auth

Paddy 2015-01-19 Parent:dcd2125c4f57 Child:b714af0578dc

126:34de07217709 Go to Latest

auth/token_test.go

Test around client types and secrets. Implement a test that the CreateClient handler will correctly create a confidential client and issue a secret for it. Also, just generally test that clients that are confidential are issued secrets and clients that are public are not.

History
paddy@28 1 package auth
paddy@28 2
paddy@28 3 import (
paddy@28 4 "testing"
paddy@28 5 "time"
paddy@28 6
paddy@107 7 "code.secondbit.org/uuid.hg"
paddy@28 8 )
paddy@28 9
paddy@57 10 var tokenStores = []tokenStore{NewMemstore()}
paddy@28 11
paddy@35 12 func compareTokens(token1, token2 Token) (success bool, field string, val1, val2 interface{}) {
paddy@35 13 if token1.AccessToken != token2.AccessToken {
paddy@35 14 return false, "access token", token1.AccessToken, token2.AccessToken
paddy@35 15 }
paddy@35 16 if token1.RefreshToken != token2.RefreshToken {
paddy@35 17 return false, "refresh token", token1.RefreshToken, token2.RefreshToken
paddy@35 18 }
paddy@35 19 if !token1.Created.Equal(token2.Created) {
paddy@35 20 return false, "created", token1.Created, token2.Created
paddy@35 21 }
paddy@97 22 if token1.CreatedFrom != token2.CreatedFrom {
paddy@97 23 return false, "created from", token1.CreatedFrom, token2.CreatedFrom
paddy@97 24 }
paddy@35 25 if token1.ExpiresIn != token2.ExpiresIn {
paddy@35 26 return false, "expires in", token1.ExpiresIn, token2.ExpiresIn
paddy@35 27 }
paddy@35 28 if token1.TokenType != token2.TokenType {
paddy@35 29 return false, "token type", token1.TokenType, token2.TokenType
paddy@35 30 }
paddy@35 31 if token1.Scope != token2.Scope {
paddy@35 32 return false, "scope", token1.Scope, token2.Scope
paddy@35 33 }
paddy@35 34 if !token1.ProfileID.Equal(token2.ProfileID) {
paddy@35 35 return false, "profile ID", token1.ProfileID, token2.ProfileID
paddy@35 36 }
paddy@97 37 if token1.Revoked != token2.Revoked {
paddy@97 38 return false, "revoked", token1.Revoked, token2.Revoked
paddy@97 39 }
paddy@35 40 return true, "", nil, nil
paddy@35 41 }
paddy@35 42
paddy@28 43 func TestTokenStoreSuccess(t *testing.T) {
paddy@37 44 t.Parallel()
paddy@28 45 token := Token{
paddy@28 46 AccessToken: "access",
paddy@28 47 RefreshToken: "refresh",
paddy@28 48 Created: time.Now(),
paddy@28 49 ExpiresIn: 3600,
paddy@28 50 TokenType: "bearer",
paddy@28 51 Scope: "scope",
paddy@28 52 ProfileID: uuid.NewID(),
paddy@28 53 }
paddy@35 54 for _, store := range tokenStores {
paddy@116 55 context := Context{tokens: store}
paddy@116 56 err := context.SaveToken(token)
paddy@28 57 if err != nil {
paddy@37 58 t.Errorf("Error saving token to %T: %s", store, err)
paddy@37 59 }
paddy@116 60 err = context.SaveToken(token)
paddy@37 61 if err != ErrTokenAlreadyExists {
paddy@37 62 t.Errorf("Expected ErrTokenAlreadyExists from %T, got %s", store, err)
paddy@28 63 }
paddy@116 64 retrievedAccess, err := context.GetToken(token.AccessToken, false)
paddy@28 65 if err != nil {
paddy@35 66 t.Errorf("Error retrieving token from %T: %s", store, err)
paddy@28 67 }
paddy@35 68 success, field, expectation, result := compareTokens(token, retrievedAccess)
paddy@35 69 if !success {
paddy@35 70 t.Errorf("Expected field %s to be %v, but got %v from %T", field, expectation, result, store)
paddy@35 71 }
paddy@116 72 retrievedRefresh, err := context.GetToken(token.RefreshToken, true)
paddy@28 73 if err != nil {
paddy@35 74 t.Errorf("Error retrieving refresh token from %T: %s", store, err)
paddy@28 75 }
paddy@35 76 success, field, expectation, result = compareTokens(token, retrievedRefresh)
paddy@35 77 if !success {
paddy@35 78 t.Errorf("Expected field %s to be %v, but got %v from %T", field, expectation, result, store)
paddy@35 79 }
paddy@116 80 retrievedProfile, err := context.GetTokensByProfileID(token.ProfileID, 25, 0)
paddy@28 81 if err != nil {
paddy@35 82 t.Errorf("Error retrieving token by profile from %T: %s", store, err)
paddy@28 83 }
paddy@28 84 if len(retrievedProfile) != 1 {
paddy@35 85 t.Errorf("Expected 1 token retrieved by profile ID from %T, got %+v", store, retrievedProfile)
paddy@28 86 }
paddy@35 87 success, field, expectation, result = compareTokens(token, retrievedProfile[0])
paddy@35 88 if !success {
paddy@35 89 t.Errorf("Expected field %s to be %v, but got %v from %T", field, expectation, result, store)
paddy@35 90 }
paddy@116 91 err = context.RevokeToken(token.AccessToken, false)
paddy@97 92 if err != nil {
paddy@97 93 t.Errorf("Error revoking token in %T: %s", store, err)
paddy@97 94 }
paddy@116 95 retrievedRevoked, err := context.GetToken(token.AccessToken, false)
paddy@97 96 if err != nil {
paddy@97 97 t.Errorf("Error retrieving token from %T: %s", store, err)
paddy@97 98 }
paddy@97 99 token.Revoked = true
paddy@97 100 success, field, expectation, result = compareTokens(token, retrievedRevoked)
paddy@97 101 if !success {
paddy@97 102 t.Errorf("Expected field %s to be %v, but got %v from %T", field, expectation, result, store)
paddy@97 103 }
paddy@97 104 // TODO(paddy): test revoking by refresh token.
paddy@116 105 err = context.RemoveToken(token.AccessToken)
paddy@28 106 if err != nil {
paddy@35 107 t.Errorf("Error removing token from %T: %s", store, err)
paddy@28 108 }
paddy@116 109 _, err = context.GetToken(token.AccessToken, false)
paddy@28 110 if err != ErrTokenNotFound {
paddy@35 111 t.Errorf("Expected ErrTokenNotFound from %T, got %s", store, err)
paddy@28 112 }
paddy@116 113 _, err = context.GetToken(token.RefreshToken, true)
paddy@28 114 if err != ErrTokenNotFound {
paddy@35 115 t.Errorf("Expected ErrTokenNotFound from %T, got %s", store, err)
paddy@28 116 }
paddy@116 117 retrievedProfile, err = context.GetTokensByProfileID(token.ProfileID, 25, 0)
paddy@28 118 if err != nil {
paddy@35 119 t.Errorf("Error retrieving token by profile from %T: %s", store, err)
paddy@28 120 }
paddy@28 121 if len(retrievedProfile) != 0 {
paddy@35 122 t.Errorf("Expected list of 0 tokens from %T, got %+v", store, retrievedProfile)
paddy@28 123 }
paddy@116 124 err = context.RemoveToken(token.AccessToken)
paddy@37 125 if err != ErrTokenNotFound {
paddy@37 126 t.Errorf("Expected ErrTokenNotFound from %T, got %s", store, err)
paddy@37 127 }
paddy@116 128 err = context.RevokeToken(token.AccessToken, false)
paddy@97 129 if err != ErrTokenNotFound {
paddy@97 130 t.Errorf("Expected ErrTokenNotFound from %T, got %s", store, err)
paddy@97 131 }
paddy@116 132 err = context.RevokeToken(token.RefreshToken, true)
paddy@97 133 if err != ErrTokenNotFound {
paddy@97 134 t.Errorf("Expected ErrTokenNotFound from %T, got %s", store, err)
paddy@97 135 }
paddy@28 136 }
paddy@28 137 }