|
14 | 14 | DescopeClient,
|
15 | 15 | RateLimitException,
|
16 | 16 | )
|
17 |
| -from descope.common import DEFAULT_TIMEOUT_SECONDS, SESSION_TOKEN_NAME, EndpointsV1 |
| 17 | +from descope.common import ( |
| 18 | + DEFAULT_TIMEOUT_SECONDS, |
| 19 | + SESSION_TOKEN_NAME, |
| 20 | + DeliveryMethod, |
| 21 | + EndpointsV1, |
| 22 | +) |
18 | 23 |
|
19 | 24 | from . import common
|
20 | 25 |
|
@@ -841,6 +846,183 @@ def test_select_tenant(self):
|
841 | 846 | timeout=DEFAULT_TIMEOUT_SECONDS,
|
842 | 847 | )
|
843 | 848 |
|
| 849 | + def test_auth_management_key_with_functions(self): |
| 850 | + """Test auth_management_key with functions that require and don't require refresh tokens""" |
| 851 | + auth_mgmt_key = "test-auth-mgmt-key" |
| 852 | + |
| 853 | + # Test 1: Direct auth_management_key setting (without refresh token) |
| 854 | + client = DescopeClient( |
| 855 | + self.dummy_project_id, |
| 856 | + self.public_key_dict, |
| 857 | + auth_management_key=auth_mgmt_key, |
| 858 | + ) |
| 859 | + |
| 860 | + with patch("requests.post") as mock_post: |
| 861 | + my_mock_response = mock.Mock() |
| 862 | + my_mock_response.ok = True |
| 863 | + my_mock_response.json.return_value = {"maskedEmail": "t***@example.com"} |
| 864 | + mock_post.return_value = my_mock_response |
| 865 | + |
| 866 | + client. otp. sign_up( DeliveryMethod. EMAIL, "[email protected]") |
| 867 | + |
| 868 | + mock_post.assert_called_with( |
| 869 | + f"{common.DEFAULT_BASE_URL}{EndpointsV1.sign_up_auth_otp_path}/email", |
| 870 | + headers={ |
| 871 | + **common.default_headers, |
| 872 | + "x-descope-project-id": self.dummy_project_id, |
| 873 | + "Authorization": f"Bearer {self.dummy_project_id}:{auth_mgmt_key}", |
| 874 | + }, |
| 875 | + json={ |
| 876 | + |
| 877 | + "user": { "email": "[email protected]"}, |
| 878 | + |
| 879 | + }, |
| 880 | + params=None, |
| 881 | + allow_redirects=False, |
| 882 | + verify=True, |
| 883 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 884 | + ) |
| 885 | + |
| 886 | + # Test 2: Environment variable auth_management_key setting |
| 887 | + env_auth_mgmt_key = "env-auth-mgmt-key" |
| 888 | + with patch.dict( |
| 889 | + "os.environ", {"DESCOPE_AUTH_MANAGEMENT_KEY": env_auth_mgmt_key} |
| 890 | + ): |
| 891 | + client_env = DescopeClient(self.dummy_project_id, self.public_key_dict) |
| 892 | + |
| 893 | + with patch("requests.post") as mock_post: |
| 894 | + my_mock_response = mock.Mock() |
| 895 | + my_mock_response.ok = True |
| 896 | + my_mock_response.json.return_value = {"maskedEmail": "t***@example.com"} |
| 897 | + mock_post.return_value = my_mock_response |
| 898 | + |
| 899 | + client_env. otp. sign_up( DeliveryMethod. EMAIL, "[email protected]") |
| 900 | + |
| 901 | + mock_post.assert_called_with( |
| 902 | + f"{common.DEFAULT_BASE_URL}{EndpointsV1.sign_up_auth_otp_path}/email", |
| 903 | + headers={ |
| 904 | + **common.default_headers, |
| 905 | + "x-descope-project-id": self.dummy_project_id, |
| 906 | + "Authorization": f"Bearer {self.dummy_project_id}:{env_auth_mgmt_key}", |
| 907 | + }, |
| 908 | + json={ |
| 909 | + |
| 910 | + "user": { "email": "[email protected]"}, |
| 911 | + |
| 912 | + }, |
| 913 | + allow_redirects=False, |
| 914 | + verify=True, |
| 915 | + params=None, |
| 916 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 917 | + ) |
| 918 | + |
| 919 | + # Test 3: Direct parameter takes priority over environment variable |
| 920 | + direct_auth_mgmt_key = "direct-auth-mgmt-key" |
| 921 | + with patch.dict( |
| 922 | + "os.environ", {"DESCOPE_AUTH_MANAGEMENT_KEY": env_auth_mgmt_key} |
| 923 | + ): |
| 924 | + client_priority = DescopeClient( |
| 925 | + self.dummy_project_id, |
| 926 | + self.public_key_dict, |
| 927 | + auth_management_key=direct_auth_mgmt_key, |
| 928 | + ) |
| 929 | + |
| 930 | + with patch("requests.post") as mock_post: |
| 931 | + my_mock_response = mock.Mock() |
| 932 | + my_mock_response.ok = True |
| 933 | + my_mock_response.json.return_value = {"maskedEmail": "t***@example.com"} |
| 934 | + mock_post.return_value = my_mock_response |
| 935 | + |
| 936 | + client_priority. otp. sign_up( DeliveryMethod. EMAIL, "[email protected]") |
| 937 | + |
| 938 | + mock_post.assert_called_with( |
| 939 | + f"{common.DEFAULT_BASE_URL}{EndpointsV1.sign_up_auth_otp_path}/email", |
| 940 | + headers={ |
| 941 | + **common.default_headers, |
| 942 | + "x-descope-project-id": self.dummy_project_id, |
| 943 | + "Authorization": f"Bearer {self.dummy_project_id}:{direct_auth_mgmt_key}", |
| 944 | + }, |
| 945 | + json={ |
| 946 | + |
| 947 | + "user": { "email": "[email protected]"}, |
| 948 | + |
| 949 | + }, |
| 950 | + params=None, |
| 951 | + allow_redirects=False, |
| 952 | + verify=True, |
| 953 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 954 | + ) |
| 955 | + |
| 956 | + def test_auth_management_key_with_refresh_token(self): |
| 957 | + auth_mgmt_key = "test-auth-mgmt-key" |
| 958 | + client = DescopeClient( |
| 959 | + self.dummy_project_id, |
| 960 | + self.public_key_dict, |
| 961 | + auth_management_key=auth_mgmt_key, |
| 962 | + ) |
| 963 | + |
| 964 | + # Test with refresh token function |
| 965 | + refresh_token = "test_refresh_token" |
| 966 | + with patch("requests.post") as mock_post: |
| 967 | + my_mock_response = mock.Mock() |
| 968 | + my_mock_response.ok = True |
| 969 | + my_mock_response.json.return_value = {"maskedEmail": "n***@example.com"} |
| 970 | + mock_post.return_value = my_mock_response |
| 971 | + |
| 972 | + client.otp.update_user_email( |
| 973 | + |
| 974 | + ) |
| 975 | + |
| 976 | + mock_post.assert_called_with( |
| 977 | + f"{common.DEFAULT_BASE_URL}{EndpointsV1.update_user_email_otp_path}", |
| 978 | + headers={ |
| 979 | + **common.default_headers, |
| 980 | + "Authorization": f"Bearer {self.dummy_project_id}:{refresh_token}:{auth_mgmt_key}", |
| 981 | + "x-descope-project-id": self.dummy_project_id, |
| 982 | + }, |
| 983 | + json={ |
| 984 | + |
| 985 | + |
| 986 | + "addToLoginIDs": False, |
| 987 | + "onMergeUseExisting": False, |
| 988 | + }, |
| 989 | + allow_redirects=False, |
| 990 | + verify=True, |
| 991 | + params=None, |
| 992 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 993 | + ) |
| 994 | + |
| 995 | + # Test without auth_management_key for comparison |
| 996 | + client_no_auth = DescopeClient(self.dummy_project_id, self.public_key_dict) |
| 997 | + with patch("requests.post") as mock_post: |
| 998 | + my_mock_response = mock.Mock() |
| 999 | + my_mock_response.ok = True |
| 1000 | + my_mock_response.json.return_value = {"maskedEmail": "n***@example.com"} |
| 1001 | + mock_post.return_value = my_mock_response |
| 1002 | + |
| 1003 | + client_no_auth.otp.update_user_email( |
| 1004 | + |
| 1005 | + ) |
| 1006 | + |
| 1007 | + mock_post.assert_called_with( |
| 1008 | + f"{common.DEFAULT_BASE_URL}{EndpointsV1.update_user_email_otp_path}", |
| 1009 | + headers={ |
| 1010 | + **common.default_headers, |
| 1011 | + "Authorization": f"Bearer {self.dummy_project_id}:{refresh_token}", |
| 1012 | + "x-descope-project-id": self.dummy_project_id, |
| 1013 | + }, |
| 1014 | + json={ |
| 1015 | + |
| 1016 | + |
| 1017 | + "addToLoginIDs": False, |
| 1018 | + "onMergeUseExisting": False, |
| 1019 | + }, |
| 1020 | + allow_redirects=False, |
| 1021 | + verify=True, |
| 1022 | + params=None, |
| 1023 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 1024 | + ) |
| 1025 | + |
844 | 1026 |
|
845 | 1027 | if __name__ == "__main__":
|
846 | 1028 | unittest.main()
|
0 commit comments