|
2 | 2 | import unittest.mock as mock |
3 | 3 |
|
4 | 4 | import flask |
| 5 | +from flask.views import MethodView |
5 | 6 | import pytest |
6 | 7 |
|
7 | 8 | import dl_api_commons.flask.middlewares as dl_api_commons_flask_middlewares |
| 9 | +from dl_api_commons.flask.middlewares.commit_rci_middleware import ReqCtxInfoMiddleware |
| 10 | +from dl_api_commons.flask.required_resources import RequiredResourceCommon |
8 | 11 | import dl_auth_native |
| 12 | +from dl_constants.api_constants import DLHeadersCommon |
9 | 13 |
|
10 | 14 |
|
11 | 15 | @pytest.fixture(name="flask_app") |
@@ -81,3 +85,119 @@ def test_invalid_token( |
81 | 85 |
|
82 | 86 | assert response.status_code == 401 |
83 | 87 | assert "Invalid user access token: invalid token" in response.text |
| 88 | + |
| 89 | + |
| 90 | +MASTER_TOKEN = "test-master-token-secret" |
| 91 | + |
| 92 | + |
| 93 | +@pytest.fixture(name="flask_app_with_service_auth") |
| 94 | +def fixture_flask_app_with_service_auth( |
| 95 | + token_decoder: dl_auth_native.DecoderProtocol, |
| 96 | +) -> flask.Flask: |
| 97 | + app = flask.Flask(__name__) |
| 98 | + |
| 99 | + dl_api_commons_flask_middlewares.ContextVarMiddleware().wrap_flask_app(app) |
| 100 | + dl_api_commons_flask_middlewares.RequestLoggingContextControllerMiddleWare().set_up(app) |
| 101 | + dl_api_commons_flask_middlewares.RequestIDService( |
| 102 | + append_local_req_id=False, |
| 103 | + request_id_app_prefix=None, |
| 104 | + ).set_up(app) |
| 105 | + dl_auth_native.FlaskMiddleware( |
| 106 | + token_decoder=token_decoder, |
| 107 | + master_token=MASTER_TOKEN, |
| 108 | + ).set_up(app) |
| 109 | + ReqCtxInfoMiddleware().set_up(app) |
| 110 | + |
| 111 | + class ServiceView(MethodView): |
| 112 | + REQUIRED_RESOURCES = frozenset({RequiredResourceCommon.ONLY_SERVICES_ALLOWED}) |
| 113 | + |
| 114 | + def get(self) -> flask.Response: |
| 115 | + return flask.jsonify({"ok": True}) |
| 116 | + |
| 117 | + app.add_url_rule("/service", view_func=ServiceView.as_view("service")) |
| 118 | + |
| 119 | + @app.route("/user") |
| 120 | + def user_handler() -> flask.Response: |
| 121 | + return flask.jsonify({"ok": True}) |
| 122 | + |
| 123 | + return app |
| 124 | + |
| 125 | + |
| 126 | +def test_service_auth_correct_token( |
| 127 | + flask_app_with_service_auth: flask.Flask, |
| 128 | +) -> None: |
| 129 | + with flask_app_with_service_auth.test_client() as client: |
| 130 | + response = client.get( |
| 131 | + "/service", |
| 132 | + headers={DLHeadersCommon.US_MASTER_TOKEN.value: MASTER_TOKEN}, |
| 133 | + ) |
| 134 | + assert response.status_code == 200 |
| 135 | + |
| 136 | + |
| 137 | +def test_service_auth_wrong_token( |
| 138 | + flask_app_with_service_auth: flask.Flask, |
| 139 | +) -> None: |
| 140 | + with flask_app_with_service_auth.test_client() as client: |
| 141 | + response = client.get( |
| 142 | + "/service", |
| 143 | + headers={DLHeadersCommon.US_MASTER_TOKEN.value: "wrong-token"}, |
| 144 | + ) |
| 145 | + assert response.status_code == 403 |
| 146 | + assert "Invalid service token" in response.text |
| 147 | + |
| 148 | + |
| 149 | +def test_service_auth_missing_token( |
| 150 | + flask_app_with_service_auth: flask.Flask, |
| 151 | +) -> None: |
| 152 | + with flask_app_with_service_auth.test_client() as client: |
| 153 | + response = client.get("/service") |
| 154 | + assert response.status_code == 401 |
| 155 | + assert "Service token header is missing" in response.text |
| 156 | + |
| 157 | + |
| 158 | +def test_service_auth_not_configured( |
| 159 | + token_decoder: dl_auth_native.DecoderProtocol, |
| 160 | +) -> None: |
| 161 | + """When master_token is None, service endpoints should return 401.""" |
| 162 | + app = flask.Flask(__name__) |
| 163 | + |
| 164 | + dl_api_commons_flask_middlewares.ContextVarMiddleware().wrap_flask_app(app) |
| 165 | + dl_api_commons_flask_middlewares.RequestLoggingContextControllerMiddleWare().set_up(app) |
| 166 | + dl_api_commons_flask_middlewares.RequestIDService( |
| 167 | + append_local_req_id=False, |
| 168 | + request_id_app_prefix=None, |
| 169 | + ).set_up(app) |
| 170 | + dl_auth_native.FlaskMiddleware( |
| 171 | + token_decoder=token_decoder, |
| 172 | + ).set_up(app) |
| 173 | + ReqCtxInfoMiddleware().set_up(app) |
| 174 | + |
| 175 | + class ServiceView(MethodView): |
| 176 | + REQUIRED_RESOURCES = frozenset({RequiredResourceCommon.ONLY_SERVICES_ALLOWED}) |
| 177 | + |
| 178 | + def get(self) -> flask.Response: |
| 179 | + return flask.jsonify({"ok": True}) |
| 180 | + |
| 181 | + app.add_url_rule("/service", view_func=ServiceView.as_view("service")) |
| 182 | + |
| 183 | + with app.test_client() as client: |
| 184 | + response = client.get( |
| 185 | + "/service", |
| 186 | + headers={DLHeadersCommon.US_MASTER_TOKEN.value: "some-token"}, |
| 187 | + ) |
| 188 | + assert response.status_code == 401 |
| 189 | + assert "Service auth is not configured" in response.text |
| 190 | + |
| 191 | + |
| 192 | +def test_user_endpoint_still_uses_jwt( |
| 193 | + flask_app_with_service_auth: flask.Flask, |
| 194 | + token_decoder: mock.Mock, |
| 195 | +) -> None: |
| 196 | + """Regular endpoints should still require JWT auth, not accept master token.""" |
| 197 | + with flask_app_with_service_auth.test_client() as client: |
| 198 | + response = client.get( |
| 199 | + "/user", |
| 200 | + headers={DLHeadersCommon.US_MASTER_TOKEN.value: MASTER_TOKEN}, |
| 201 | + ) |
| 202 | + assert response.status_code == 401 |
| 203 | + assert "User access token header is missing" in response.text |
0 commit comments