Skip to content

Commit 8fdf563

Browse files
committed
Bump pyoic to latest version (0.11.0.1)
1 parent 6272ce7 commit 8fdf563

2 files changed

Lines changed: 20 additions & 8 deletions

File tree

setup.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@
55
version='2.0.6',
66
packages=find_packages('src'),
77
package_dir={'': 'src'},
8-
url='https://github.com/its-dirg/pyop',
8+
url='https://github.com/SUNET/pyop',
99
license='Apache 2.0',
1010
author='Rebecka Gulliksson',
11-
author_email='rebecka.gulliksson@umu.se',
11+
author_email='satosa-dev@lists.sunet.se',
1212
description='OpenID Connect Provider (OP) library in Python.',
1313
install_requires=[
14-
'oic==0.9.0.0',
14+
'oic<0.12',
1515
'pymongo'
1616
]
1717
)

tests/pyop/test_provider.py

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,16 @@ def rsa_key():
3939
return RSAKey(key=RSA.generate(1024), use="sig", alg="RS256", kid=rndstr(4))
4040

4141

42+
def provide_configuration():
43+
conf = {
44+
'issuer': ISSUER,
45+
'jwks_uri': '/jwks',
46+
'authorization_endpoint': '/authorization',
47+
'token_endpoint': '/token'
48+
}
49+
return conf
50+
51+
4252
def assert_id_token_base_claims(jws, verification_key, provider, auth_req):
4353
id_token = IdToken().from_jwt(jws, key=[verification_key])
4454
assert id_token['nonce'] == auth_req['nonce']
@@ -94,7 +104,7 @@ def inject_provider(request):
94104
'email': 'testster@example.com',
95105
}
96106
})
97-
request.instance.provider = Provider(rsa_key(), {'issuer': ISSUER},
107+
request.instance.provider = Provider(rsa_key(), provide_configuration(),
98108
AuthorizationState(HashBasedSubjectIdentifierFactory('salt')),
99109
clients, userinfo)
100110

@@ -517,7 +527,7 @@ def test_rejects_invalid_request(self):
517527
])
518528
def test_rejects_mismatching_request(self, client_preference, provider_capability, client_value, provider_value):
519529
request = {'redirect_uris': ['https://client.example.com/redirect']}
520-
provider_capabilities = {'issuer': ISSUER}
530+
provider_capabilities = provide_configuration()
521531

522532
if client_preference.startswith(('request_object_encryption', 'id_token_encrypted', 'userinfo_encrypted')):
523533
# provide default value for the metadata params that come in pairs
@@ -545,7 +555,8 @@ def test_rejects_mismatching_request(self, client_preference, provider_capabilit
545555
])
546556
def test_matches_common_set_of_metadata_values(self, client_preference, provider_capability,
547557
client_value, provider_value):
548-
provider_capabilities = {'issuer': ISSUER, provider_capability: provider_value}
558+
provider_capabilities = provide_configuration()
559+
provider_capabilities.update({provider_capability: provider_value})
549560
provider = Provider(rsa_key(), provider_capabilities,
550561
AuthorizationState(HashBasedSubjectIdentifierFactory('salt')), {}, None)
551562
request = {'redirect_uris': ['https://client.example.com/redirect'], client_preference: client_value}
@@ -577,15 +588,16 @@ def test_client_can_use_registered_space_separated_response_type_in_authenticati
577588

578589
class TestProviderProviderConfiguration(object):
579590
def test_provider_configuration(self):
580-
config = {'issuer': ISSUER, 'foo': 'bar', 'abc': 'xyz'}
591+
config = provide_configuration()
592+
config.update({'foo': 'bar', 'abc': 'xyz'})
581593
provider = Provider(None, config, None, None, None)
582594
provider_config = provider.provider_configuration
583595
assert all(k in provider_config for k in config)
584596

585597

586598
class TestProviderJWKS(object):
587599
def test_jwks(self):
588-
provider = Provider(rsa_key(), {'issuer': ISSUER}, None, None, None)
600+
provider = Provider(rsa_key(), provide_configuration(), None, None, None)
589601
assert provider.jwks == {'keys': [provider.signing_key.serialize()]}
590602

591603

0 commit comments

Comments
 (0)