From 3b2e891917dd2739659643cedb5258e65d54934d Mon Sep 17 00:00:00 2001 From: Hylke Postma <20515386+hylkepostma@users.noreply.github.com> Date: Thu, 29 Jul 2021 12:30:48 +0200 Subject: [PATCH] =?UTF-8?q?=E2=9C=A8=20Add=20`description`=20parameter=20t?= =?UTF-8?q?o=20all=20the=20security=20scheme=20classes,=20e.g.=20`APIKeyQu?= =?UTF-8?q?ery(name=3D"key",=20description=3D"A=20very=20cool=20API=20key"?= =?UTF-8?q?)`=20(#1757)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: Hylke Postma Co-authored-by: Sebastián Ramírez --- fastapi/security/api_key.py | 33 ++- fastapi/security/http.py | 25 +- fastapi/security/oauth2.py | 19 +- fastapi/security/open_id_connect_url.py | 5 +- ...est_security_api_key_cookie_description.py | 73 +++++ ...est_security_api_key_header_description.py | 73 +++++ ...test_security_api_key_query_description.py | 73 +++++ tests/test_security_http_base_description.py | 62 +++++ ...t_security_http_basic_realm_description.py | 85 ++++++ .../test_security_http_bearer_description.py | 68 +++++ .../test_security_http_digest_description.py | 70 +++++ ...2_authorization_code_bearer_description.py | 81 ++++++ ...st_security_oauth2_optional_description.py | 255 ++++++++++++++++++ ...h2_password_bearer_optional_description.py | 76 ++++++ ...est_security_openid_connect_description.py | 80 ++++++ 15 files changed, 1062 insertions(+), 16 deletions(-) create mode 100644 tests/test_security_api_key_cookie_description.py create mode 100644 tests/test_security_api_key_header_description.py create mode 100644 tests/test_security_api_key_query_description.py create mode 100644 tests/test_security_http_base_description.py create mode 100644 tests/test_security_http_basic_realm_description.py create mode 100644 tests/test_security_http_bearer_description.py create mode 100644 tests/test_security_http_digest_description.py create mode 100644 tests/test_security_oauth2_authorization_code_bearer_description.py create mode 100644 tests/test_security_oauth2_optional_description.py create mode 100644 tests/test_security_oauth2_password_bearer_optional_description.py create mode 100644 tests/test_security_openid_connect_description.py diff --git a/fastapi/security/api_key.py b/fastapi/security/api_key.py index e4dacb389..36ab60e30 100644 --- a/fastapi/security/api_key.py +++ b/fastapi/security/api_key.py @@ -13,9 +13,16 @@ class APIKeyBase(SecurityBase): class APIKeyQuery(APIKeyBase): def __init__( - self, *, name: str, scheme_name: Optional[str] = None, auto_error: bool = True + self, + *, + name: str, + scheme_name: Optional[str] = None, + description: Optional[str] = None, + auto_error: bool = True ): - self.model: APIKey = APIKey(**{"in": APIKeyIn.query}, name=name) + self.model: APIKey = APIKey( + **{"in": APIKeyIn.query}, name=name, description=description + ) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error @@ -33,9 +40,16 @@ class APIKeyQuery(APIKeyBase): class APIKeyHeader(APIKeyBase): def __init__( - self, *, name: str, scheme_name: Optional[str] = None, auto_error: bool = True + self, + *, + name: str, + scheme_name: Optional[str] = None, + description: Optional[str] = None, + auto_error: bool = True ): - self.model: APIKey = APIKey(**{"in": APIKeyIn.header}, name=name) + self.model: APIKey = APIKey( + **{"in": APIKeyIn.header}, name=name, description=description + ) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error @@ -53,9 +67,16 @@ class APIKeyHeader(APIKeyBase): class APIKeyCookie(APIKeyBase): def __init__( - self, *, name: str, scheme_name: Optional[str] = None, auto_error: bool = True + self, + *, + name: str, + scheme_name: Optional[str] = None, + description: Optional[str] = None, + auto_error: bool = True ): - self.model: APIKey = APIKey(**{"in": APIKeyIn.cookie}, name=name) + self.model: APIKey = APIKey( + **{"in": APIKeyIn.cookie}, name=name, description=description + ) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error diff --git a/fastapi/security/http.py b/fastapi/security/http.py index 3258bd058..1b473c69e 100644 --- a/fastapi/security/http.py +++ b/fastapi/security/http.py @@ -24,9 +24,14 @@ class HTTPAuthorizationCredentials(BaseModel): class HTTPBase(SecurityBase): def __init__( - self, *, scheme: str, scheme_name: Optional[str] = None, auto_error: bool = True + self, + *, + scheme: str, + scheme_name: Optional[str] = None, + description: Optional[str] = None, + auto_error: bool = True, ): - self.model = HTTPBaseModel(scheme=scheme) + self.model = HTTPBaseModel(scheme=scheme, description=description) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error @@ -51,9 +56,10 @@ class HTTPBasic(HTTPBase): *, scheme_name: Optional[str] = None, realm: Optional[str] = None, + description: Optional[str] = None, auto_error: bool = True, ): - self.model = HTTPBaseModel(scheme="basic") + self.model = HTTPBaseModel(scheme="basic", description=description) self.scheme_name = scheme_name or self.__class__.__name__ self.realm = realm self.auto_error = auto_error @@ -97,9 +103,10 @@ class HTTPBearer(HTTPBase): *, bearerFormat: Optional[str] = None, scheme_name: Optional[str] = None, + description: Optional[str] = None, auto_error: bool = True, ): - self.model = HTTPBearerModel(bearerFormat=bearerFormat) + self.model = HTTPBearerModel(bearerFormat=bearerFormat, description=description) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error @@ -127,8 +134,14 @@ class HTTPBearer(HTTPBase): class HTTPDigest(HTTPBase): - def __init__(self, *, scheme_name: Optional[str] = None, auto_error: bool = True): - self.model = HTTPBaseModel(scheme="digest") + def __init__( + self, + *, + scheme_name: Optional[str] = None, + description: Optional[str] = None, + auto_error: bool = True, + ): + self.model = HTTPBaseModel(scheme="digest", description=description) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error diff --git a/fastapi/security/oauth2.py b/fastapi/security/oauth2.py index 46571ad53..bdc6e2ea9 100644 --- a/fastapi/security/oauth2.py +++ b/fastapi/security/oauth2.py @@ -118,9 +118,10 @@ class OAuth2(SecurityBase): *, flows: Union[OAuthFlowsModel, Dict[str, Dict[str, Any]]] = OAuthFlowsModel(), scheme_name: Optional[str] = None, + description: Optional[str] = None, auto_error: Optional[bool] = True ): - self.model = OAuth2Model(flows=flows) + self.model = OAuth2Model(flows=flows, description=description) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error @@ -142,12 +143,18 @@ class OAuth2PasswordBearer(OAuth2): tokenUrl: str, scheme_name: Optional[str] = None, scopes: Optional[Dict[str, str]] = None, + description: Optional[str] = None, auto_error: bool = True, ): if not scopes: scopes = {} flows = OAuthFlowsModel(password={"tokenUrl": tokenUrl, "scopes": scopes}) - super().__init__(flows=flows, scheme_name=scheme_name, auto_error=auto_error) + super().__init__( + flows=flows, + scheme_name=scheme_name, + description=description, + auto_error=auto_error, + ) async def __call__(self, request: Request) -> Optional[str]: authorization: str = request.headers.get("Authorization") @@ -172,6 +179,7 @@ class OAuth2AuthorizationCodeBearer(OAuth2): refreshUrl: Optional[str] = None, scheme_name: Optional[str] = None, scopes: Optional[Dict[str, str]] = None, + description: Optional[str] = None, auto_error: bool = True, ): if not scopes: @@ -184,7 +192,12 @@ class OAuth2AuthorizationCodeBearer(OAuth2): "scopes": scopes, } ) - super().__init__(flows=flows, scheme_name=scheme_name, auto_error=auto_error) + super().__init__( + flows=flows, + scheme_name=scheme_name, + description=description, + auto_error=auto_error, + ) async def __call__(self, request: Request) -> Optional[str]: authorization: str = request.headers.get("Authorization") diff --git a/fastapi/security/open_id_connect_url.py b/fastapi/security/open_id_connect_url.py index a98c13f8a..dfe9f7b25 100644 --- a/fastapi/security/open_id_connect_url.py +++ b/fastapi/security/open_id_connect_url.py @@ -13,9 +13,12 @@ class OpenIdConnect(SecurityBase): *, openIdConnectUrl: str, scheme_name: Optional[str] = None, + description: Optional[str] = None, auto_error: bool = True ): - self.model = OpenIdConnectModel(openIdConnectUrl=openIdConnectUrl) + self.model = OpenIdConnectModel( + openIdConnectUrl=openIdConnectUrl, description=description + ) self.scheme_name = scheme_name or self.__class__.__name__ self.auto_error = auto_error diff --git a/tests/test_security_api_key_cookie_description.py b/tests/test_security_api_key_cookie_description.py new file mode 100644 index 000000000..2cd3565b4 --- /dev/null +++ b/tests/test_security_api_key_cookie_description.py @@ -0,0 +1,73 @@ +from fastapi import Depends, FastAPI, Security +from fastapi.security import APIKeyCookie +from fastapi.testclient import TestClient +from pydantic import BaseModel + +app = FastAPI() + +api_key = APIKeyCookie(name="key", description="An API Cookie Key") + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: str = Security(api_key)): + user = User(username=oauth_header) + return user + + +@app.get("/users/me") +def read_current_user(current_user: User = Depends(get_current_user)): + return current_user + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"APIKeyCookie": []}], + } + } + }, + "components": { + "securitySchemes": { + "APIKeyCookie": { + "type": "apiKey", + "name": "key", + "in": "cookie", + "description": "An API Cookie Key", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_api_key(): + response = client.get("/users/me", cookies={"key": "secret"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "secret"} + + +def test_security_api_key_no_key(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} diff --git a/tests/test_security_api_key_header_description.py b/tests/test_security_api_key_header_description.py new file mode 100644 index 000000000..cc9802708 --- /dev/null +++ b/tests/test_security_api_key_header_description.py @@ -0,0 +1,73 @@ +from fastapi import Depends, FastAPI, Security +from fastapi.security import APIKeyHeader +from fastapi.testclient import TestClient +from pydantic import BaseModel + +app = FastAPI() + +api_key = APIKeyHeader(name="key", description="An API Key Header") + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: str = Security(api_key)): + user = User(username=oauth_header) + return user + + +@app.get("/users/me") +def read_current_user(current_user: User = Depends(get_current_user)): + return current_user + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"APIKeyHeader": []}], + } + } + }, + "components": { + "securitySchemes": { + "APIKeyHeader": { + "type": "apiKey", + "name": "key", + "in": "header", + "description": "An API Key Header", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_api_key(): + response = client.get("/users/me", headers={"key": "secret"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "secret"} + + +def test_security_api_key_no_key(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} diff --git a/tests/test_security_api_key_query_description.py b/tests/test_security_api_key_query_description.py new file mode 100644 index 000000000..9b608233a --- /dev/null +++ b/tests/test_security_api_key_query_description.py @@ -0,0 +1,73 @@ +from fastapi import Depends, FastAPI, Security +from fastapi.security import APIKeyQuery +from fastapi.testclient import TestClient +from pydantic import BaseModel + +app = FastAPI() + +api_key = APIKeyQuery(name="key", description="API Key Query") + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: str = Security(api_key)): + user = User(username=oauth_header) + return user + + +@app.get("/users/me") +def read_current_user(current_user: User = Depends(get_current_user)): + return current_user + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"APIKeyQuery": []}], + } + } + }, + "components": { + "securitySchemes": { + "APIKeyQuery": { + "type": "apiKey", + "name": "key", + "in": "query", + "description": "API Key Query", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_api_key(): + response = client.get("/users/me?key=secret") + assert response.status_code == 200, response.text + assert response.json() == {"username": "secret"} + + +def test_security_api_key_no_key(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} diff --git a/tests/test_security_http_base_description.py b/tests/test_security_http_base_description.py new file mode 100644 index 000000000..5855e8df4 --- /dev/null +++ b/tests/test_security_http_base_description.py @@ -0,0 +1,62 @@ +from fastapi import FastAPI, Security +from fastapi.security.http import HTTPAuthorizationCredentials, HTTPBase +from fastapi.testclient import TestClient + +app = FastAPI() + +security = HTTPBase(scheme="Other", description="Other Security Scheme") + + +@app.get("/users/me") +def read_current_user(credentials: HTTPAuthorizationCredentials = Security(security)): + return {"scheme": credentials.scheme, "credentials": credentials.credentials} + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"HTTPBase": []}], + } + } + }, + "components": { + "securitySchemes": { + "HTTPBase": { + "type": "http", + "scheme": "Other", + "description": "Other Security Scheme", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_http_base(): + response = client.get("/users/me", headers={"Authorization": "Other foobar"}) + assert response.status_code == 200, response.text + assert response.json() == {"scheme": "Other", "credentials": "foobar"} + + +def test_security_http_base_no_credentials(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} diff --git a/tests/test_security_http_basic_realm_description.py b/tests/test_security_http_basic_realm_description.py new file mode 100644 index 000000000..6ff9d9d07 --- /dev/null +++ b/tests/test_security_http_basic_realm_description.py @@ -0,0 +1,85 @@ +from base64 import b64encode + +from fastapi import FastAPI, Security +from fastapi.security import HTTPBasic, HTTPBasicCredentials +from fastapi.testclient import TestClient +from requests.auth import HTTPBasicAuth + +app = FastAPI() + +security = HTTPBasic(realm="simple", description="HTTPBasic scheme") + + +@app.get("/users/me") +def read_current_user(credentials: HTTPBasicCredentials = Security(security)): + return {"username": credentials.username, "password": credentials.password} + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"HTTPBasic": []}], + } + } + }, + "components": { + "securitySchemes": { + "HTTPBasic": { + "type": "http", + "scheme": "basic", + "description": "HTTPBasic scheme", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_http_basic(): + auth = HTTPBasicAuth(username="john", password="secret") + response = client.get("/users/me", auth=auth) + assert response.status_code == 200, response.text + assert response.json() == {"username": "john", "password": "secret"} + + +def test_security_http_basic_no_credentials(): + response = client.get("/users/me") + assert response.json() == {"detail": "Not authenticated"} + assert response.status_code == 401, response.text + assert response.headers["WWW-Authenticate"] == 'Basic realm="simple"' + + +def test_security_http_basic_invalid_credentials(): + response = client.get( + "/users/me", headers={"Authorization": "Basic notabase64token"} + ) + assert response.status_code == 401, response.text + assert response.headers["WWW-Authenticate"] == 'Basic realm="simple"' + assert response.json() == {"detail": "Invalid authentication credentials"} + + +def test_security_http_basic_non_basic_credentials(): + payload = b64encode(b"johnsecret").decode("ascii") + auth_header = f"Basic {payload}" + response = client.get("/users/me", headers={"Authorization": auth_header}) + assert response.status_code == 401, response.text + assert response.headers["WWW-Authenticate"] == 'Basic realm="simple"' + assert response.json() == {"detail": "Invalid authentication credentials"} diff --git a/tests/test_security_http_bearer_description.py b/tests/test_security_http_bearer_description.py new file mode 100644 index 000000000..132e720fc --- /dev/null +++ b/tests/test_security_http_bearer_description.py @@ -0,0 +1,68 @@ +from fastapi import FastAPI, Security +from fastapi.security import HTTPAuthorizationCredentials, HTTPBearer +from fastapi.testclient import TestClient + +app = FastAPI() + +security = HTTPBearer(description="HTTP Bearer token scheme") + + +@app.get("/users/me") +def read_current_user(credentials: HTTPAuthorizationCredentials = Security(security)): + return {"scheme": credentials.scheme, "credentials": credentials.credentials} + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"HTTPBearer": []}], + } + } + }, + "components": { + "securitySchemes": { + "HTTPBearer": { + "type": "http", + "scheme": "bearer", + "description": "HTTP Bearer token scheme", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_http_bearer(): + response = client.get("/users/me", headers={"Authorization": "Bearer foobar"}) + assert response.status_code == 200, response.text + assert response.json() == {"scheme": "Bearer", "credentials": "foobar"} + + +def test_security_http_bearer_no_credentials(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} + + +def test_security_http_bearer_incorrect_scheme_credentials(): + response = client.get("/users/me", headers={"Authorization": "Basic notreally"}) + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Invalid authentication credentials"} diff --git a/tests/test_security_http_digest_description.py b/tests/test_security_http_digest_description.py new file mode 100644 index 000000000..d00aa1b6e --- /dev/null +++ b/tests/test_security_http_digest_description.py @@ -0,0 +1,70 @@ +from fastapi import FastAPI, Security +from fastapi.security import HTTPAuthorizationCredentials, HTTPDigest +from fastapi.testclient import TestClient + +app = FastAPI() + +security = HTTPDigest(description="HTTPDigest scheme") + + +@app.get("/users/me") +def read_current_user(credentials: HTTPAuthorizationCredentials = Security(security)): + return {"scheme": credentials.scheme, "credentials": credentials.credentials} + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"HTTPDigest": []}], + } + } + }, + "components": { + "securitySchemes": { + "HTTPDigest": { + "type": "http", + "scheme": "digest", + "description": "HTTPDigest scheme", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_http_digest(): + response = client.get("/users/me", headers={"Authorization": "Digest foobar"}) + assert response.status_code == 200, response.text + assert response.json() == {"scheme": "Digest", "credentials": "foobar"} + + +def test_security_http_digest_no_credentials(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} + + +def test_security_http_digest_incorrect_scheme_credentials(): + response = client.get( + "/users/me", headers={"Authorization": "Other invalidauthorization"} + ) + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Invalid authentication credentials"} diff --git a/tests/test_security_oauth2_authorization_code_bearer_description.py b/tests/test_security_oauth2_authorization_code_bearer_description.py new file mode 100644 index 000000000..bdaa543fc --- /dev/null +++ b/tests/test_security_oauth2_authorization_code_bearer_description.py @@ -0,0 +1,81 @@ +from typing import Optional + +from fastapi import FastAPI, Security +from fastapi.security import OAuth2AuthorizationCodeBearer +from fastapi.testclient import TestClient + +app = FastAPI() + +oauth2_scheme = OAuth2AuthorizationCodeBearer( + authorizationUrl="authorize", + tokenUrl="token", + description="OAuth2 Code Bearer", + auto_error=True, +) + + +@app.get("/items/") +async def read_items(token: Optional[str] = Security(oauth2_scheme)): + return {"token": token} + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/items/": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Items", + "operationId": "read_items_items__get", + "security": [{"OAuth2AuthorizationCodeBearer": []}], + } + } + }, + "components": { + "securitySchemes": { + "OAuth2AuthorizationCodeBearer": { + "type": "oauth2", + "flows": { + "authorizationCode": { + "authorizationUrl": "authorize", + "tokenUrl": "token", + "scopes": {}, + } + }, + "description": "OAuth2 Code Bearer", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_no_token(): + response = client.get("/items") + assert response.status_code == 401, response.text + assert response.json() == {"detail": "Not authenticated"} + + +def test_incorrect_token(): + response = client.get("/items", headers={"Authorization": "Non-existent testtoken"}) + assert response.status_code == 401, response.text + assert response.json() == {"detail": "Not authenticated"} + + +def test_token(): + response = client.get("/items", headers={"Authorization": "Bearer testtoken"}) + assert response.status_code == 200, response.text + assert response.json() == {"token": "testtoken"} diff --git a/tests/test_security_oauth2_optional_description.py b/tests/test_security_oauth2_optional_description.py new file mode 100644 index 000000000..011db65ec --- /dev/null +++ b/tests/test_security_oauth2_optional_description.py @@ -0,0 +1,255 @@ +from typing import Optional + +import pytest +from fastapi import Depends, FastAPI, Security +from fastapi.security import OAuth2, OAuth2PasswordRequestFormStrict +from fastapi.testclient import TestClient +from pydantic import BaseModel + +app = FastAPI() + +reusable_oauth2 = OAuth2( + flows={ + "password": { + "tokenUrl": "token", + "scopes": {"read:users": "Read the users", "write:users": "Create users"}, + } + }, + description="OAuth2 security scheme", + auto_error=False, +) + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: Optional[str] = Security(reusable_oauth2)): + if oauth_header is None: + return None + user = User(username=oauth_header) + return user + + +@app.post("/login") +def login(form_data: OAuth2PasswordRequestFormStrict = Depends()): + return form_data + + +@app.get("/users/me") +def read_users_me(current_user: Optional[User] = Depends(get_current_user)): + if current_user is None: + return {"msg": "Create an account first"} + return current_user + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/login": { + "post": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + }, + "422": { + "description": "Validation Error", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/HTTPValidationError" + } + } + }, + }, + }, + "summary": "Login", + "operationId": "login_login_post", + "requestBody": { + "content": { + "application/x-www-form-urlencoded": { + "schema": { + "$ref": "#/components/schemas/Body_login_login_post" + } + } + }, + "required": True, + }, + } + }, + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Users Me", + "operationId": "read_users_me_users_me_get", + "security": [{"OAuth2": []}], + } + }, + }, + "components": { + "schemas": { + "Body_login_login_post": { + "title": "Body_login_login_post", + "required": ["grant_type", "username", "password"], + "type": "object", + "properties": { + "grant_type": { + "title": "Grant Type", + "pattern": "password", + "type": "string", + }, + "username": {"title": "Username", "type": "string"}, + "password": {"title": "Password", "type": "string"}, + "scope": {"title": "Scope", "type": "string", "default": ""}, + "client_id": {"title": "Client Id", "type": "string"}, + "client_secret": {"title": "Client Secret", "type": "string"}, + }, + }, + "ValidationError": { + "title": "ValidationError", + "required": ["loc", "msg", "type"], + "type": "object", + "properties": { + "loc": { + "title": "Location", + "type": "array", + "items": {"type": "string"}, + }, + "msg": {"title": "Message", "type": "string"}, + "type": {"title": "Error Type", "type": "string"}, + }, + }, + "HTTPValidationError": { + "title": "HTTPValidationError", + "type": "object", + "properties": { + "detail": { + "title": "Detail", + "type": "array", + "items": {"$ref": "#/components/schemas/ValidationError"}, + } + }, + }, + }, + "securitySchemes": { + "OAuth2": { + "type": "oauth2", + "flows": { + "password": { + "scopes": { + "read:users": "Read the users", + "write:users": "Create users", + }, + "tokenUrl": "token", + } + }, + "description": "OAuth2 security scheme", + } + }, + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_oauth2(): + response = client.get("/users/me", headers={"Authorization": "Bearer footokenbar"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "Bearer footokenbar"} + + +def test_security_oauth2_password_other_header(): + response = client.get("/users/me", headers={"Authorization": "Other footokenbar"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "Other footokenbar"} + + +def test_security_oauth2_password_bearer_no_header(): + response = client.get("/users/me") + assert response.status_code == 200, response.text + assert response.json() == {"msg": "Create an account first"} + + +required_params = { + "detail": [ + { + "loc": ["body", "grant_type"], + "msg": "field required", + "type": "value_error.missing", + }, + { + "loc": ["body", "username"], + "msg": "field required", + "type": "value_error.missing", + }, + { + "loc": ["body", "password"], + "msg": "field required", + "type": "value_error.missing", + }, + ] +} + +grant_type_required = { + "detail": [ + { + "loc": ["body", "grant_type"], + "msg": "field required", + "type": "value_error.missing", + } + ] +} + +grant_type_incorrect = { + "detail": [ + { + "loc": ["body", "grant_type"], + "msg": 'string does not match regex "password"', + "type": "value_error.str.regex", + "ctx": {"pattern": "password"}, + } + ] +} + + +@pytest.mark.parametrize( + "data,expected_status,expected_response", + [ + (None, 422, required_params), + ({"username": "johndoe", "password": "secret"}, 422, grant_type_required), + ( + {"username": "johndoe", "password": "secret", "grant_type": "incorrect"}, + 422, + grant_type_incorrect, + ), + ( + {"username": "johndoe", "password": "secret", "grant_type": "password"}, + 200, + { + "grant_type": "password", + "username": "johndoe", + "password": "secret", + "scopes": [], + "client_id": None, + "client_secret": None, + }, + ), + ], +) +def test_strict_login(data, expected_status, expected_response): + response = client.post("/login", data=data) + assert response.status_code == expected_status + assert response.json() == expected_response diff --git a/tests/test_security_oauth2_password_bearer_optional_description.py b/tests/test_security_oauth2_password_bearer_optional_description.py new file mode 100644 index 000000000..9d6a862e3 --- /dev/null +++ b/tests/test_security_oauth2_password_bearer_optional_description.py @@ -0,0 +1,76 @@ +from typing import Optional + +from fastapi import FastAPI, Security +from fastapi.security import OAuth2PasswordBearer +from fastapi.testclient import TestClient + +app = FastAPI() + +oauth2_scheme = OAuth2PasswordBearer( + tokenUrl="/token", + description="OAuth2PasswordBearer security scheme", + auto_error=False, +) + + +@app.get("/items/") +async def read_items(token: Optional[str] = Security(oauth2_scheme)): + if token is None: + return {"msg": "Create an account first"} + return {"token": token} + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/items/": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Items", + "operationId": "read_items_items__get", + "security": [{"OAuth2PasswordBearer": []}], + } + } + }, + "components": { + "securitySchemes": { + "OAuth2PasswordBearer": { + "type": "oauth2", + "flows": {"password": {"scopes": {}, "tokenUrl": "/token"}}, + "description": "OAuth2PasswordBearer security scheme", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_no_token(): + response = client.get("/items") + assert response.status_code == 200, response.text + assert response.json() == {"msg": "Create an account first"} + + +def test_token(): + response = client.get("/items", headers={"Authorization": "Bearer testtoken"}) + assert response.status_code == 200, response.text + assert response.json() == {"token": "testtoken"} + + +def test_incorrect_token(): + response = client.get("/items", headers={"Authorization": "Notexistent testtoken"}) + assert response.status_code == 200, response.text + assert response.json() == {"msg": "Create an account first"} diff --git a/tests/test_security_openid_connect_description.py b/tests/test_security_openid_connect_description.py new file mode 100644 index 000000000..218cbfc8f --- /dev/null +++ b/tests/test_security_openid_connect_description.py @@ -0,0 +1,80 @@ +from fastapi import Depends, FastAPI, Security +from fastapi.security.open_id_connect_url import OpenIdConnect +from fastapi.testclient import TestClient +from pydantic import BaseModel + +app = FastAPI() + +oid = OpenIdConnect( + openIdConnectUrl="/openid", description="OpenIdConnect security scheme" +) + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: str = Security(oid)): + user = User(username=oauth_header) + return user + + +@app.get("/users/me") +def read_current_user(current_user: User = Depends(get_current_user)): + return current_user + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.0.2", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"OpenIdConnect": []}], + } + } + }, + "components": { + "securitySchemes": { + "OpenIdConnect": { + "type": "openIdConnect", + "openIdConnectUrl": "/openid", + "description": "OpenIdConnect security scheme", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_oauth2(): + response = client.get("/users/me", headers={"Authorization": "Bearer footokenbar"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "Bearer footokenbar"} + + +def test_security_oauth2_password_other_header(): + response = client.get("/users/me", headers={"Authorization": "Other footokenbar"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "Other footokenbar"} + + +def test_security_oauth2_password_bearer_no_header(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"}