|
| 1 | +import unittest |
| 2 | + |
| 3 | +from flask import Flask, jsonify, json |
| 4 | + |
| 5 | +from flask_jwt_extended import JWTManager, create_access_token, jwt_required |
| 6 | + |
| 7 | + |
| 8 | +class TestUserClaimsVerification(unittest.TestCase): |
| 9 | + |
| 10 | + def setUp(self): |
| 11 | + self.app = Flask(__name__) |
| 12 | + self.app.secret_key = 'super=secret' |
| 13 | + self.jwt_manager = JWTManager(self.app) |
| 14 | + self.client = self.app.test_client() |
| 15 | + |
| 16 | + @self.jwt_manager.claims_verification_loader |
| 17 | + def claims_verification(user_claims): |
| 18 | + expected_keys = ['foo', 'bar'] |
| 19 | + for key in expected_keys: |
| 20 | + if key not in user_claims: |
| 21 | + return False |
| 22 | + return True |
| 23 | + |
| 24 | + @self.app.route('/auth/login', methods=['POST']) |
| 25 | + def login(): |
| 26 | + ret = {'access_token': create_access_token('test')} |
| 27 | + return jsonify(ret), 200 |
| 28 | + |
| 29 | + @self.app.route('/protected') |
| 30 | + @jwt_required |
| 31 | + def protected(): |
| 32 | + return jsonify({'msg': "hello world"}) |
| 33 | + |
| 34 | + def _jwt_get(self, url, jwt, header_name='Authorization', header_type='Bearer'): |
| 35 | + header_type = '{} {}'.format(header_type, jwt).strip() |
| 36 | + response = self.client.get(url, headers={header_name: header_type}) |
| 37 | + status_code = response.status_code |
| 38 | + data = json.loads(response.get_data(as_text=True)) |
| 39 | + return status_code, data |
| 40 | + |
| 41 | + def test_valid_user_claims(self): |
| 42 | + @self.jwt_manager.user_claims_loader |
| 43 | + def user_claims_callback(identity): |
| 44 | + return {'foo': 'baz', 'bar': 'boom'} |
| 45 | + |
| 46 | + response = self.client.post('/auth/login') |
| 47 | + data = json.loads(response.get_data(as_text=True)) |
| 48 | + access_token = data['access_token'] |
| 49 | + |
| 50 | + status, data = self._jwt_get('/protected', access_token) |
| 51 | + self.assertEqual(data, {'msg': 'hello world'}) |
| 52 | + self.assertEqual(status, 200) |
| 53 | + |
| 54 | + def test_empty_claims_verification_error(self): |
| 55 | + response = self.client.post('/auth/login') |
| 56 | + data = json.loads(response.get_data(as_text=True)) |
| 57 | + access_token = data['access_token'] |
| 58 | + |
| 59 | + status, data = self._jwt_get('/protected', access_token) |
| 60 | + self.assertEqual(data, {'msg': 'User claims verification failed'}) |
| 61 | + self.assertEqual(status, 400) |
| 62 | + |
| 63 | + def test_bad_claims_verification_error(self): |
| 64 | + @self.jwt_manager.user_claims_loader |
| 65 | + def user_claims_callback(identity): |
| 66 | + return {'super': 'banana'} |
| 67 | + |
| 68 | + response = self.client.post('/auth/login') |
| 69 | + data = json.loads(response.get_data(as_text=True)) |
| 70 | + access_token = data['access_token'] |
| 71 | + |
| 72 | + status, data = self._jwt_get('/protected', access_token) |
| 73 | + self.assertEqual(data, {'msg': 'User claims verification failed'}) |
| 74 | + self.assertEqual(status, 400) |
| 75 | + |
| 76 | + def test_bad_claims_custom_error_callback(self): |
| 77 | + @self.jwt_manager.claims_verification_failed_loader |
| 78 | + def user_claims_callback(): |
| 79 | + return jsonify({'foo': 'bar'}), 404 |
| 80 | + |
| 81 | + response = self.client.post('/auth/login') |
| 82 | + data = json.loads(response.get_data(as_text=True)) |
| 83 | + access_token = data['access_token'] |
| 84 | + |
| 85 | + status, data = self._jwt_get('/protected', access_token) |
| 86 | + self.assertEqual(data, {'foo': 'bar'}) |
| 87 | + self.assertEqual(status, 404) |
0 commit comments