2b9873483a
Allows superusers to disable login to the UI via credentials if at least one OIDC provider is configured
22 lines
882 B
Python
22 lines
882 B
Python
import pytest
|
|
|
|
from util.config.validators import ConfigValidationException
|
|
from util.config.validators.validate_access import AccessSettingsValidator
|
|
|
|
from test.fixtures import *
|
|
|
|
@pytest.mark.parametrize('unvalidated_config, expected_exception', [
|
|
({}, None),
|
|
({'FEATURE_DIRECT_LOGIN': False}, ConfigValidationException),
|
|
({'FEATURE_DIRECT_LOGIN': False, 'SOMETHING_LOGIN_CONFIG': {}}, None),
|
|
({'FEATURE_DIRECT_LOGIN': False, 'FEATURE_GITHUB_LOGIN': True}, None),
|
|
({'FEATURE_DIRECT_LOGIN': False, 'FEATURE_GOOGLE_LOGIN': True}, None),
|
|
])
|
|
def test_validate_invalid_oidc_login_config(unvalidated_config, expected_exception, app):
|
|
validator = AccessSettingsValidator()
|
|
|
|
if expected_exception is not None:
|
|
with pytest.raises(expected_exception):
|
|
validator.validate(unvalidated_config, None, None)
|
|
else:
|
|
validator.validate(unvalidated_config, None, None)
|