Skip to content
Snippets Groups Projects
Commit 66afa24b authored by Nimisha Asthagiri's avatar Nimisha Asthagiri
Browse files

Authn: Remove unneeded openid-configuration View

parent c68a5a3f
Branches
Tags
No related merge requests found
......@@ -646,34 +646,3 @@ class TestRevokeTokenView(AccessTokenLoginMixin, _DispatchingViewTestCase): # p
Tests invalidation/revoke of user access token for django-oauth-toolkit
"""
self.verify_revoke_token(self.access_token)
@unittest.skipUnless(OAUTH_PROVIDER_ENABLED, 'OAuth2 not enabled')
class ProviderInfoViewTests(TestCase):
DOMAIN = 'testserver.fake'
def build_url(self, path):
return 'http://{domain}{path}'.format(domain=self.DOMAIN, path=path)
def test_get(self):
issuer = 'test-issuer'
self.client = self.client_class(SERVER_NAME=self.DOMAIN)
expected = {
'issuer': issuer,
'authorization_endpoint': self.build_url(reverse('authorize')),
'token_endpoint': self.build_url(reverse('access_token')),
'end_session_endpoint': self.build_url(reverse('logout')),
'token_endpoint_auth_methods_supported': ['client_secret_post'],
'access_token_signing_alg_values_supported': ['RS512', 'HS256'],
'scopes_supported': ['openid', 'profile', 'email'],
'claims_supported': ['sub', 'iss', 'name', 'given_name', 'family_name', 'email'],
'jwks_uri': self.build_url(reverse('jwks')),
}
with override_settings(JWT_AUTH={'JWT_ISSUER': issuer}):
response = self.client.get(reverse('openid-config'))
self.assertEqual(response.status_code, 200)
actual = json.loads(response.content)
self.assertEqual(actual, expected)
......@@ -12,7 +12,6 @@ urlpatterns = [
url(r'^authorize/?$', csrf_exempt(views.AuthorizationView.as_view()), name='authorize'),
url(r'^access_token/?$', csrf_exempt(views.AccessTokenView.as_view()), name='access_token'),
url(r'^revoke_token/?$', csrf_exempt(views.RevokeTokenView.as_view()), name='revoke_token'),
url(r'^\.well-known/openid-configuration/?$', views.ProviderInfoView.as_view(), name='openid-config'),
]
if settings.FEATURES.get('ENABLE_THIRD_PARTY_AUTH'):
......
......@@ -185,22 +185,3 @@ class RevokeTokenView(_DispatchingView):
Dispatch to the RevokeTokenView of django-oauth-toolkit
"""
dot_view = dot_views.RevokeTokenView
class ProviderInfoView(View):
def get(self, request, *args, **kwargs):
data = {
'issuer': settings.JWT_AUTH['JWT_ISSUER'],
'authorization_endpoint': request.build_absolute_uri(reverse('authorize')),
'token_endpoint': request.build_absolute_uri(reverse('access_token')),
'end_session_endpoint': request.build_absolute_uri(reverse('logout')),
'token_endpoint_auth_methods_supported': ['client_secret_post'],
# NOTE (CCB): This is not part of the OpenID Connect standard. It is added here since we
# use JWS for our access tokens.
'access_token_signing_alg_values_supported': ['RS512', 'HS256'],
'scopes_supported': ['openid', 'profile', 'email'],
'claims_supported': ['sub', 'iss', 'name', 'given_name', 'family_name', 'email'],
'jwks_uri': request.build_absolute_uri(reverse('jwks')),
}
response = JsonResponse(data)
return response
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment