mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-05-09 03:11:58 +00:00
feat(msgraph): add auth and client foundation
This commit is contained in:
parent
ea8e608821
commit
a152c706b7
4 changed files with 873 additions and 0 deletions
149
tests/tools/test_microsoft_graph_auth.py
Normal file
149
tests/tools/test_microsoft_graph_auth.py
Normal file
|
|
@ -0,0 +1,149 @@
|
|||
"""Tests for tools/microsoft_graph_auth.py."""
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
import httpx
|
||||
import pytest
|
||||
|
||||
from tools.microsoft_graph_auth import (
|
||||
DEFAULT_GRAPH_SCOPE,
|
||||
GraphCredentials,
|
||||
MicrosoftGraphConfigError,
|
||||
MicrosoftGraphTokenError,
|
||||
MicrosoftGraphTokenProvider,
|
||||
)
|
||||
|
||||
|
||||
class TestGraphCredentials:
|
||||
def test_from_env_raises_for_missing_required_values(self):
|
||||
with pytest.raises(MicrosoftGraphConfigError) as exc:
|
||||
GraphCredentials.from_env({})
|
||||
assert "MSGRAPH_TENANT_ID" in str(exc.value)
|
||||
assert "MSGRAPH_CLIENT_ID" in str(exc.value)
|
||||
assert "MSGRAPH_CLIENT_SECRET" in str(exc.value)
|
||||
|
||||
def test_from_env_optional_returns_none_when_not_configured(self):
|
||||
assert GraphCredentials.from_env({}, required=False) is None
|
||||
|
||||
def test_from_env_builds_normalized_credentials(self):
|
||||
creds = GraphCredentials.from_env(
|
||||
{
|
||||
"MSGRAPH_TENANT_ID": "tenant-123",
|
||||
"MSGRAPH_CLIENT_ID": "client-456",
|
||||
"MSGRAPH_CLIENT_SECRET": "secret-789",
|
||||
}
|
||||
)
|
||||
assert creds is not None
|
||||
assert creds.scope == DEFAULT_GRAPH_SCOPE
|
||||
assert creds.token_url.endswith("/tenant-123/oauth2/v2.0/token")
|
||||
|
||||
|
||||
@pytest.mark.anyio
|
||||
class TestMicrosoftGraphTokenProvider:
|
||||
async def test_reuses_cached_token_until_expiry(self):
|
||||
calls: list[int] = []
|
||||
|
||||
def handler(request: httpx.Request) -> httpx.Response:
|
||||
calls.append(1)
|
||||
return httpx.Response(
|
||||
200,
|
||||
json={
|
||||
"access_token": f"token-{len(calls)}",
|
||||
"expires_in": 3600,
|
||||
"token_type": "Bearer",
|
||||
},
|
||||
)
|
||||
|
||||
provider = MicrosoftGraphTokenProvider(
|
||||
GraphCredentials("tenant", "client", "secret"),
|
||||
transport=httpx.MockTransport(handler),
|
||||
)
|
||||
|
||||
first = await provider.get_access_token()
|
||||
second = await provider.get_access_token()
|
||||
|
||||
assert first == "token-1"
|
||||
assert second == "token-1"
|
||||
assert len(calls) == 1
|
||||
|
||||
async def test_refreshes_when_cached_token_is_expired(self):
|
||||
calls: list[int] = []
|
||||
|
||||
def handler(request: httpx.Request) -> httpx.Response:
|
||||
calls.append(1)
|
||||
expires_in = 0 if len(calls) == 1 else 3600
|
||||
return httpx.Response(
|
||||
200,
|
||||
json={
|
||||
"access_token": f"token-{len(calls)}",
|
||||
"expires_in": expires_in,
|
||||
"token_type": "Bearer",
|
||||
},
|
||||
)
|
||||
|
||||
provider = MicrosoftGraphTokenProvider(
|
||||
GraphCredentials("tenant", "client", "secret"),
|
||||
transport=httpx.MockTransport(handler),
|
||||
skew_seconds=0,
|
||||
)
|
||||
|
||||
first = await provider.get_access_token()
|
||||
second = await provider.get_access_token()
|
||||
|
||||
assert first == "token-1"
|
||||
assert second == "token-2"
|
||||
assert len(calls) == 2
|
||||
|
||||
async def test_force_refresh_bypasses_cache(self):
|
||||
calls: list[int] = []
|
||||
|
||||
def handler(request: httpx.Request) -> httpx.Response:
|
||||
calls.append(1)
|
||||
return httpx.Response(
|
||||
200,
|
||||
json={
|
||||
"access_token": f"token-{len(calls)}",
|
||||
"expires_in": 3600,
|
||||
},
|
||||
)
|
||||
|
||||
provider = MicrosoftGraphTokenProvider(
|
||||
GraphCredentials("tenant", "client", "secret"),
|
||||
transport=httpx.MockTransport(handler),
|
||||
)
|
||||
|
||||
first = await provider.get_access_token()
|
||||
second = await provider.get_access_token(force_refresh=True)
|
||||
|
||||
assert first == "token-1"
|
||||
assert second == "token-2"
|
||||
assert len(calls) == 2
|
||||
|
||||
async def test_invalid_token_response_raises(self):
|
||||
def handler(request: httpx.Request) -> httpx.Response:
|
||||
return httpx.Response(200, json={"expires_in": 3600})
|
||||
|
||||
provider = MicrosoftGraphTokenProvider(
|
||||
GraphCredentials("tenant", "client", "secret"),
|
||||
transport=httpx.MockTransport(handler),
|
||||
)
|
||||
|
||||
with pytest.raises(MicrosoftGraphTokenError) as exc:
|
||||
await provider.get_access_token()
|
||||
assert "access_token" in str(exc.value)
|
||||
|
||||
async def test_http_error_includes_server_message(self):
|
||||
def handler(request: httpx.Request) -> httpx.Response:
|
||||
return httpx.Response(
|
||||
401,
|
||||
json={"error": "invalid_client", "error_description": "bad secret"},
|
||||
)
|
||||
|
||||
provider = MicrosoftGraphTokenProvider(
|
||||
GraphCredentials("tenant", "client", "secret"),
|
||||
transport=httpx.MockTransport(handler),
|
||||
)
|
||||
|
||||
with pytest.raises(MicrosoftGraphTokenError) as exc:
|
||||
await provider.get_access_token()
|
||||
assert "bad secret" in str(exc.value)
|
||||
Loading…
Add table
Add a link
Reference in a new issue