@@ -67,8 +67,7 @@ def test_oauth_authorize_invalid_url(self):
67
67
68
68
def test_oauth_authorize_valid_url (self ):
69
69
rv = self .client .get (authorize_url )
70
- # valid
71
- assert '</form>' in u (rv .data )
70
+ assert b'</form>' in rv .data
72
71
73
72
rv = self .client .post (authorize_url , data = dict (
74
73
confirm = 'no'
@@ -92,27 +91,27 @@ def test_oauth_authorize_valid_url(self):
92
91
def test_get_access_token (self ):
93
92
rv = self .client .post (authorize_url , data = {'confirm' : 'yes' })
94
93
rv = self .client .get (clean_url (rv .location ))
95
- assert 'access_token' in u ( rv .data )
94
+ assert b 'access_token' in rv .data
96
95
97
96
def test_full_flow (self ):
98
97
rv = self .client .post (authorize_url , data = {'confirm' : 'yes' })
99
98
rv = self .client .get (clean_url (rv .location ))
100
- assert 'access_token' in u ( rv .data )
99
+ assert b 'access_token' in rv .data
101
100
102
101
rv = self .client .get ('/' )
103
- assert 'username' in u ( rv .data )
102
+ assert b 'username' in rv .data
104
103
105
104
rv = self .client .get ('/address' )
106
105
assert rv .status_code == 403
107
106
108
107
rv = self .client .get ('/method/post' )
109
- assert 'POST' in u ( rv .data )
108
+ assert b 'POST' in rv .data
110
109
111
110
rv = self .client .get ('/method/put' )
112
- assert 'PUT' in u ( rv .data )
111
+ assert b 'PUT' in rv .data
113
112
114
113
rv = self .client .get ('/method/delete' )
115
- assert 'DELETE' in u ( rv .data )
114
+ assert b 'DELETE' in rv .data
116
115
117
116
def test_invalid_client_id (self ):
118
117
authorize_url = (
@@ -122,7 +121,7 @@ def test_invalid_client_id(self):
122
121
)
123
122
rv = self .client .post (authorize_url , data = {'confirm' : 'yes' })
124
123
rv = self .client .get (clean_url (rv .location ))
125
- assert 'Invalid' in u ( rv .data )
124
+ assert b 'Invalid' in rv .data
126
125
127
126
def test_invalid_response_type (self ):
128
127
authorize_url = (
@@ -132,7 +131,7 @@ def test_invalid_response_type(self):
132
131
)
133
132
rv = self .client .post (authorize_url , data = {'confirm' : 'yes' })
134
133
rv = self .client .get (clean_url (rv .location ))
135
- assert 'error' in u ( rv .data )
134
+ assert b 'error' in rv .data
136
135
137
136
138
137
class TestWebAuthCached (TestWebAuth ):
@@ -158,8 +157,8 @@ def test_get_access_token(self):
158
157
rv = self .client .get (url , headers = {
159
158
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
160
159
}, data = {'confirm' : 'yes' })
161
- assert 'access_token' in u ( rv .data )
162
- assert 'state' in u ( rv .data )
160
+ assert b 'access_token' in rv .data
161
+ assert b 'state' in rv .data
163
162
164
163
def test_invalid_user_credentials (self ):
165
164
url = ('/oauth/token?grant_type=password&state=foo'
@@ -168,7 +167,7 @@ def test_invalid_user_credentials(self):
168
167
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
169
168
}, data = {'confirm' : 'yes' })
170
169
171
- assert 'Invalid credentials given' in u ( rv .data )
170
+ assert b 'Invalid credentials given' in rv .data
172
171
173
172
174
173
class TestPasswordAuthCached (TestPasswordAuth ):
@@ -194,7 +193,7 @@ def test_refresh_token_in_password_grant(self):
194
193
rv = self .client .get (url , headers = {
195
194
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
196
195
})
197
- assert 'access_token' in u ( rv .data )
196
+ assert b 'access_token' in rv .data
198
197
data = json .loads (u (rv .data ))
199
198
200
199
args = (data .get ('scope' ).replace (' ' , '+' ),
@@ -205,7 +204,7 @@ def test_refresh_token_in_password_grant(self):
205
204
rv = self .client .get (url , headers = {
206
205
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
207
206
})
208
- assert 'access_token' in u ( rv .data )
207
+ assert b 'access_token' in rv .data
209
208
210
209
211
210
class TestRefreshTokenCached (TestRefreshToken ):
@@ -231,15 +230,15 @@ def test_get_access_token(self):
231
230
rv = self .client .get (url , headers = {
232
231
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
233
232
}, data = {'confirm' : 'yes' })
234
- assert 'access_token' in u ( rv .data )
233
+ assert b 'access_token' in rv .data
235
234
236
235
def test_invalid_auth_header (self ):
237
236
url = ('/oauth/token?grant_type=client_credentials'
238
237
'&scope=email+address&username=admin&password=admin' )
239
238
rv = self .client .get (url , headers = {
240
239
'HTTP_AUTHORIZATION' : 'Basic foobar'
241
240
}, data = {'confirm' : 'yes' })
242
- assert 'invalid_client' in u ( rv .data )
241
+ assert b 'invalid_client' in rv .data
243
242
244
243
def test_no_client (self ):
245
244
auth_code = _base64 ('none:confidential' )
@@ -248,7 +247,7 @@ def test_no_client(self):
248
247
rv = self .client .get (url , headers = {
249
248
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
250
249
}, data = {'confirm' : 'yes' })
251
- assert 'invalid_client' in u ( rv .data )
250
+ assert b 'invalid_client' in rv .data
252
251
253
252
def test_wrong_secret_client (self ):
254
253
auth_code = _base64 ('confidential:wrong' )
@@ -257,7 +256,7 @@ def test_wrong_secret_client(self):
257
256
rv = self .client .get (url , headers = {
258
257
'HTTP_AUTHORIZATION' : 'Basic %s' % auth_code ,
259
258
}, data = {'confirm' : 'yes' })
260
- assert 'invalid_client' in u ( rv .data )
259
+ assert b 'invalid_client' in rv .data
261
260
262
261
263
262
class TestCredentialAuthCached (TestCredentialAuth ):
@@ -285,4 +284,6 @@ def generator(request, refresh_token=False):
285
284
def test_get_access_token (self ):
286
285
rv = self .client .post (authorize_url , data = {'confirm' : 'yes' })
287
286
rv = self .client .get (clean_url (rv .location ))
288
- assert 'foobar' in u (rv .data )
287
+ data = json .loads (u (rv .data ))
288
+ assert data ['access_token' ] == 'foobar'
289
+ assert data ['refresh_token' ] == 'foobar'
0 commit comments