| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371 |
- /*
- Copyright 2020 Docker, Inc.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package login
- import (
- "context"
- "io/ioutil"
- "net/http"
- "net/url"
- "os"
- "path/filepath"
- "reflect"
- "testing"
- "time"
- "github.com/stretchr/testify/mock"
- "gotest.tools/v3/assert"
- "golang.org/x/oauth2"
- )
- func testLoginService(t *testing.T, m *MockAzureHelper) (*AzureLoginService, error) {
- dir, err := ioutil.TempDir("", "test_store")
- if err != nil {
- return nil, err
- }
- t.Cleanup(func() {
- _ = os.RemoveAll(dir)
- })
- return newAzureLoginServiceFromPath(filepath.Join(dir, tokenStoreFilename), m)
- }
- func TestRefreshInValidToken(t *testing.T) {
- data := refreshTokenData("refreshToken")
- m := &MockAzureHelper{}
- m.On("queryToken", data, "123456").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: time.Now().Add(-1 * time.Hour),
- TokenType: "Bearer",
- },
- })
- assert.NilError(t, err)
- token, _ := azureLogin.GetValidToken()
- assert.Equal(t, token.AccessToken, "newAccessToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(token.Expiry))
- storedToken, _ := azureLogin.tokenStore.readToken()
- assert.Equal(t, storedToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, storedToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(storedToken.Token.Expiry))
- }
- func TestClearErrorMessageIfNotAlreadyLoggedIn(t *testing.T) {
- dir, err := ioutil.TempDir("", "test_store")
- assert.NilError(t, err)
- t.Cleanup(func() {
- _ = os.RemoveAll(dir)
- })
- _, err = newAuthorizerFromLoginStorePath(filepath.Join(dir, tokenStoreFilename))
- assert.ErrorContains(t, err, "not logged in to azure, you need to run \"docker login azure\" first")
- }
- func TestDoesNotRefreshValidToken(t *testing.T) {
- expiryDate := time.Now().Add(1 * time.Hour)
- azureLogin, err := testLoginService(t, nil)
- assert.NilError(t, err)
- err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: expiryDate,
- TokenType: "Bearer",
- },
- })
- assert.NilError(t, err)
- token, _ := azureLogin.GetValidToken()
- assert.Equal(t, token.AccessToken, "accessToken")
- }
- func TestInvalidLogin(t *testing.T) {
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL := args.Get(0).(string)
- err := queryKeyValue(redirectURL, "error", "access denied: login failed")
- assert.NilError(t, err)
- })
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "")
- assert.Error(t, err, "no login code: login failed")
- }
- func TestValidLogin(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- })
- m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken")
- m.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "")
- assert.NilError(t, err)
- loginToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
- assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
- assert.Equal(t, loginToken.Token.Type(), "Bearer")
- }
- func TestValidLoginRequestedTenant(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- })
- m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/00000000-c56d-43e8-9549-dd230ce8a038","tenantId":"00000000-c56d-43e8-9549-dd230ce8a038"},
- {"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken")
- m.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "12345a7c-c56d-43e8-9549-dd230ce8a038")
- assert.NilError(t, err)
- loginToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
- assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
- assert.Equal(t, loginToken.Token.Type(), "Bearer")
- }
- func TestLoginNoTenant(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- })
- m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "00000000-c56d-43e8-9549-dd230ce8a038")
- assert.Error(t, err, "could not find requested azure tenant 00000000-c56d-43e8-9549-dd230ce8a038: login failed")
- }
- func TestLoginRequestedTenantNotFound(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- })
- m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[]}`
- m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "")
- assert.Error(t, err, "could not find azure tenant: login failed")
- }
- func TestLoginAuthorizationFailed(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- })
- m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `[access denied]`
- m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 400, nil)
- azureLogin, err := testLoginService(t, m)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "")
- assert.Error(t, err, "unable to login status code 400: [access denied]: login failed")
- }
- func refreshTokenData(refreshToken string) url.Values {
- return url.Values{
- "grant_type": []string{"refresh_token"},
- "client_id": []string{clientID},
- "scope": []string{scopes},
- "refresh_token": []string{refreshToken},
- }
- }
- func queryKeyValue(redirectURL string, key string, value string) error {
- req, err := http.NewRequest("GET", redirectURL, nil)
- if err != nil {
- return err
- }
- q := req.URL.Query()
- q.Add(key, value)
- req.URL.RawQuery = q.Encode()
- client := &http.Client{}
- _, err = client.Do(req)
- return err
- }
- type MockAzureHelper struct {
- mock.Mock
- }
- func (s *MockAzureHelper) queryToken(data url.Values, tenantID string) (token azureToken, err error) {
- args := s.Called(data, tenantID)
- return args.Get(0).(azureToken), args.Error(1)
- }
- func (s *MockAzureHelper) queryAuthorizationAPI(authorizationURL string, authorizationHeader string) ([]byte, int, error) {
- args := s.Called(authorizationURL, authorizationHeader)
- return args.Get(0).([]byte), args.Int(1), args.Error(2)
- }
- func (s *MockAzureHelper) openAzureLoginPage(redirectURL string) error {
- s.Called(redirectURL)
- return nil
- }
|