From 54d508ae8c98528c8fbcac936133d3165bce7a20 Mon Sep 17 00:00:00 2001 From: Jens L Date: Thu, 27 Apr 2023 17:33:47 +0300 Subject: [PATCH] ci: fix pyright errors (#5392) * ci: fix pyright errors Signed-off-by: Jens Langhammer * fix error in oauth 1 source Signed-off-by: Jens Langhammer * remove redundant blueprint fixtures Signed-off-by: Jens Langhammer --------- Signed-off-by: Jens Langhammer --- authentik/core/api/propertymappings.py | 1 - authentik/core/api/providers.py | 1 - authentik/core/api/sources.py | 2 -- authentik/core/api/used_by.py | 1 - authentik/crypto/tests.py | 1 - authentik/events/models.py | 1 - authentik/flows/api/stages.py | 1 - authentik/flows/challenge.py | 1 - authentik/lib/config.py | 1 - authentik/outposts/api/service_connections.py | 2 -- authentik/policies/api/policies.py | 2 -- authentik/policies/denied.py | 1 - authentik/policies/engine.py | 1 - authentik/policies/models.py | 2 -- authentik/providers/oauth2/utils.py | 1 - authentik/root/messages/storage.py | 1 - authentik/sources/oauth/clients/oauth1.py | 2 +- authentik/sources/oauth/types/apple.py | 1 - .../stages/email/management/commands/test_email.py | 1 - authentik/stages/email/tests/test_api.py | 1 - lifecycle/migrate.py | 1 - tests/e2e/test_provider_oauth2_github.py | 3 --- tests/e2e/test_provider_oauth2_grafana.py | 5 ----- tests/e2e/test_provider_oidc.py | 4 ---- tests/e2e/test_provider_oidc_implicit.py | 4 ---- tests/e2e/test_provider_proxy.py | 5 +---- tests/e2e/test_provider_saml.py | 6 ------ tests/e2e/test_source_oauth.py | 12 ------------ 28 files changed, 2 insertions(+), 63 deletions(-) diff --git a/authentik/core/api/propertymappings.py b/authentik/core/api/propertymappings.py index 2fab3a233..1e7436be9 100644 --- a/authentik/core/api/propertymappings.py +++ b/authentik/core/api/propertymappings.py @@ -93,7 +93,6 @@ class PropertyMappingViewSet( { "name": subclass._meta.verbose_name, "description": subclass.__doc__, - # pyright: reportGeneralTypeIssues=false "component": subclass().component, "model_name": subclass._meta.model_name, } diff --git a/authentik/core/api/providers.py b/authentik/core/api/providers.py index 130b3d66f..096e926f4 100644 --- a/authentik/core/api/providers.py +++ b/authentik/core/api/providers.py @@ -25,7 +25,6 @@ class ProviderSerializer(ModelSerializer, MetaNameSerializer): def get_component(self, obj: Provider) -> str: # pragma: no cover """Get object component so that we know how to edit the object""" - # pyright: reportGeneralTypeIssues=false if obj.__class__ == Provider: return "" return obj.component diff --git a/authentik/core/api/sources.py b/authentik/core/api/sources.py index 7c3d5c435..7c405fa36 100644 --- a/authentik/core/api/sources.py +++ b/authentik/core/api/sources.py @@ -40,7 +40,6 @@ class SourceSerializer(ModelSerializer, MetaNameSerializer): def get_component(self, obj: Source) -> str: """Get object component so that we know how to edit the object""" - # pyright: reportGeneralTypeIssues=false if obj.__class__ == Source: return "" return obj.component @@ -139,7 +138,6 @@ class SourceViewSet( component = subclass.__bases__[0]().component else: component = subclass().component - # pyright: reportGeneralTypeIssues=false data.append( { "name": subclass._meta.verbose_name, diff --git a/authentik/core/api/used_by.py b/authentik/core/api/used_by.py index 073deb369..66f0a70dd 100644 --- a/authentik/core/api/used_by.py +++ b/authentik/core/api/used_by.py @@ -56,7 +56,6 @@ class UsedByMixin: # pylint: disable=too-many-locals def used_by(self, request: Request, *args, **kwargs) -> Response: """Get a list of all objects that use this object""" - # pyright: reportGeneralTypeIssues=false model: Model = self.get_object() used_by = [] shadows = [] diff --git a/authentik/crypto/tests.py b/authentik/crypto/tests.py index f74e084c8..527720a42 100644 --- a/authentik/crypto/tests.py +++ b/authentik/crypto/tests.py @@ -246,7 +246,6 @@ class TestCrypto(APITestCase): with open(f"{temp_dir}/foo.bar/privkey.pem", "w+", encoding="utf-8") as _key: _key.write(builder.private_key) with CONFIG.patch("cert_discovery_dir", temp_dir): - # pyright: reportGeneralTypeIssues=false certificate_discovery() # pylint: disable=no-value-for-parameter keypair: CertificateKeyPair = CertificateKeyPair.objects.filter( managed=MANAGED_DISCOVERED % "foo" diff --git a/authentik/events/models.py b/authentik/events/models.py index e2f8e4ec6..f84e39e72 100644 --- a/authentik/events/models.py +++ b/authentik/events/models.py @@ -453,7 +453,6 @@ class NotificationTransport(SerializerModel): try: from authentik.stages.email.tasks import send_mail - # pyright: reportGeneralTypeIssues=false return send_mail(mail.__dict__) # pylint: disable=no-value-for-parameter except (SMTPException, ConnectionError, OSError) as exc: raise NotificationTransportError(exc) from exc diff --git a/authentik/flows/api/stages.py b/authentik/flows/api/stages.py index 0bac579d7..6f0d6e4ac 100644 --- a/authentik/flows/api/stages.py +++ b/authentik/flows/api/stages.py @@ -27,7 +27,6 @@ class StageSerializer(ModelSerializer, MetaNameSerializer): def get_component(self, obj: Stage) -> str: """Get object type so that we know how to edit the object""" - # pyright: reportGeneralTypeIssues=false if obj.__class__ == Stage: return "" return obj.component diff --git a/authentik/flows/challenge.py b/authentik/flows/challenge.py index dd663068e..e9292f03d 100644 --- a/authentik/flows/challenge.py +++ b/authentik/flows/challenge.py @@ -182,5 +182,4 @@ class HttpChallengeResponse(JsonResponse): """Subclass of JsonResponse that uses the `DataclassEncoder`""" def __init__(self, challenge, **kwargs) -> None: - # pyright: reportGeneralTypeIssues=false super().__init__(challenge.data, encoder=DataclassEncoder, **kwargs) diff --git a/authentik/lib/config.py b/authentik/lib/config.py index 2df04ceea..6e823243f 100644 --- a/authentik/lib/config.py +++ b/authentik/lib/config.py @@ -177,7 +177,6 @@ class ConfigLoader: # Walk each component of the path path_parts = path.split(sep) for comp in path_parts[:-1]: - # pyright: reportGeneralTypeIssues=false if comp not in root: root[comp] = {} root = root.get(comp, {}) diff --git a/authentik/outposts/api/service_connections.py b/authentik/outposts/api/service_connections.py index 0e1f46af8..7c988474a 100644 --- a/authentik/outposts/api/service_connections.py +++ b/authentik/outposts/api/service_connections.py @@ -31,7 +31,6 @@ class ServiceConnectionSerializer(ModelSerializer, MetaNameSerializer): def get_component(self, obj: OutpostServiceConnection) -> str: """Get object type so that we know how to edit the object""" - # pyright: reportGeneralTypeIssues=false if obj.__class__ == OutpostServiceConnection: return "" return obj.component @@ -77,7 +76,6 @@ class ServiceConnectionViewSet( data = [] for subclass in all_subclasses(self.queryset.model): subclass: OutpostServiceConnection - # pyright: reportGeneralTypeIssues=false data.append( { "name": subclass._meta.verbose_name, diff --git a/authentik/policies/api/policies.py b/authentik/policies/api/policies.py index e5c555f93..11bdab190 100644 --- a/authentik/policies/api/policies.py +++ b/authentik/policies/api/policies.py @@ -40,7 +40,6 @@ class PolicySerializer(ModelSerializer, MetaNameSerializer): def get_component(self, obj: Policy) -> str: # pragma: no cover """Get object component so that we know how to edit the object""" - # pyright: reportGeneralTypeIssues=false if obj.__class__ == Policy: return "" return obj.component @@ -50,7 +49,6 @@ class PolicySerializer(ModelSerializer, MetaNameSerializer): return obj.bindings.count() + obj.promptstage_set.count() def to_representation(self, instance: Policy): - # pyright: reportGeneralTypeIssues=false if instance.__class__ == Policy or not self._resolve_inheritance: return super().to_representation(instance) return dict(instance.serializer(instance=instance, resolve_inheritance=False).data) diff --git a/authentik/policies/denied.py b/authentik/policies/denied.py index 946f56d47..7cb7d0bb8 100644 --- a/authentik/policies/denied.py +++ b/authentik/policies/denied.py @@ -19,7 +19,6 @@ class AccessDeniedResponse(TemplateResponse): error_message: Optional[str] = None policy_result: Optional[PolicyResult] = None - # pyright: reportGeneralTypeIssues=false def __init__(self, request: HttpRequest, template="policies/denied.html") -> None: super().__init__(request, template) self.title = _("Access denied") diff --git a/authentik/policies/engine.py b/authentik/policies/engine.py index 9972f4db8..22ea69014 100644 --- a/authentik/policies/engine.py +++ b/authentik/policies/engine.py @@ -74,7 +74,6 @@ class PolicyEngine: def _check_policy_type(self, binding: PolicyBinding): """Check policy type, make sure it's not the root class as that has no logic implemented""" - # pyright: reportGeneralTypeIssues=false if binding.policy is not None and binding.policy.__class__ == Policy: raise PolicyEngineException(f"Policy '{binding.policy}' is root type") diff --git a/authentik/policies/models.py b/authentik/policies/models.py index dfeaabcda..f47075ffe 100644 --- a/authentik/policies/models.py +++ b/authentik/policies/models.py @@ -19,9 +19,7 @@ from authentik.policies.types import PolicyRequest, PolicyResult class PolicyEngineMode(models.TextChoices): """Decide how results of multiple policies should be combined.""" - # pyright: reportGeneralTypeIssues=false MODE_ALL = "all", _("ALL, all policies must pass") # type: "PolicyEngineMode" - # pyright: reportGeneralTypeIssues=false MODE_ANY = "any", _("ANY, any policy must pass") # type: "PolicyEngineMode" diff --git a/authentik/providers/oauth2/utils.py b/authentik/providers/oauth2/utils.py index a1791a480..cc7a86519 100644 --- a/authentik/providers/oauth2/utils.py +++ b/authentik/providers/oauth2/utils.py @@ -202,5 +202,4 @@ class HttpResponseRedirectScheme(HttpResponseRedirect): **kwargs: Any, ) -> None: self.allowed_schemes = allowed_schemes or ["http", "https", "ftp"] - # pyright: reportGeneralTypeIssues=false super().__init__(redirect_to, *args, **kwargs) diff --git a/authentik/root/messages/storage.py b/authentik/root/messages/storage.py index 200cf44e0..4f9262d8d 100644 --- a/authentik/root/messages/storage.py +++ b/authentik/root/messages/storage.py @@ -14,7 +14,6 @@ class ChannelsStorage(SessionStorage): """Send contrib.messages over websocket""" def __init__(self, request: HttpRequest) -> None: - # pyright: reportGeneralTypeIssues=false super().__init__(request) self.channel = get_channel_layer() diff --git a/authentik/sources/oauth/clients/oauth1.py b/authentik/sources/oauth/clients/oauth1.py index d7099fee6..13afdcdd0 100644 --- a/authentik/sources/oauth/clients/oauth1.py +++ b/authentik/sources/oauth/clients/oauth1.py @@ -66,7 +66,7 @@ class OAuthClient(BaseOAuthClient): response.raise_for_status() except RequestException as exc: raise OAuthSourceException( - response=exc.response.text if exc.response else str(exc), + exc.response.text if exc.response else str(exc), ) from exc return response.text diff --git a/authentik/sources/oauth/types/apple.py b/authentik/sources/oauth/types/apple.py index eeab7a5ef..2e0cc8f85 100644 --- a/authentik/sources/oauth/types/apple.py +++ b/authentik/sources/oauth/types/apple.py @@ -59,7 +59,6 @@ class AppleOAuthClient(OAuth2Client): "aud": "https://appleid.apple.com", "sub": parts[0].strip(), } - # pyright: reportGeneralTypeIssues=false jwt = encode(payload, self.source.consumer_secret, "ES256", {"kid": parts[2].strip()}) LOGGER.debug("signing payload as secret key", payload=payload, jwt=jwt) return jwt diff --git a/authentik/stages/email/management/commands/test_email.py b/authentik/stages/email/management/commands/test_email.py index d067708a9..3e1a17fa7 100644 --- a/authentik/stages/email/management/commands/test_email.py +++ b/authentik/stages/email/management/commands/test_email.py @@ -33,7 +33,6 @@ class Command(BaseCommand): template_context={}, ) try: - # pyright: reportGeneralTypeIssues=false send_mail(message.__dict__, stage.pk) finally: if delete_stage: diff --git a/authentik/stages/email/tests/test_api.py b/authentik/stages/email/tests/test_api.py index ca501d321..4488a578e 100644 --- a/authentik/stages/email/tests/test_api.py +++ b/authentik/stages/email/tests/test_api.py @@ -24,7 +24,6 @@ class TestEmailStageAPI(APITestCase): def test_validate(self): """Test EmailStage's validation""" self.assertEqual( - # pyright: reportGeneralTypeIssues=false EmailStageSerializer().validate_template(EmailTemplates.ACCOUNT_CONFIRM), EmailTemplates.ACCOUNT_CONFIRM, ) diff --git a/lifecycle/migrate.py b/lifecycle/migrate.py index 507d1cac1..077ca149c 100755 --- a/lifecycle/migrate.py +++ b/lifecycle/migrate.py @@ -69,7 +69,6 @@ if __name__ == "__main__": if not spec: continue mod = module_from_spec(spec) - # pyright: reportGeneralTypeIssues=false spec.loader.exec_module(mod) for name, sub in getmembers(mod, isclass): diff --git a/tests/e2e/test_provider_oauth2_github.py b/tests/e2e/test_provider_oauth2_github.py index 5e2b12bd6..49f640093 100644 --- a/tests/e2e/test_provider_oauth2_github.py +++ b/tests/e2e/test_provider_oauth2_github.py @@ -62,7 +62,6 @@ class TestProviderOAuth2Github(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -119,7 +118,6 @@ class TestProviderOAuth2Github(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( "system/providers-oauth2.yaml", @@ -194,7 +192,6 @@ class TestProviderOAuth2Github(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") def test_denied(self): diff --git a/tests/e2e/test_provider_oauth2_grafana.py b/tests/e2e/test_provider_oauth2_grafana.py index 71dc24e24..d096a3483 100644 --- a/tests/e2e/test_provider_oauth2_grafana.py +++ b/tests/e2e/test_provider_oauth2_grafana.py @@ -67,7 +67,6 @@ class TestProviderOAuth2OAuth(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -116,7 +115,6 @@ class TestProviderOAuth2OAuth(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -178,7 +176,6 @@ class TestProviderOAuth2OAuth(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -250,7 +247,6 @@ class TestProviderOAuth2OAuth(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( "system/providers-oauth2.yaml", @@ -330,7 +326,6 @@ class TestProviderOAuth2OAuth(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( "system/providers-oauth2.yaml", diff --git a/tests/e2e/test_provider_oidc.py b/tests/e2e/test_provider_oidc.py index 001059106..e56817836 100644 --- a/tests/e2e/test_provider_oidc.py +++ b/tests/e2e/test_provider_oidc.py @@ -63,7 +63,6 @@ class TestProviderOAuth2OIDC(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @@ -109,7 +108,6 @@ class TestProviderOAuth2OIDC(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @@ -165,7 +163,6 @@ class TestProviderOAuth2OIDC(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @apply_blueprint("system/providers-oauth2.yaml") @@ -235,7 +232,6 @@ class TestProviderOAuth2OIDC(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") def test_authorization_denied(self): diff --git a/tests/e2e/test_provider_oidc_implicit.py b/tests/e2e/test_provider_oidc_implicit.py index 0c8b58fd4..71e1c15f4 100644 --- a/tests/e2e/test_provider_oidc_implicit.py +++ b/tests/e2e/test_provider_oidc_implicit.py @@ -63,7 +63,6 @@ class TestProviderOAuth2OIDCImplicit(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @@ -109,7 +108,6 @@ class TestProviderOAuth2OIDCImplicit(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @@ -160,7 +158,6 @@ class TestProviderOAuth2OIDCImplicit(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @apply_blueprint("system/providers-oauth2.yaml") @@ -226,7 +223,6 @@ class TestProviderOAuth2OIDCImplicit(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") def test_authorization_denied(self): diff --git a/tests/e2e/test_provider_proxy.py b/tests/e2e/test_provider_proxy.py index 01f4e1f5e..7ac0c6da9 100644 --- a/tests/e2e/test_provider_proxy.py +++ b/tests/e2e/test_provider_proxy.py @@ -60,7 +60,6 @@ class TestProviderProxy(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -126,7 +125,6 @@ class TestProviderProxy(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -203,7 +201,6 @@ class TestProviderProxyConnect(ChannelsLiveServerTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @reconcile_app("authentik_crypto") @@ -244,7 +241,7 @@ class TestProviderProxyConnect(ChannelsLiveServerTestCase): sleep(0.5) state = outpost.state - self.assertTrue(len(state) >= 1) + self.assertEqual(len(state), 1) # Make sure to delete the outpost to remove the container outpost.delete() diff --git a/tests/e2e/test_provider_saml.py b/tests/e2e/test_provider_saml.py index 378b65e63..ef7baf8cc 100644 --- a/tests/e2e/test_provider_saml.py +++ b/tests/e2e/test_provider_saml.py @@ -62,7 +62,6 @@ class TestProviderSAML(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -132,7 +131,6 @@ class TestProviderSAML(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( "system/providers-saml.yaml", @@ -216,7 +214,6 @@ class TestProviderSAML(SeleniumTestCase): ) @apply_blueprint( "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( "system/providers-saml.yaml", @@ -299,7 +296,6 @@ class TestProviderSAML(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -374,7 +370,6 @@ class TestProviderSAML(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( @@ -423,7 +418,6 @@ class TestProviderSAML(SeleniumTestCase): "default/flow-default-invalidation-flow.yaml", ) @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", "default/flow-default-provider-authorization-implicit-consent.yaml", ) @apply_blueprint( diff --git a/tests/e2e/test_source_oauth.py b/tests/e2e/test_source_oauth.py index 18c50a7b2..230e3d4a5 100644 --- a/tests/e2e/test_source_oauth.py +++ b/tests/e2e/test_source_oauth.py @@ -146,10 +146,6 @@ class TestSourceOAuth2(SeleniumTestCase): "default/flow-default-authentication-flow.yaml", "default/flow-default-invalidation-flow.yaml", ) - @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", - ) @apply_blueprint( "default/flow-default-source-authentication.yaml", "default/flow-default-source-enrollment.yaml", @@ -199,14 +195,6 @@ class TestSourceOAuth2(SeleniumTestCase): self.assert_user(User(username="foo", name="admin", email="admin@example.com")) @retry() - @apply_blueprint( - "default/flow-default-authentication-flow.yaml", - "default/flow-default-invalidation-flow.yaml", - ) - @apply_blueprint( - "default/flow-default-provider-authorization-explicit-consent.yaml", - "default/flow-default-provider-authorization-implicit-consent.yaml", - ) def test_oauth_enroll_auth(self): """test OAuth Source With With OIDC (enroll and authenticate again)""" self.test_oauth_enroll()