2014-05-17 11:26:57 -04:00
|
|
|
// Copyright 2014 The oauth2 Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
2014-05-13 14:06:46 -04:00
|
|
|
|
2014-05-05 17:54:23 -04:00
|
|
|
package oauth2
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2014-09-04 16:28:18 -04:00
|
|
|
"net/http/httptest"
|
2014-05-05 17:54:23 -04:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
type mockTransport struct {
|
|
|
|
rt func(req *http.Request) (resp *http.Response, err error)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *mockTransport) RoundTrip(req *http.Request) (resp *http.Response, err error) {
|
|
|
|
return t.rt(req)
|
|
|
|
}
|
|
|
|
|
2014-09-04 16:28:18 -04:00
|
|
|
func newTestConf(url string) *Config {
|
2014-05-05 17:54:23 -04:00
|
|
|
conf, _ := NewConfig(&Options{
|
|
|
|
ClientID: "CLIENT_ID",
|
|
|
|
ClientSecret: "CLIENT_SECRET",
|
|
|
|
RedirectURL: "REDIRECT_URL",
|
|
|
|
Scopes: []string{
|
|
|
|
"scope1",
|
|
|
|
"scope2",
|
|
|
|
},
|
2014-09-04 16:28:18 -04:00
|
|
|
}, url+"/auth", url+"/token")
|
2014-05-05 17:54:23 -04:00
|
|
|
return conf
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuthCodeURL(t *testing.T) {
|
2014-09-04 16:28:18 -04:00
|
|
|
conf := newTestConf("server")
|
2014-09-05 01:43:23 -04:00
|
|
|
url := conf.AuthCodeURL("foo", "offline", "force")
|
2014-09-04 16:28:18 -04:00
|
|
|
if url != "server/auth?access_type=offline&approval_prompt=force&client_id=CLIENT_ID&redirect_uri=REDIRECT_URL&response_type=code&scope=scope1+scope2&state=foo" {
|
|
|
|
t.Fatalf("Auth code URL doesn't match the expected, found: %v", url)
|
2014-05-05 17:54:23 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-04 16:28:18 -04:00
|
|
|
func TestAuthCodeURL_Optional(t *testing.T) {
|
|
|
|
conf, _ := NewConfig(&Options{
|
|
|
|
ClientID: "CLIENT_ID",
|
|
|
|
}, "auth-url", "token-url")
|
2014-09-05 01:43:23 -04:00
|
|
|
url := conf.AuthCodeURL("", "", "")
|
2014-09-04 16:28:18 -04:00
|
|
|
if url != "auth-url?client_id=CLIENT_ID&response_type=code" {
|
|
|
|
t.Fatalf("Auth code URL doesn't match the expected, found: %v", url)
|
2014-05-05 17:54:23 -04:00
|
|
|
}
|
2014-09-04 16:28:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestExchangeRequest(t *testing.T) {
|
|
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if r.URL.String() != "/token" {
|
|
|
|
t.Errorf("Unexpected exchange request URL, %v is found.", r.URL)
|
|
|
|
}
|
|
|
|
headerAuth := r.Header.Get("Authorization")
|
|
|
|
if headerAuth != "Basic Q0xJRU5UX0lEOkNMSUVOVF9TRUNSRVQ=" {
|
|
|
|
t.Errorf("Unexpected authorization header, %v is found.", headerAuth)
|
|
|
|
}
|
|
|
|
headerContentType := r.Header.Get("Content-Type")
|
|
|
|
if headerContentType != "application/x-www-form-urlencoded" {
|
|
|
|
t.Errorf("Unexpected Content-Type header, %v is found.", headerContentType)
|
|
|
|
}
|
2014-09-06 21:03:51 -04:00
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Failed reading request body: %s.", err)
|
|
|
|
}
|
2014-09-04 16:28:18 -04:00
|
|
|
if string(body) != "client_id=CLIENT_ID&code=exchange-code&grant_type=authorization_code&redirect_uri=REDIRECT_URL&scope=scope1+scope2" {
|
|
|
|
t.Errorf("Unexpected exchange payload, %v is found.", string(body))
|
|
|
|
}
|
2014-09-06 21:03:51 -04:00
|
|
|
w.Header().Set("Content-Type", "application/x-www-form-urlencoded")
|
2014-09-06 19:39:43 -04:00
|
|
|
w.Write([]byte("access_token=90d64460d14870c08c81352a05dedd3465940a7c&scope=user&token_type=bearer"))
|
2014-09-04 16:28:18 -04:00
|
|
|
}))
|
|
|
|
defer ts.Close()
|
|
|
|
conf := newTestConf(ts.URL)
|
2014-09-06 19:39:43 -04:00
|
|
|
tok, err := conf.Exchange("exchange-code")
|
|
|
|
if err != nil {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Failed retrieving token: %s.", err)
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
if tok.Expired() {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Token shouldn't be expired.")
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
if tok.AccessToken != "90d64460d14870c08c81352a05dedd3465940a7c" {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Wrong access token, %#v.", tok.AccessToken)
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
if tok.TokenType != "bearer" {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Wrong token type, %#v.", tok.TokenType)
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestExchangeRequest_JsonResponse(t *testing.T) {
|
|
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if r.URL.String() != "/token" {
|
|
|
|
t.Errorf("Unexpected exchange request URL, %v is found.", r.URL)
|
|
|
|
}
|
|
|
|
headerAuth := r.Header.Get("Authorization")
|
|
|
|
if headerAuth != "Basic Q0xJRU5UX0lEOkNMSUVOVF9TRUNSRVQ=" {
|
|
|
|
t.Errorf("Unexpected authorization header, %v is found.", headerAuth)
|
|
|
|
}
|
|
|
|
headerContentType := r.Header.Get("Content-Type")
|
|
|
|
if headerContentType != "application/x-www-form-urlencoded" {
|
|
|
|
t.Errorf("Unexpected Content-Type header, %v is found.", headerContentType)
|
|
|
|
}
|
2014-09-06 21:03:51 -04:00
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Failed reading request body: %s.", err)
|
|
|
|
}
|
2014-09-06 19:39:43 -04:00
|
|
|
if string(body) != "client_id=CLIENT_ID&code=exchange-code&grant_type=authorization_code&redirect_uri=REDIRECT_URL&scope=scope1+scope2" {
|
|
|
|
t.Errorf("Unexpected exchange payload, %v is found.", string(body))
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Write([]byte(`{"access_token": "90d64460d14870c08c81352a05dedd3465940a7c", "scope": "user", "token_type": "bearer"}`))
|
|
|
|
}))
|
|
|
|
defer ts.Close()
|
|
|
|
conf := newTestConf(ts.URL)
|
|
|
|
tok, err := conf.Exchange("exchange-code")
|
|
|
|
if err != nil {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Failed retrieving token: %s.", err)
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
if tok.Expired() {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Token shouldn't be expired.")
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
if tok.AccessToken != "90d64460d14870c08c81352a05dedd3465940a7c" {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Wrong access token, %#v.", tok.AccessToken)
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
|
|
|
if tok.TokenType != "bearer" {
|
2014-09-06 21:03:51 -04:00
|
|
|
t.Errorf("Wrong token type, %#v.", tok.TokenType)
|
2014-09-06 19:39:43 -04:00
|
|
|
}
|
2014-05-05 17:54:23 -04:00
|
|
|
}
|
|
|
|
|
2014-09-04 16:28:18 -04:00
|
|
|
func TestExchangeRequest_NonBasicAuth(t *testing.T) {
|
|
|
|
conf, _ := NewConfig(&Options{
|
|
|
|
ClientID: "CLIENT_ID",
|
|
|
|
}, "https://accounts.google.com/auth",
|
|
|
|
"https://accounts.google.com/token")
|
|
|
|
tr := &mockTransport{
|
|
|
|
rt: func(r *http.Request) (w *http.Response, err error) {
|
|
|
|
headerAuth := r.Header.Get("Authorization")
|
|
|
|
if headerAuth != "" {
|
|
|
|
t.Errorf("Unexpected authorization header, %v is found.", headerAuth)
|
2014-08-13 16:59:53 -04:00
|
|
|
}
|
|
|
|
return nil, errors.New("no response")
|
|
|
|
},
|
|
|
|
}
|
2014-09-04 16:28:18 -04:00
|
|
|
conf.Client = &http.Client{Transport: tr}
|
|
|
|
conf.Exchange("code")
|
2014-08-13 16:59:53 -04:00
|
|
|
}
|
|
|
|
|
2014-09-04 16:28:18 -04:00
|
|
|
func TestTokenRefreshRequest(t *testing.T) {
|
|
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if r.URL.String() != "/token" {
|
|
|
|
t.Errorf("Unexpected token refresh request URL, %v is found.", r.URL)
|
|
|
|
}
|
|
|
|
headerContentType := r.Header.Get("Content-Type")
|
|
|
|
if headerContentType != "application/x-www-form-urlencoded" {
|
|
|
|
t.Errorf("Unexpected Content-Type header, %v is found.", headerContentType)
|
|
|
|
}
|
|
|
|
body, _ := ioutil.ReadAll(r.Body)
|
|
|
|
if string(body) != "client_id=CLIENT_ID&grant_type=refresh_token&refresh_token=REFRESH_TOKEN" {
|
|
|
|
t.Errorf("Unexpected refresh token payload, %v is found.", string(body))
|
|
|
|
}
|
|
|
|
}))
|
|
|
|
defer ts.Close()
|
|
|
|
conf := newTestConf(ts.URL)
|
|
|
|
conf.FetchToken(&Token{RefreshToken: "REFRESH_TOKEN"})
|
|
|
|
}
|
2014-07-11 13:57:28 -04:00
|
|
|
|
2014-09-04 16:28:18 -04:00
|
|
|
func TestNewTransportWithCode(t *testing.T) {
|
|
|
|
exchanged := false
|
|
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if r.URL.RequestURI() == "/token" {
|
|
|
|
exchanged = true
|
|
|
|
}
|
|
|
|
}))
|
|
|
|
defer ts.Close()
|
|
|
|
conf := newTestConf(ts.URL)
|
2014-05-05 17:54:23 -04:00
|
|
|
conf.NewTransportWithCode("exchange-code")
|
2014-09-04 16:28:18 -04:00
|
|
|
if !exchanged {
|
|
|
|
t.Errorf("NewTransportWithCode should have exchanged the code, but it didn't.")
|
|
|
|
}
|
2014-05-05 17:54:23 -04:00
|
|
|
}
|
|
|
|
|
2014-09-04 16:28:18 -04:00
|
|
|
func TestFetchWithNoRefreshToken(t *testing.T) {
|
|
|
|
fetcher := newTestConf("")
|
2014-05-10 06:50:23 -04:00
|
|
|
_, err := fetcher.FetchToken(&Token{})
|
2014-05-05 17:54:23 -04:00
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Fetch should return an error if no refresh token is set")
|
|
|
|
}
|
|
|
|
}
|