| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375 |
- /*
- Copyright 2020 Docker, Inc.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package login
- import (
- "context"
- "io/ioutil"
- "net/http"
- "net/url"
- "os"
- "path/filepath"
- "reflect"
- "testing"
- "time"
- "github.com/stretchr/testify/mock"
- "github.com/stretchr/testify/suite"
- "golang.org/x/oauth2"
- . "github.com/onsi/gomega"
- )
- type LoginSuite struct {
- suite.Suite
- dir string
- mockHelper *MockAzureHelper
- azureLogin AzureLoginService
- }
- func (suite *LoginSuite) BeforeTest(suiteName, testName string) {
- dir, err := ioutil.TempDir("", "test_store")
- Expect(err).To(BeNil())
- suite.dir = dir
- suite.mockHelper = &MockAzureHelper{}
- suite.azureLogin, err = newAzureLoginServiceFromPath(filepath.Join(dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- }
- func (suite *LoginSuite) AfterTest(suiteName, testName string) {
- err := os.RemoveAll(suite.dir)
- Expect(err).To(BeNil())
- }
- func (suite *LoginSuite) TestRefreshInValidToken() {
- data := refreshTokenData("refreshToken")
- suite.mockHelper.On("queryToken", data, "123456").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- suite.azureLogin = azureLogin
- err = suite.azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: time.Now().Add(-1 * time.Hour),
- TokenType: "Bearer",
- },
- })
- Expect(err).To(BeNil())
- token, _ := suite.azureLogin.GetValidToken()
- Expect(token.AccessToken).To(Equal("newAccessToken"))
- Expect(token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second)))
- storedToken, _ := suite.azureLogin.tokenStore.readToken()
- Expect(storedToken.Token.AccessToken).To(Equal("newAccessToken"))
- Expect(storedToken.Token.RefreshToken).To(Equal("newRefreshToken"))
- Expect(storedToken.Token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second)))
- }
- func (suite *LoginSuite) TestClearErrorMessageIfNotAlreadyLoggedIn() {
- _, err := newAuthorizerFromLoginStorePath(filepath.Join(suite.dir, tokenStoreFilename))
- Expect(err.Error()).To(ContainSubstring("not logged in to azure, you need to run \"docker login azure\" first"))
- }
- func (suite *LoginSuite) TestDoesNotRefreshValidToken() {
- expiryDate := time.Now().Add(1 * time.Hour)
- err := suite.azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: expiryDate,
- TokenType: "Bearer",
- },
- })
- Expect(err).To(BeNil())
- token, _ := suite.azureLogin.GetValidToken()
- Expect(suite.mockHelper.Calls).To(BeEmpty())
- Expect(token.AccessToken).To(Equal("accessToken"))
- }
- func (suite *LoginSuite) TestInvalidLogin() {
- suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL := args.Get(0).(string)
- err := queryKeyValue(redirectURL, "error", "access denied: login failed")
- Expect(err).To(BeNil())
- })
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- err = azureLogin.Login(context.TODO(), "")
- Expect(err.Error()).To(BeEquivalentTo("no login code: login failed"))
- }
- func (suite *LoginSuite) TestValidLogin() {
- var redirectURL string
- suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- Expect(err).To(BeNil())
- })
- suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken")
- suite.mockHelper.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- err = azureLogin.Login(context.TODO(), "")
- Expect(err).To(BeNil())
- loginToken, err := suite.azureLogin.tokenStore.readToken()
- Expect(err).To(BeNil())
- Expect(loginToken.Token.AccessToken).To(Equal("newAccessToken"))
- Expect(loginToken.Token.RefreshToken).To(Equal("newRefreshToken"))
- Expect(loginToken.Token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second)))
- Expect(loginToken.TenantID).To(Equal("12345a7c-c56d-43e8-9549-dd230ce8a038"))
- Expect(loginToken.Token.Type()).To(Equal("Bearer"))
- }
- func (suite *LoginSuite) TestValidLoginRequestedTenant() {
- var redirectURL string
- suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- Expect(err).To(BeNil())
- })
- suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/00000000-c56d-43e8-9549-dd230ce8a038","tenantId":"00000000-c56d-43e8-9549-dd230ce8a038"},
- {"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken")
- suite.mockHelper.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- err = azureLogin.Login(context.TODO(), "12345a7c-c56d-43e8-9549-dd230ce8a038")
- Expect(err).To(BeNil())
- loginToken, err := suite.azureLogin.tokenStore.readToken()
- Expect(err).To(BeNil())
- Expect(loginToken.Token.AccessToken).To(Equal("newAccessToken"))
- Expect(loginToken.Token.RefreshToken).To(Equal("newRefreshToken"))
- Expect(loginToken.Token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second)))
- Expect(loginToken.TenantID).To(Equal("12345a7c-c56d-43e8-9549-dd230ce8a038"))
- Expect(loginToken.Token.Type()).To(Equal("Bearer"))
- }
- func (suite *LoginSuite) TestLoginNoTenant() {
- var redirectURL string
- suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- Expect(err).To(BeNil())
- })
- suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- err = azureLogin.Login(context.TODO(), "00000000-c56d-43e8-9549-dd230ce8a038")
- Expect(err.Error()).To(BeEquivalentTo("could not find requested azure tenant 00000000-c56d-43e8-9549-dd230ce8a038: login failed"))
- }
- func (suite *LoginSuite) TestLoginRequestedTenantNotFound() {
- var redirectURL string
- suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- Expect(err).To(BeNil())
- })
- suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[]}`
- suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- err = azureLogin.Login(context.TODO(), "")
- Expect(err.Error()).To(BeEquivalentTo("could not find azure tenant: login failed"))
- }
- func (suite *LoginSuite) TestLoginAuthorizationFailed() {
- var redirectURL string
- suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- Expect(err).To(BeNil())
- })
- suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{scopes},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `[access denied]`
- suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 400, nil)
- azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper)
- Expect(err).To(BeNil())
- err = azureLogin.Login(context.TODO(), "")
- Expect(err.Error()).To(BeEquivalentTo("unable to login status code 400: [access denied]: login failed"))
- }
- func refreshTokenData(refreshToken string) url.Values {
- return url.Values{
- "grant_type": []string{"refresh_token"},
- "client_id": []string{clientID},
- "scope": []string{scopes},
- "refresh_token": []string{refreshToken},
- }
- }
- func queryKeyValue(redirectURL string, key string, value string) error {
- req, err := http.NewRequest("GET", redirectURL, nil)
- Expect(err).To(BeNil())
- q := req.URL.Query()
- q.Add(key, value)
- req.URL.RawQuery = q.Encode()
- client := &http.Client{}
- _, err = client.Do(req)
- return err
- }
- func TestLoginSuite(t *testing.T) {
- RegisterTestingT(t)
- suite.Run(t, new(LoginSuite))
- }
- type MockAzureHelper struct {
- mock.Mock
- }
- func (s *MockAzureHelper) queryToken(data url.Values, tenantID string) (token azureToken, err error) {
- args := s.Called(data, tenantID)
- return args.Get(0).(azureToken), args.Error(1)
- }
- func (s *MockAzureHelper) queryAuthorizationAPI(authorizationURL string, authorizationHeader string) ([]byte, int, error) {
- args := s.Called(authorizationURL, authorizationHeader)
- return args.Get(0).([]byte), args.Int(1), args.Error(2)
- }
- func (s *MockAzureHelper) openAzureLoginPage(redirectURL string) {
- s.Called(redirectURL)
- }
|