1
0

login_test.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package login
  14. import (
  15. "context"
  16. "errors"
  17. "io/ioutil"
  18. "net/http"
  19. "net/http/httptest"
  20. "net/url"
  21. "os"
  22. "path/filepath"
  23. "reflect"
  24. "sync/atomic"
  25. "testing"
  26. "time"
  27. "github.com/Azure/go-autorest/autorest/adal"
  28. "github.com/stretchr/testify/mock"
  29. "gotest.tools/v3/assert"
  30. "golang.org/x/oauth2"
  31. )
  32. func testLoginService(t *testing.T, apiHelperMock *MockAzureHelper, cloudEnvironmentSvc CloudEnvironmentService) (*azureLoginService, error) {
  33. dir, err := ioutil.TempDir("", "test_store")
  34. if err != nil {
  35. return nil, err
  36. }
  37. t.Cleanup(func() {
  38. _ = os.RemoveAll(dir)
  39. })
  40. ces := CloudEnvironments
  41. if cloudEnvironmentSvc != nil {
  42. ces = cloudEnvironmentSvc
  43. }
  44. return newAzureLoginServiceFromPath(filepath.Join(dir, tokenStoreFilename), apiHelperMock, ces)
  45. }
  46. func TestRefreshInValidToken(t *testing.T) {
  47. data := url.Values{
  48. "grant_type": []string{"refresh_token"},
  49. "client_id": []string{clientID},
  50. "scope": []string{"offline_access https://management.docker.com/.default"},
  51. "refresh_token": []string{"refreshToken"},
  52. }
  53. helperMock := &MockAzureHelper{}
  54. helperMock.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "123456").Return(azureToken{
  55. RefreshToken: "newRefreshToken",
  56. AccessToken: "newAccessToken",
  57. ExpiresIn: 3600,
  58. Foci: "1",
  59. }, nil)
  60. cloudEnvironmentSvcMock := &MockCloudEnvironmentService{}
  61. cloudEnvironmentSvcMock.On("Get", "AzureDockerCloud").Return(CloudEnvironment{
  62. Name: "AzureDockerCloud",
  63. Authentication: CloudEnvironmentAuthentication{
  64. LoginEndpoint: "https://login.docker.com",
  65. Audiences: []string{
  66. "https://management.docker.com",
  67. "https://management-ext.docker.com",
  68. },
  69. Tenant: "common",
  70. },
  71. ResourceManagerURL: "https://management.docker.com",
  72. Suffixes: map[string]string{},
  73. }, nil)
  74. azureLogin, err := testLoginService(t, helperMock, cloudEnvironmentSvcMock)
  75. assert.NilError(t, err)
  76. err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
  77. TenantID: "123456",
  78. Token: oauth2.Token{
  79. AccessToken: "accessToken",
  80. RefreshToken: "refreshToken",
  81. Expiry: time.Now().Add(-1 * time.Hour),
  82. TokenType: "Bearer",
  83. },
  84. CloudEnvironment: "AzureDockerCloud",
  85. })
  86. assert.NilError(t, err)
  87. token, tenantID, err := azureLogin.GetValidToken()
  88. assert.NilError(t, err)
  89. assert.Equal(t, tenantID, "123456")
  90. assert.Equal(t, token.AccessToken, "newAccessToken")
  91. assert.Assert(t, time.Now().Add(3500*time.Second).Before(token.Expiry))
  92. storedToken, err := azureLogin.tokenStore.readToken()
  93. assert.NilError(t, err)
  94. assert.Equal(t, storedToken.Token.AccessToken, "newAccessToken")
  95. assert.Equal(t, storedToken.Token.RefreshToken, "newRefreshToken")
  96. assert.Assert(t, time.Now().Add(3500*time.Second).Before(storedToken.Token.Expiry))
  97. assert.Equal(t, storedToken.CloudEnvironment, "AzureDockerCloud")
  98. }
  99. func TestDoesNotRefreshValidToken(t *testing.T) {
  100. expiryDate := time.Now().Add(1 * time.Hour)
  101. azureLogin, err := testLoginService(t, nil, nil)
  102. assert.NilError(t, err)
  103. err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
  104. TenantID: "123456",
  105. Token: oauth2.Token{
  106. AccessToken: "accessToken",
  107. RefreshToken: "refreshToken",
  108. Expiry: expiryDate,
  109. TokenType: "Bearer",
  110. },
  111. CloudEnvironment: AzurePublicCloudName,
  112. })
  113. assert.NilError(t, err)
  114. token, tenantID, err := azureLogin.GetValidToken()
  115. assert.NilError(t, err)
  116. assert.Equal(t, token.AccessToken, "accessToken")
  117. assert.Equal(t, tenantID, "123456")
  118. }
  119. func TestTokenStoreAssumesAzurePublicCloud(t *testing.T) {
  120. expiryDate := time.Now().Add(1 * time.Hour)
  121. azureLogin, err := testLoginService(t, nil, nil)
  122. assert.NilError(t, err)
  123. err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
  124. TenantID: "123456",
  125. Token: oauth2.Token{
  126. AccessToken: "accessToken",
  127. RefreshToken: "refreshToken",
  128. Expiry: expiryDate,
  129. TokenType: "Bearer",
  130. },
  131. // Simulates upgrade from older version of Docker CLI that did not have cloud environment concept
  132. CloudEnvironment: "",
  133. })
  134. assert.NilError(t, err)
  135. token, tenantID, err := azureLogin.GetValidToken()
  136. assert.NilError(t, err)
  137. assert.Equal(t, tenantID, "123456")
  138. assert.Equal(t, token.AccessToken, "accessToken")
  139. ce, err := azureLogin.GetCloudEnvironment()
  140. assert.NilError(t, err)
  141. assert.Equal(t, ce.Name, AzurePublicCloudName)
  142. }
  143. func TestInvalidLogin(t *testing.T) {
  144. m := &MockAzureHelper{}
  145. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  146. redirectURL := args.Get(0).(string)
  147. err := queryKeyValue(redirectURL, "error", "access denied: login failed")
  148. assert.NilError(t, err)
  149. }).Return(nil)
  150. azureLogin, err := testLoginService(t, m, nil)
  151. assert.NilError(t, err)
  152. err = azureLogin.Login(context.TODO(), "", AzurePublicCloudName)
  153. assert.Error(t, err, "no login code: login failed")
  154. }
  155. func TestValidLogin(t *testing.T) {
  156. var redirectURL string
  157. ctx := context.TODO()
  158. m := &MockAzureHelper{}
  159. ce, err := CloudEnvironments.Get(AzurePublicCloudName)
  160. assert.NilError(t, err)
  161. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  162. redirectURL = args.Get(0).(string)
  163. err := queryKeyValue(redirectURL, "code", "123456879")
  164. assert.NilError(t, err)
  165. }).Return(nil)
  166. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
  167. //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
  168. return reflect.DeepEqual(data, url.Values{
  169. "grant_type": []string{"authorization_code"},
  170. "client_id": []string{clientID},
  171. "code": []string{"123456879"},
  172. "scope": []string{ce.GetTokenScope()},
  173. "redirect_uri": []string{redirectURL},
  174. })
  175. }), "organizations").Return(azureToken{
  176. RefreshToken: "firstRefreshToken",
  177. AccessToken: "firstAccessToken",
  178. ExpiresIn: 3600,
  179. Foci: "1",
  180. }, nil)
  181. authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
  182. m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
  183. data := refreshTokenData("firstRefreshToken", ce)
  184. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
  185. RefreshToken: "newRefreshToken",
  186. AccessToken: "newAccessToken",
  187. ExpiresIn: 3600,
  188. Foci: "1",
  189. }, nil)
  190. azureLogin, err := testLoginService(t, m, nil)
  191. assert.NilError(t, err)
  192. err = azureLogin.Login(ctx, "", AzurePublicCloudName)
  193. assert.NilError(t, err)
  194. loginToken, err := azureLogin.tokenStore.readToken()
  195. assert.NilError(t, err)
  196. assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
  197. assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
  198. assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
  199. assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
  200. assert.Equal(t, loginToken.Token.Type(), "Bearer")
  201. assert.Equal(t, loginToken.CloudEnvironment, "AzureCloud")
  202. }
  203. func TestValidLoginRequestedTenant(t *testing.T) {
  204. var redirectURL string
  205. m := &MockAzureHelper{}
  206. ce, err := CloudEnvironments.Get(AzurePublicCloudName)
  207. assert.NilError(t, err)
  208. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  209. redirectURL = args.Get(0).(string)
  210. err := queryKeyValue(redirectURL, "code", "123456879")
  211. assert.NilError(t, err)
  212. }).Return(nil)
  213. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
  214. //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
  215. return reflect.DeepEqual(data, url.Values{
  216. "grant_type": []string{"authorization_code"},
  217. "client_id": []string{clientID},
  218. "code": []string{"123456879"},
  219. "scope": []string{ce.GetTokenScope()},
  220. "redirect_uri": []string{redirectURL},
  221. })
  222. }), "organizations").Return(azureToken{
  223. RefreshToken: "firstRefreshToken",
  224. AccessToken: "firstAccessToken",
  225. ExpiresIn: 3600,
  226. Foci: "1",
  227. }, nil)
  228. authBody := `{"value":[{"id":"/tenants/00000000-c56d-43e8-9549-dd230ce8a038","tenantId":"00000000-c56d-43e8-9549-dd230ce8a038"},
  229. {"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
  230. ctx := context.TODO()
  231. m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
  232. data := refreshTokenData("firstRefreshToken", ce)
  233. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
  234. RefreshToken: "newRefreshToken",
  235. AccessToken: "newAccessToken",
  236. ExpiresIn: 3600,
  237. Foci: "1",
  238. }, nil)
  239. azureLogin, err := testLoginService(t, m, nil)
  240. assert.NilError(t, err)
  241. err = azureLogin.Login(ctx, "12345a7c-c56d-43e8-9549-dd230ce8a038", AzurePublicCloudName)
  242. assert.NilError(t, err)
  243. loginToken, err := azureLogin.tokenStore.readToken()
  244. assert.NilError(t, err)
  245. assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
  246. assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
  247. assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
  248. assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
  249. assert.Equal(t, loginToken.Token.Type(), "Bearer")
  250. assert.Equal(t, loginToken.CloudEnvironment, "AzureCloud")
  251. }
  252. func TestLoginNoTenant(t *testing.T) {
  253. var redirectURL string
  254. m := &MockAzureHelper{}
  255. ce, err := CloudEnvironments.Get(AzurePublicCloudName)
  256. assert.NilError(t, err)
  257. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  258. redirectURL = args.Get(0).(string)
  259. err := queryKeyValue(redirectURL, "code", "123456879")
  260. assert.NilError(t, err)
  261. }).Return(nil)
  262. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
  263. //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
  264. return reflect.DeepEqual(data, url.Values{
  265. "grant_type": []string{"authorization_code"},
  266. "client_id": []string{clientID},
  267. "code": []string{"123456879"},
  268. "scope": []string{ce.GetTokenScope()},
  269. "redirect_uri": []string{redirectURL},
  270. })
  271. }), "organizations").Return(azureToken{
  272. RefreshToken: "firstRefreshToken",
  273. AccessToken: "firstAccessToken",
  274. ExpiresIn: 3600,
  275. Foci: "1",
  276. }, nil)
  277. ctx := context.TODO()
  278. authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
  279. m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
  280. azureLogin, err := testLoginService(t, m, nil)
  281. assert.NilError(t, err)
  282. err = azureLogin.Login(ctx, "00000000-c56d-43e8-9549-dd230ce8a038", AzurePublicCloudName)
  283. assert.Error(t, err, "could not find requested azure tenant 00000000-c56d-43e8-9549-dd230ce8a038: login failed")
  284. }
  285. func TestLoginRequestedTenantNotFound(t *testing.T) {
  286. var redirectURL string
  287. m := &MockAzureHelper{}
  288. ce, err := CloudEnvironments.Get(AzurePublicCloudName)
  289. assert.NilError(t, err)
  290. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  291. redirectURL = args.Get(0).(string)
  292. err := queryKeyValue(redirectURL, "code", "123456879")
  293. assert.NilError(t, err)
  294. }).Return(nil)
  295. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
  296. //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
  297. return reflect.DeepEqual(data, url.Values{
  298. "grant_type": []string{"authorization_code"},
  299. "client_id": []string{clientID},
  300. "code": []string{"123456879"},
  301. "scope": []string{ce.GetTokenScope()},
  302. "redirect_uri": []string{redirectURL},
  303. })
  304. }), "organizations").Return(azureToken{
  305. RefreshToken: "firstRefreshToken",
  306. AccessToken: "firstAccessToken",
  307. ExpiresIn: 3600,
  308. Foci: "1",
  309. }, nil)
  310. ctx := context.TODO()
  311. authBody := `{"value":[]}`
  312. m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
  313. azureLogin, err := testLoginService(t, m, nil)
  314. assert.NilError(t, err)
  315. err = azureLogin.Login(ctx, "", AzurePublicCloudName)
  316. assert.Error(t, err, "could not find azure tenant: login failed")
  317. }
  318. func TestLoginAuthorizationFailed(t *testing.T) {
  319. var redirectURL string
  320. m := &MockAzureHelper{}
  321. ce, err := CloudEnvironments.Get(AzurePublicCloudName)
  322. assert.NilError(t, err)
  323. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  324. redirectURL = args.Get(0).(string)
  325. err := queryKeyValue(redirectURL, "code", "123456879")
  326. assert.NilError(t, err)
  327. }).Return(nil)
  328. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
  329. //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
  330. return reflect.DeepEqual(data, url.Values{
  331. "grant_type": []string{"authorization_code"},
  332. "client_id": []string{clientID},
  333. "code": []string{"123456879"},
  334. "scope": []string{ce.GetTokenScope()},
  335. "redirect_uri": []string{redirectURL},
  336. })
  337. }), "organizations").Return(azureToken{
  338. RefreshToken: "firstRefreshToken",
  339. AccessToken: "firstAccessToken",
  340. ExpiresIn: 3600,
  341. Foci: "1",
  342. }, nil)
  343. authBody := `[access denied]`
  344. ctx := context.TODO()
  345. m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 400, nil)
  346. azureLogin, err := testLoginService(t, m, nil)
  347. assert.NilError(t, err)
  348. err = azureLogin.Login(ctx, "", AzurePublicCloudName)
  349. assert.Error(t, err, "unable to login status code 400: [access denied]: login failed")
  350. }
  351. func TestValidThroughDeviceCodeFlow(t *testing.T) {
  352. m := &MockAzureHelper{}
  353. ce, err := CloudEnvironments.Get(AzurePublicCloudName)
  354. assert.NilError(t, err)
  355. m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Return(errors.New("Could not open browser"))
  356. m.On("getDeviceCodeFlowToken", mock.AnythingOfType("CloudEnvironment")).Return(adal.Token{AccessToken: "firstAccessToken", RefreshToken: "firstRefreshToken"}, nil)
  357. authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
  358. ctx := context.TODO()
  359. m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
  360. data := refreshTokenData("firstRefreshToken", ce)
  361. m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
  362. RefreshToken: "newRefreshToken",
  363. AccessToken: "newAccessToken",
  364. ExpiresIn: 3600,
  365. Foci: "1",
  366. }, nil)
  367. azureLogin, err := testLoginService(t, m, nil)
  368. assert.NilError(t, err)
  369. err = azureLogin.Login(ctx, "", AzurePublicCloudName)
  370. assert.NilError(t, err)
  371. loginToken, err := azureLogin.tokenStore.readToken()
  372. assert.NilError(t, err)
  373. assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
  374. assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
  375. assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
  376. assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
  377. assert.Equal(t, loginToken.Token.Type(), "Bearer")
  378. assert.Equal(t, loginToken.CloudEnvironment, "AzureCloud")
  379. }
  380. func TestNonstandardCloudEnvironment(t *testing.T) {
  381. dockerCloudMetadata := []byte(`
  382. [{
  383. "authentication": {
  384. "loginEndpoint": "https://login.docker.com/",
  385. "audiences": [
  386. "https://management.docker.com/",
  387. "https://management.cli.docker.com/"
  388. ],
  389. "tenant": "F5773994-FE88-482E-9E33-6E799D250416"
  390. },
  391. "name": "AzureDockerCloud",
  392. "suffixes": {
  393. "acrLoginServer": "azurecr.docker.io"
  394. },
  395. "resourceManager": "https://management.docker.com/"
  396. }]`)
  397. var metadataReqCount int32
  398. srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  399. _, err := w.Write(dockerCloudMetadata)
  400. assert.NilError(t, err)
  401. atomic.AddInt32(&metadataReqCount, 1)
  402. }))
  403. defer srv.Close()
  404. cloudMetadataURL, cloudMetadataURLSet := os.LookupEnv(CloudMetadataURLVar)
  405. if cloudMetadataURLSet {
  406. defer func() {
  407. err := os.Setenv(CloudMetadataURLVar, cloudMetadataURL)
  408. assert.NilError(t, err)
  409. }()
  410. }
  411. err := os.Setenv(CloudMetadataURLVar, srv.URL)
  412. assert.NilError(t, err)
  413. ctx := context.TODO()
  414. ces := newCloudEnvironmentService()
  415. ces.cloudMetadataURL = srv.URL
  416. dockerCloudEnv, err := ces.Get("AzureDockerCloud")
  417. assert.NilError(t, err)
  418. helperMock := &MockAzureHelper{}
  419. var redirectURL string
  420. helperMock.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
  421. redirectURL = args.Get(0).(string)
  422. err := queryKeyValue(redirectURL, "code", "123456879")
  423. assert.NilError(t, err)
  424. }).Return(nil)
  425. helperMock.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
  426. //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
  427. return reflect.DeepEqual(data, url.Values{
  428. "grant_type": []string{"authorization_code"},
  429. "client_id": []string{clientID},
  430. "code": []string{"123456879"},
  431. "scope": []string{dockerCloudEnv.GetTokenScope()},
  432. "redirect_uri": []string{redirectURL},
  433. })
  434. }), "organizations").Return(azureToken{
  435. RefreshToken: "firstRefreshToken",
  436. AccessToken: "firstAccessToken",
  437. ExpiresIn: 3600,
  438. Foci: "1",
  439. }, nil)
  440. authBody := `{"value":[{"id":"/tenants/F5773994-FE88-482E-9E33-6E799D250416","tenantId":"F5773994-FE88-482E-9E33-6E799D250416"}]}`
  441. helperMock.On("queryAPIWithHeader", ctx, dockerCloudEnv.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
  442. data := refreshTokenData("firstRefreshToken", dockerCloudEnv)
  443. helperMock.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "F5773994-FE88-482E-9E33-6E799D250416").Return(azureToken{
  444. RefreshToken: "newRefreshToken",
  445. AccessToken: "newAccessToken",
  446. ExpiresIn: 3600,
  447. Foci: "1",
  448. }, nil)
  449. azureLogin, err := testLoginService(t, helperMock, ces)
  450. assert.NilError(t, err)
  451. err = azureLogin.Login(ctx, "", "AzureDockerCloud")
  452. assert.NilError(t, err)
  453. loginToken, err := azureLogin.tokenStore.readToken()
  454. assert.NilError(t, err)
  455. assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
  456. assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
  457. assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
  458. assert.Equal(t, loginToken.TenantID, "F5773994-FE88-482E-9E33-6E799D250416")
  459. assert.Equal(t, loginToken.Token.Type(), "Bearer")
  460. assert.Equal(t, loginToken.CloudEnvironment, "AzureDockerCloud")
  461. assert.Equal(t, metadataReqCount, int32(1))
  462. }
  463. // Don't warn about refreshToken parameter taking the same value for all invocations
  464. // nolint:unparam
  465. func refreshTokenData(refreshToken string, ce CloudEnvironment) url.Values {
  466. return url.Values{
  467. "grant_type": []string{"refresh_token"},
  468. "client_id": []string{clientID},
  469. "scope": []string{ce.GetTokenScope()},
  470. "refresh_token": []string{refreshToken},
  471. }
  472. }
  473. func queryKeyValue(redirectURL string, key string, value string) error {
  474. req, err := http.NewRequest("GET", redirectURL, nil)
  475. if err != nil {
  476. return err
  477. }
  478. q := req.URL.Query()
  479. q.Add(key, value)
  480. req.URL.RawQuery = q.Encode()
  481. client := &http.Client{}
  482. _, err = client.Do(req)
  483. return err
  484. }
  485. type MockAzureHelper struct {
  486. mock.Mock
  487. }
  488. func (s *MockAzureHelper) getDeviceCodeFlowToken(ce CloudEnvironment) (adal.Token, error) {
  489. args := s.Called(ce)
  490. return args.Get(0).(adal.Token), args.Error(1)
  491. }
  492. func (s *MockAzureHelper) queryToken(ce CloudEnvironment, data url.Values, tenantID string) (token azureToken, err error) {
  493. args := s.Called(ce, data, tenantID)
  494. return args.Get(0).(azureToken), args.Error(1)
  495. }
  496. func (s *MockAzureHelper) queryAPIWithHeader(ctx context.Context, authorizationURL string, authorizationHeader string) ([]byte, int, error) {
  497. args := s.Called(ctx, authorizationURL, authorizationHeader)
  498. return args.Get(0).([]byte), args.Int(1), args.Error(2)
  499. }
  500. func (s *MockAzureHelper) openAzureLoginPage(redirectURL string, ce CloudEnvironment) error {
  501. args := s.Called(redirectURL, ce)
  502. return args.Error(0)
  503. }
  504. type MockCloudEnvironmentService struct {
  505. mock.Mock
  506. }
  507. func (s *MockCloudEnvironmentService) Get(name string) (CloudEnvironment, error) {
  508. args := s.Called(name)
  509. return args.Get(0).(CloudEnvironment), args.Error(1)
  510. }