21
21
from oidcmsg .exception import MissingRequiredAttribute
22
22
from oidcmsg .exception import NotAllowedValue
23
23
from oidcmsg .exception import OidcMsgError
24
- from oidcmsg .oauth2 import ROPCAccessTokenRequest
25
24
from oidcmsg .oauth2 import ResponseMessage
25
+ from oidcmsg .oauth2 import ROPCAccessTokenRequest
26
+ from oidcmsg .oidc import JRD
26
27
from oidcmsg .oidc import AccessTokenRequest
27
28
from oidcmsg .oidc import AccessTokenResponse
28
29
from oidcmsg .oidc import AddressClaim
35
36
from oidcmsg .oidc import Claims
36
37
from oidcmsg .oidc import DiscoveryRequest
37
38
from oidcmsg .oidc import IdToken
38
- from oidcmsg .oidc import JRD
39
39
from oidcmsg .oidc import Link
40
40
from oidcmsg .oidc import OpenIDSchema
41
41
from oidcmsg .oidc import ProviderConfigurationResponse
@@ -475,11 +475,9 @@ def test_required_parameters(self, required_param):
475
475
"authorization_endpoint" :
476
476
"https://server.example.com/connect/authorize" ,
477
477
"jwks_uri" : "https://server.example.com/jwks.json" ,
478
- "response_types_supported" : ["code" , "code id_token" , "id_token" ,
479
- "token id_token" ],
478
+ "response_types_supported" : ["code" , "code id_token" , "id_token" , "token id_token" ],
480
479
"subject_types_supported" : ["public" , "pairwise" ],
481
- "id_token_signing_alg_values_supported" : ["RS256" , "ES256" ,
482
- "HS256" ],
480
+ "id_token_signing_alg_values_supported" : ["RS256" , "ES256" , "HS256" ],
483
481
}
484
482
485
483
del provider_config [required_param ]
@@ -494,8 +492,7 @@ def test_token_endpoint_is_not_required_for_implicit_flow_only(self):
494
492
"jwks_uri" : "https://server.example.com/jwks.json" ,
495
493
"response_types_supported" : ["id_token" , "token id_token" ],
496
494
"subject_types_supported" : ["public" , "pairwise" ],
497
- "id_token_signing_alg_values_supported" : ["RS256" , "ES256" ,
498
- "HS256" ],
495
+ "id_token_signing_alg_values_supported" : ["RS256" , "ES256" , "HS256" ],
499
496
}
500
497
501
498
# should not raise an exception
@@ -547,8 +544,7 @@ def test_registration_request(self):
547
544
req = RegistrationRequest (operation = "register" , default_max_age = 10 ,
548
545
require_auth_time = True , default_acr = "foo" ,
549
546
application_type = "web" ,
550
- redirect_uris = [
551
- "https://example.com/authz_cb" ])
547
+ redirect_uris = ["https://example.com/authz_cb" ])
552
548
assert req .verify ()
553
549
js = req .to_json ()
554
550
js_obj = json .loads (js )
@@ -570,11 +566,9 @@ def test_registration_request(self):
570
566
"id_token_encrypted_response_enc" ,
571
567
"userinfo_encrypted_response_enc" ,
572
568
])
573
- def test_registration_request_with_coupled_encryption_params (self ,
574
- enc_param ):
569
+ def test_registration_request_with_coupled_encryption_params (self , enc_param ):
575
570
registration_params = {
576
- "redirect_uris" : ["https://example.com/authz_cb" ],
577
- enc_param : "RS25asdasd6"
571
+ "redirect_uris" : ["https://example.com/authz_cb" ], enc_param : "RS256"
578
572
}
579
573
registration_req = RegistrationRequest (** registration_params )
580
574
with pytest .raises (MissingRequiredAttribute ):
@@ -745,8 +739,8 @@ def test_request(self):
745
739
ar = AuthorizationRequest (** args )
746
740
keyjar = KeyJar ()
747
741
keyjar .add_symmetric ('' , "SomeTestPassword" )
748
- _signed_jwt = make_openid_request ( ar , keyjar , 'foobar' , 'HS256' ,
749
- 'barfoo' )
742
+ keyjar . add_symmetric ( 'foobar' , "SomeTestPassword" )
743
+ _signed_jwt = make_openid_request ( ar , keyjar , 'foobar' , 'HS256' , 'barfoo' )
750
744
ar ['request' ] = _signed_jwt
751
745
del ar ['nonce' ]
752
746
del ar ['extra' ]
0 commit comments