2121from oidcmsg .exception import MissingRequiredAttribute
2222from oidcmsg .exception import NotAllowedValue
2323from oidcmsg .exception import OidcMsgError
24- from oidcmsg .oauth2 import ROPCAccessTokenRequest
2524from oidcmsg .oauth2 import ResponseMessage
25+ from oidcmsg .oauth2 import ROPCAccessTokenRequest
26+ from oidcmsg .oidc import JRD
2627from oidcmsg .oidc import AccessTokenRequest
2728from oidcmsg .oidc import AccessTokenResponse
2829from oidcmsg .oidc import AddressClaim
3536from oidcmsg .oidc import Claims
3637from oidcmsg .oidc import DiscoveryRequest
3738from oidcmsg .oidc import IdToken
38- from oidcmsg .oidc import JRD
3939from oidcmsg .oidc import Link
4040from oidcmsg .oidc import OpenIDSchema
4141from oidcmsg .oidc import ProviderConfigurationResponse
@@ -475,11 +475,9 @@ def test_required_parameters(self, required_param):
475475 "authorization_endpoint" :
476476 "https://server.example.com/connect/authorize" ,
477477 "jwks_uri" : "https://server.example.com/jwks.json" ,
478- "response_types_supported" : ["code" , "code id_token" , "id_token" ,
479- "token id_token" ],
478+ "response_types_supported" : ["code" , "code id_token" , "id_token" , "token id_token" ],
480479 "subject_types_supported" : ["public" , "pairwise" ],
481- "id_token_signing_alg_values_supported" : ["RS256" , "ES256" ,
482- "HS256" ],
480+ "id_token_signing_alg_values_supported" : ["RS256" , "ES256" , "HS256" ],
483481 }
484482
485483 del provider_config [required_param ]
@@ -494,8 +492,7 @@ def test_token_endpoint_is_not_required_for_implicit_flow_only(self):
494492 "jwks_uri" : "https://server.example.com/jwks.json" ,
495493 "response_types_supported" : ["id_token" , "token id_token" ],
496494 "subject_types_supported" : ["public" , "pairwise" ],
497- "id_token_signing_alg_values_supported" : ["RS256" , "ES256" ,
498- "HS256" ],
495+ "id_token_signing_alg_values_supported" : ["RS256" , "ES256" , "HS256" ],
499496 }
500497
501498 # should not raise an exception
@@ -547,8 +544,7 @@ def test_registration_request(self):
547544 req = RegistrationRequest (operation = "register" , default_max_age = 10 ,
548545 require_auth_time = True , default_acr = "foo" ,
549546 application_type = "web" ,
550- redirect_uris = [
551- "https://example.com/authz_cb" ])
547+ redirect_uris = ["https://example.com/authz_cb" ])
552548 assert req .verify ()
553549 js = req .to_json ()
554550 js_obj = json .loads (js )
@@ -570,11 +566,9 @@ def test_registration_request(self):
570566 "id_token_encrypted_response_enc" ,
571567 "userinfo_encrypted_response_enc" ,
572568 ])
573- def test_registration_request_with_coupled_encryption_params (self ,
574- enc_param ):
569+ def test_registration_request_with_coupled_encryption_params (self , enc_param ):
575570 registration_params = {
576- "redirect_uris" : ["https://example.com/authz_cb" ],
577- enc_param : "RS25asdasd6"
571+ "redirect_uris" : ["https://example.com/authz_cb" ], enc_param : "RS256"
578572 }
579573 registration_req = RegistrationRequest (** registration_params )
580574 with pytest .raises (MissingRequiredAttribute ):
@@ -745,8 +739,8 @@ def test_request(self):
745739 ar = AuthorizationRequest (** args )
746740 keyjar = KeyJar ()
747741 keyjar .add_symmetric ('' , "SomeTestPassword" )
748- _signed_jwt = make_openid_request ( ar , keyjar , 'foobar' , 'HS256' ,
749- 'barfoo' )
742+ keyjar . add_symmetric ( 'foobar' , "SomeTestPassword" )
743+ _signed_jwt = make_openid_request ( ar , keyjar , 'foobar' , 'HS256' , 'barfoo' )
750744 ar ['request' ] = _signed_jwt
751745 del ar ['nonce' ]
752746 del ar ['extra' ]
0 commit comments