Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: fixing store_jwt view #185

Merged
merged 2 commits into from
Dec 18, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions django_descope/settings.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@
settings, "DESCOPE_WEB_COMPONENT_SRC", "https://unpkg.com/@descope/web-component"
)

MANAGEMENT_KEY = getattr(settings, "DESCOPE_MANAGEMENT_KEY", None)
PROJECT_ID = getattr(settings, "DESCOPE_PROJECT_ID", None)
MANAGEMENT_KEY = getattr(settings, "DESCOPE_MANAGEMENT_KEY", "")
PROJECT_ID = getattr(settings, "DESCOPE_PROJECT_ID", "")
if not PROJECT_ID:
raise ImproperlyConfigured('"DESCOPE_PROJECT_ID" is required!')

Expand Down
92 changes: 92 additions & 0 deletions django_descope/test_store_jwt.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,92 @@
import json
import logging
import random
import string

import descope
from descope import (
REFRESH_SESSION_COOKIE_NAME,
REFRESH_SESSION_TOKEN_NAME,
SESSION_COOKIE_NAME,
SESSION_TOKEN_NAME,
)
from django.contrib.auth.mixins import LoginRequiredMixin
from django.http import JsonResponse
from django.test import TestCase, override_settings
from django.urls import path, reverse
from django.views import View

from . import descope_client, urls

logger = logging.getLogger(__name__)


def random_string(N: int) -> str:
return "".join(random.choices(string.ascii_lowercase + string.digits, k=N))


class TestProtectedView(LoginRequiredMixin, View):
def get(self, request):
return JsonResponse({"success": True})


urls.urlpatterns = urls.urlpatterns + [
path("test", TestProtectedView.as_view(), name="test_protected_view"),
]


@override_settings(ROOT_URLCONF=urls)
class StoreJwtTestCase(TestCase):
delivery_method = descope.DeliveryMethod.EMAIL
login_id = f"test+{random_string(8)}@test.internal"
token: dict

def setUp(self) -> None:
descope_client.mgmt.user.create_test_user(
self.login_id, role_names=["is_staff", "is_superuser"], verified_email=True
)
resp = descope_client.mgmt.user.generate_otp_for_test_user(
self.delivery_method,
self.login_id,
)
self.token = descope_client.otp.verify_code(
self.delivery_method, self.login_id, resp.get("code")
)

def test_store_jwt(self):
"""Test the store_jwt view"""

# should fail without a session
res = self.client.get(reverse("test_protected_view"))
self.assertNotEqual(res.status_code, 200)

# lets store the jwt
res = self.client.post(
reverse("store_jwt"),
{
SESSION_COOKIE_NAME: self.token[SESSION_TOKEN_NAME]["jwt"],
REFRESH_SESSION_COOKIE_NAME: self.token[REFRESH_SESSION_TOKEN_NAME][
"jwt"
],
},
)
self.assertEqual(res.status_code, 200)

debug = json.loads(res.content)
self.assertEqual(debug["success"], True)
session = self.client.session
self.assertEqual( # ensure the session was updated
session[SESSION_COOKIE_NAME], self.token[SESSION_TOKEN_NAME]["jwt"]
)
self.assertEqual( # ensure the session was updated
session[REFRESH_SESSION_COOKIE_NAME],
self.token[REFRESH_SESSION_TOKEN_NAME]["jwt"],
)

# should succeed with a session
res = self.client.get(reverse("test_protected_view"))
self.assertEqual(res.status_code, 200)
self.assertEqual(debug["success"], True)

def tearDown(self) -> None:
descope_client.mgmt.user.delete(self.login_id)
2 changes: 1 addition & 1 deletion django_descope/views.py
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ def post(self, request: HttpRequest):
refresh = request.POST.get(REFRESH_SESSION_COOKIE_NAME)

if session and refresh:
add_tokens_to_request(request, session, refresh)
add_tokens_to_request(request.session, session, refresh)
return JsonResponse({"success": True})

return HttpResponseBadRequest()
Loading