) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
self.assertEqual(response.headers['WWW-Authenticate'], | ||
'Bearer realm="Authentication Required"') | ||
|
||
def test_multi_auth_login_invalid_scheme(self): | ||
response = self.client.get( | ||
'/protected', headers={'Authorization': 'Foo this-is-the-token!'}) | ||
self.assertEqual(response.status_code, 401) | ||
self.assertTrue('WWW-Authenticate' in response.headers) | ||
self.assertEqual(response.headers['WWW-Authenticate'], | ||
'Basic realm="Authentication Required"') | ||
|
||
def test_multi_malformed_header(self): | ||
response = self.client.get( | ||
'/protected', headers={'Authorization': 'token-without-scheme'}) | ||
self.assertEqual(response.status_code, 401) | ||
|
||
def test_multi_auth_login_valid_basic_role(self): | ||
creds = base64.b64encode(b'john:hello').decode('utf-8') | ||
response = self.client.get( | ||
'/protected-with-role', headers={'Authorization': | ||
'Basic ' + creds}) | ||
self.assertEqual(response.data.decode('utf-8'), 'role access granted') | ||
|
||
def test_multi_auth_login_valid_token_role(self): | ||
response = self.client.get( | ||
'/protected-with-role', headers={'Authorization': | ||
'MyToken this-is-the-token!'}) | ||
self.assertEqual(response.data.decode('utf-8'), 'role access granted') | ||
|
||
def test_multi_auth_login_valid_custom_token_role(self): | ||
response = self.client.get( | ||
'/protected-with-role', headers={'X-Token': | ||
'this-is-the-custom-token!'}) | ||
self.assertEqual(response.data.decode('utf-8'), 'role access granted') |
Oops, something went wrong.