Skip to content

Commit d7f7353

Browse files
committed
doc: update documentation to canaille 0.0.54
1 parent 59a0a94 commit d7f7353

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

doc/client-applications.rst

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -29,19 +29,19 @@ IAM server for your tests. Optionnally you can put them in pytest fixtures so th
2929
emails=["[email protected]"],
3030
password="password",
3131
)
32-
user.save()
32+
iam_server.backend.save(user)
3333
yield user
34-
user.delete()
34+
iam_server.backend.delete(user)
3535
3636
@pytest.fixture
3737
def group(iam_server, user):
3838
group = iam_server.models.Group(
3939
display_name="group",
4040
members=[user],
4141
)
42-
group.save()
42+
iam_server.backend.save(group)
4343
yield group
44-
group.delete()
44+
iam_server.backend.delete(group)
4545
4646
If you don't care about the data your users and group, you can use the available random generation utilities.
4747

@@ -50,17 +50,17 @@ If you don't care about the data your users and group, you can use the available
5050
@pytest.fixture
5151
def user(iam_server):
5252
user = iam_server.random_user()
53-
user.save()
53+
iam_server.backend.save(user)
5454
yield user
55-
user.delete()
55+
iam_server.backend.delete(user)
5656
5757
@pytest.fixture
5858
def group(iam_server, user):
5959
group = iam_server.random_group()
6060
group.members = group.members + [user]
61-
group.save()
61+
iam_server.backend.save(group)
6262
yield group
63-
group.delete()
63+
iam_server.backend.delete(group)
6464
6565
OIDC Client registration
6666
~~~~~~~~~~~~~~~~~~~~~~~~
@@ -84,9 +84,9 @@ model. Let us suppose your application have a ``/authorize`` endpoint for the au
8484
token_endpoint_auth_method="client_secret_basic",
8585
scope=["openid", "profile", "groups"],
8686
)
87-
inst.save()
87+
iam_server.backend.save(inst)
8888
yield inst
89-
inst.delete()
89+
iam_server.backend.delete(inst)
9090
9191
Note that the IAM implements the `OAuth2/OIDC dynamic client registration protocol <https://datatracker.ietf.org/doc/html/rfc7591>`_,
9292
thus you might not need a client fixture if your application dynamically register one. No *initial token* is needed to use dynamic

0 commit comments

Comments
 (0)