moto/tests/test_cognitoidentity/test_cognitoidentity.py

191 lines
6.6 KiB
Python
Raw Normal View History

from __future__ import unicode_literals
import boto3
import sure # noqa
2019-09-01 15:38:33 +00:00
from botocore.exceptions import ClientError
import pytest
2018-04-03 21:08:20 +00:00
from moto import mock_cognitoidentity
from moto.cognitoidentity.utils import get_random_identity_id
from moto.core import ACCOUNT_ID
from uuid import UUID
2019-12-17 02:25:20 +00:00
@mock_cognitoidentity
def test_create_identity_pool():
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
2019-10-31 15:44:26 +00:00
result = conn.create_identity_pool(
IdentityPoolName="TestPool",
2018-04-03 21:08:20 +00:00
AllowUnauthenticatedIdentities=False,
2019-10-31 15:44:26 +00:00
SupportedLoginProviders={"graph.facebook.com": "123456789012345"},
DeveloperProviderName="devname",
2019-12-17 02:25:20 +00:00
OpenIdConnectProviderARNs=[
"arn:aws:rds:eu-west-2:{}:db:mysql-db".format(ACCOUNT_ID)
],
CognitoIdentityProviders=[
{
2019-10-31 15:44:26 +00:00
"ProviderName": "testprovider",
"ClientId": "CLIENT12345",
"ServerSideTokenCheck": True,
}
],
SamlProviderARNs=["arn:aws:rds:eu-west-2:{}:db:mysql-db".format(ACCOUNT_ID)],
2019-10-31 15:44:26 +00:00
)
assert result["IdentityPoolId"] != ""
2018-04-03 21:08:20 +00:00
2019-09-01 15:38:33 +00:00
@mock_cognitoidentity
def test_describe_identity_pool():
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
2019-09-01 15:38:33 +00:00
2019-10-31 15:44:26 +00:00
res = conn.create_identity_pool(
IdentityPoolName="TestPool",
2019-09-01 15:38:33 +00:00
AllowUnauthenticatedIdentities=False,
2019-10-31 15:44:26 +00:00
SupportedLoginProviders={"graph.facebook.com": "123456789012345"},
DeveloperProviderName="devname",
2019-12-17 02:25:20 +00:00
OpenIdConnectProviderARNs=[
"arn:aws:rds:eu-west-2:{}:db:mysql-db".format(ACCOUNT_ID)
],
2019-09-01 15:38:33 +00:00
CognitoIdentityProviders=[
{
2019-10-31 15:44:26 +00:00
"ProviderName": "testprovider",
"ClientId": "CLIENT12345",
"ServerSideTokenCheck": True,
}
2019-09-01 15:38:33 +00:00
],
SamlProviderARNs=["arn:aws:rds:eu-west-2:{}:db:mysql-db".format(ACCOUNT_ID)],
2019-10-31 15:44:26 +00:00
)
2019-09-01 15:38:33 +00:00
2019-10-31 15:44:26 +00:00
result = conn.describe_identity_pool(IdentityPoolId=res["IdentityPoolId"])
2019-09-01 15:38:33 +00:00
2019-10-31 15:44:26 +00:00
assert result["IdentityPoolId"] == res["IdentityPoolId"]
assert (
result["AllowUnauthenticatedIdentities"]
== res["AllowUnauthenticatedIdentities"]
)
assert result["SupportedLoginProviders"] == res["SupportedLoginProviders"]
assert result["DeveloperProviderName"] == res["DeveloperProviderName"]
assert result["OpenIdConnectProviderARNs"] == res["OpenIdConnectProviderARNs"]
assert result["CognitoIdentityProviders"] == res["CognitoIdentityProviders"]
assert result["SamlProviderARNs"] == res["SamlProviderARNs"]
2019-09-01 15:38:33 +00:00
2021-07-28 10:17:15 +00:00
@pytest.mark.parametrize(
"key,initial_value,updated_value",
[
(
"SupportedLoginProviders",
{"graph.facebook.com": "123456789012345"},
{"graph.facebook.com": "123456789012345", "graph.google.com": "00000000"},
),
("SupportedLoginProviders", {"graph.facebook.com": "123456789012345"}, {}),
("DeveloperProviderName", "dev1", "dev2"),
],
)
@mock_cognitoidentity
def test_update_identity_pool(key, initial_value, updated_value):
conn = boto3.client("cognito-identity", "us-west-2")
res = conn.create_identity_pool(
IdentityPoolName="TestPool",
AllowUnauthenticatedIdentities=False,
**dict({key: initial_value}),
)
first = conn.describe_identity_pool(IdentityPoolId=res["IdentityPoolId"])
first[key].should.equal(initial_value)
response = conn.update_identity_pool(
IdentityPoolId=res["IdentityPoolId"],
IdentityPoolName="TestPool",
AllowUnauthenticatedIdentities=False,
**dict({key: updated_value}),
)
response[key].should.equal(updated_value)
second = conn.describe_identity_pool(IdentityPoolId=res["IdentityPoolId"])
second[key].should.equal(response[key])
2019-09-01 15:38:33 +00:00
@mock_cognitoidentity
def test_describe_identity_pool_with_invalid_id_raises_error():
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
with pytest.raises(ClientError) as cm:
2019-10-31 15:44:26 +00:00
conn.describe_identity_pool(IdentityPoolId="us-west-2_non-existent")
2019-09-01 15:38:33 +00:00
cm.value.operation_name.should.equal("DescribeIdentityPool")
cm.value.response["Error"]["Code"].should.equal("ResourceNotFoundException")
cm.value.response["Error"]["Message"].should.equal("us-west-2_non-existent")
cm.value.response["ResponseMetadata"]["HTTPStatusCode"].should.equal(400)
2019-09-01 15:38:33 +00:00
# testing a helper function
def test_get_random_identity_id():
identity_id = get_random_identity_id("us-west-2")
region, id = identity_id.split(":")
region.should.equal("us-west-2")
UUID(id, version=4) # Will throw an error if it's not a valid UUID
@mock_cognitoidentity
def test_get_id():
# These two do NOT work in server mode. They just don't return the data from the model.
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
result = conn.get_id(
AccountId="someaccount",
IdentityPoolId="us-west-2:12345",
Logins={"someurl": "12345"},
)
assert (
result.get("IdentityId", "").startswith("us-west-2")
or result.get("ResponseMetadata").get("HTTPStatusCode") == 200
)
2018-04-03 21:08:20 +00:00
@mock_cognitoidentity
def test_get_credentials_for_identity():
2018-04-04 07:28:39 +00:00
# These two do NOT work in server mode. They just don't return the data from the model.
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
result = conn.get_credentials_for_identity(IdentityId="12345")
2019-10-31 15:44:26 +00:00
assert (
result.get("Expiration", 0) > 0
or result.get("ResponseMetadata").get("HTTPStatusCode") == 200
)
assert (
result.get("IdentityId") == "12345"
or result.get("ResponseMetadata").get("HTTPStatusCode") == 200
)
2018-04-03 21:08:20 +00:00
@mock_cognitoidentity
def test_get_open_id_token_for_developer_identity():
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
result = conn.get_open_id_token_for_developer_identity(
2019-10-31 15:44:26 +00:00
IdentityPoolId="us-west-2:12345",
IdentityId="12345",
Logins={"someurl": "12345"},
TokenDuration=123,
)
2019-10-31 15:44:26 +00:00
assert len(result["Token"]) > 0
assert result["IdentityId"] == "12345"
2018-10-09 17:28:15 +00:00
2019-09-01 15:38:33 +00:00
2018-10-09 17:28:15 +00:00
@mock_cognitoidentity
def test_get_open_id_token_for_developer_identity_when_no_explicit_identity_id():
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
2018-10-09 17:28:15 +00:00
result = conn.get_open_id_token_for_developer_identity(
2019-10-31 15:44:26 +00:00
IdentityPoolId="us-west-2:12345", Logins={"someurl": "12345"}, TokenDuration=123
2018-10-09 17:28:15 +00:00
)
2019-10-31 15:44:26 +00:00
assert len(result["Token"]) > 0
assert len(result["IdentityId"]) > 0
2019-09-01 15:38:33 +00:00
@mock_cognitoidentity
def test_get_open_id_token():
2019-10-31 15:44:26 +00:00
conn = boto3.client("cognito-identity", "us-west-2")
result = conn.get_open_id_token(IdentityId="12345", Logins={"someurl": "12345"})
assert len(result["Token"]) > 0
assert result["IdentityId"] == "12345"