Skip to content

Commit be1443e

Browse files
committed
Upgrade to latest pyop
Signed-off-by: Ivan Kanakarakis <[email protected]>
1 parent d9f8165 commit be1443e

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
packages=find_packages('src/'),
1616
package_dir={'': 'src'},
1717
install_requires=[
18-
"pyop >= 2.1.0",
18+
"pyop >= 3.0.1",
1919
"pysaml2",
2020
"pycryptodomex",
2121
"requests",

src/satosa/frontends/openid_connect.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,6 @@ def handle_authn_response(self, context, internal_resp, extra_id_token_claims=No
125125
auth_req,
126126
internal_resp.subject_id,
127127
extra_id_token_claims=extra_id_token_claims,
128-
extra_scopes=self.config.get("extra_scopes"),
129128
)
130129

131130
del context.state[self.name]
@@ -360,7 +359,6 @@ def userinfo_endpoint(self, context):
360359
response = self.provider.handle_userinfo_request(
361360
request=urlencode(context.request),
362361
http_headers=headers,
363-
extra_scopes=self.config.get("extra_scopes"),
364362
)
365363
return Response(response.to_json(), content="application/json")
366364
except (BearerTokenError, InvalidAccessToken) as e:

tests/satosa/frontends/test_openid_connect.py

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -186,19 +186,21 @@ def test_provider_configuration_endpoint(self, context, frontend):
186186
"claims_parameter_supported": True,
187187
"request_parameter_supported": False,
188188
"request_uri_parameter_supported": False,
189-
"scopes_supported": ["openid", "email"],
190189
"claims_supported": ["email"],
191190
"grant_types_supported": ["authorization_code", "implicit"],
192191
"issuer": BASE_URL,
193-
"require_request_uri_registration": True,
192+
"require_request_uri_registration": False,
194193
"token_endpoint_auth_methods_supported": ["client_secret_basic"],
195194
"version": "3.0"
196195
}
197196

198197
http_response = frontend.provider_config(context)
199198
provider_config = ProviderConfigurationResponse().deserialize(http_response.message, "json")
200199

201-
assert provider_config.to_dict() == expected_capabilities
200+
provider_config_dict = provider_config.to_dict()
201+
scopes_supported = provider_config_dict.pop("scopes_supported")
202+
assert all(scope in scopes_supported for scope in ["openid", "email"])
203+
assert provider_config_dict == expected_capabilities
202204

203205
def test_jwks(self, context, frontend):
204206
http_response = frontend.jwks(context)

0 commit comments

Comments
 (0)