forked from simonw/datasette-auth-existing-cookies
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtest_datasette_auth_existing_cookies.py
233 lines (208 loc) · 7.75 KB
/
test_datasette_auth_existing_cookies.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
from asgiref.testing import ApplicationCommunicator
from urllib.parse import quote
import json
import httpx
import pytest
from itsdangerous import URLSafeSerializer
from datasette_auth_existing_cookies.existing_cookies_auth import ExistingCookiesAuth
from datasette_auth_existing_cookies import asgi_wrapper
class ExistingCookiesAuthTest(ExistingCookiesAuth):
mock_api_json = {}
expected_headers = {}
called = False
async def json_from_api_for_cookies(self, cookies, headers=None):
self.called = True
assert self.expected_headers == headers
return self.mock_api_json
@pytest.mark.asyncio
@pytest.mark.parametrize("path", ["/", "/fixtures", "/foo/bar"])
@pytest.mark.parametrize("next_secret", [None, "secret"])
async def test_redirects_to_login_page(next_secret, path):
auth_app = ExistingCookiesAuthTest(
hello_world_app,
api_url="https://api.example.com/user-from-cookie",
auth_redirect_url="https://www.example.com/login",
original_cookies=("sessionid",),
cookie_secret="foo",
cookie_ttl=10,
require_auth=True,
next_secret=next_secret,
trust_x_forwarded_proto=False,
)
async with httpx.AsyncClient(app=auth_app) as client:
response = await client.get(
"https://demo.example.com{}".format(path), allow_redirects=False
)
assert 302 == response.status_code
location = response.headers["location"]
if next_secret is not None:
signer = URLSafeSerializer(next_secret)
next_param = "?next_sig=" + quote(
signer.dumps("https://demo.example.com{}".format(path))
)
else:
next_param = "?next=" + quote("https://demo.example.com{}".format(path))
assert "https://www.example.com/login{}".format(next_param) == location
@pytest.mark.asyncio
@pytest.mark.parametrize("trust_it", [True, False])
async def test_redirects_to_login_page_trusting_x_forwarded_proto(trust_it):
auth_app = ExistingCookiesAuthTest(
hello_world_app,
api_url="https://api.example.com/user-from-cookie",
auth_redirect_url="https://www.example.com/login",
original_cookies=("sessionid",),
cookie_secret="foo",
cookie_ttl=10,
require_auth=True,
trust_x_forwarded_proto=trust_it,
)
async with httpx.AsyncClient(app=auth_app) as client:
url = "http://demo.example.com/"
headers = {"x-forwarded-proto": "https"}
response = await client.get(
url,
allow_redirects=False,
headers=headers,
)
assert 302 == response.status_code
location = response.headers["location"]
expected = "https://www.example.com/login?next={}".format(
quote("PROTO://demo.example.com/")
)
if trust_it:
assert expected.replace("PROTO", "https") == location
else:
assert expected.replace("PROTO", "http") == location
@pytest.mark.asyncio
async def test_allow_access_if_auth_is_returned():
auth_app = ExistingCookiesAuthTest(
hello_world_app,
api_url="https://api.example.com/user-from-cookie",
auth_redirect_url="https://www.example.com/login",
original_cookies=("sessionid",),
cookie_secret="foo",
cookie_ttl=10,
require_auth=True,
)
auth_app.mock_api_json = {"id": 1, "name": "Simon"}
async with httpx.AsyncClient(app=auth_app) as client:
response = await client.get("https://demo.example.com/", allow_redirects=False)
assert 200 == response.status_code
# It should set a cookie
api_auth = response.cookies["_api_auth"]
signer = URLSafeSerializer(auth_app.cookie_secret, "auth-cookie")
info = signer.loads(api_auth)
assert {"id", "name", "ts", "verify_hash"} == set(info.keys())
assert 1 == info["id"]
assert "Simon" == info["name"]
@pytest.mark.asyncio
async def test_access_denied():
auth_app = ExistingCookiesAuthTest(
hello_world_app,
api_url="https://api.example.com/user-from-cookie",
auth_redirect_url="https://www.example.com/login",
original_cookies=("sessionid",),
cookie_secret="foo",
cookie_ttl=10,
require_auth=True,
)
auth_app.mock_api_json = {"forbidden": "Access not allowed"}
assert not auth_app.called
async with httpx.AsyncClient(app=auth_app) as client:
response = await client.get("https://demo.example.com/", allow_redirects=False)
assert 403 == response.status_code
assert "Access not allowed" in response.text
assert auth_app.called
@pytest.mark.asyncio
async def test_headers_to_forward():
auth_app = ExistingCookiesAuthTest(
hello_world_app,
api_url="https://api.example.com/user-from-cookie",
auth_redirect_url="https://www.example.com/login",
original_cookies=("sessionid",),
cookie_secret="foo",
cookie_ttl=10,
require_auth=True,
headers_to_forward=["host", "accept-encoding"],
)
auth_app.mock_api_json = {"id": 1, "name": "Simon"}
auth_app.expected_headers = {
"host": "demo.example.com",
"accept-encoding": "gzip, deflate",
}
assert not auth_app.called
async with httpx.AsyncClient(app=auth_app) as client:
response = await client.get("https://demo.example.com/", allow_redirects=False)
assert 200 == response.status_code
assert auth_app.called
class FakeDatasette:
def __init__(self, config):
self.config = config
def plugin_config(self, name):
assert "datasette-auth-existing-cookies" == name
return self.config
def test_asgi_wrapper():
app = object()
config = {
"api_url": "API-URL",
"auth_redirect_url": "auth_redirect_url",
"original_cookies": "original_cookies",
"cookie_ttl": 20,
"cookie_secret": "secret",
}
wrapper = asgi_wrapper(FakeDatasette(config))
wrapped = wrapper(app)
assert config.items() <= wrapped.__dict__.items()
assert app == wrapped.app
async def hello_world_app(scope, receive, send):
assert scope["type"] == "http"
await send(
{
"type": "http.response.start",
"status": 200,
"headers": [
[b"content-type", b"text/html; charset=UTF-8"],
[b"cache-control", b"max-age=123"],
],
}
)
await send(
{
"type": "http.response.body",
"body": json.dumps({"hello": "world", "auth": scope.get("auth")}).encode(
"utf8"
),
}
)
@pytest.mark.asyncio
async def test_scope_auth_allows_access():
# This test can't use httpx because I need a custom scope
scope = {
"type": "http",
"http_version": "1.0",
"method": "GET",
"path": "/",
"headers": [],
}
auth_app = ExistingCookiesAuthTest(
hello_world_app,
api_url="https://api.example.com/user-from-cookie",
auth_redirect_url="https://www.example.com/login",
original_cookies=("sessionid",),
cookie_secret="foo",
cookie_ttl=10,
require_auth=True,
)
auth_app.mock_api_json = {"forbidden": "Access not allowed"}
# With un-authed scope, it should deny
instance = ApplicationCommunicator(auth_app, scope)
await instance.send_input({"type": "http.request"})
output = await instance.receive_output(1)
assert 403 == output["status"]
# with authed scope it should 200
instance = ApplicationCommunicator(
auth_app, dict(scope, auth={"id": 1, "name": "authed"})
)
await instance.send_input({"type": "http.request"})
output = await instance.receive_output(1)
assert 200 == output["status"]