| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594 |
- /*
- Copyright 2020 Docker Compose CLI authors
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package login
- import (
- "context"
- "errors"
- "io/ioutil"
- "net/http"
- "net/http/httptest"
- "net/url"
- "os"
- "path/filepath"
- "reflect"
- "sync/atomic"
- "testing"
- "time"
- "github.com/Azure/go-autorest/autorest/adal"
- "github.com/stretchr/testify/mock"
- "gotest.tools/v3/assert"
- "golang.org/x/oauth2"
- )
- func testLoginService(t *testing.T, apiHelperMock *MockAzureHelper, cloudEnvironmentSvc CloudEnvironmentService) (*azureLoginService, error) {
- dir, err := ioutil.TempDir("", "test_store")
- if err != nil {
- return nil, err
- }
- t.Cleanup(func() {
- _ = os.RemoveAll(dir)
- })
- ces := CloudEnvironments
- if cloudEnvironmentSvc != nil {
- ces = cloudEnvironmentSvc
- }
- return newAzureLoginServiceFromPath(filepath.Join(dir, tokenStoreFilename), apiHelperMock, ces)
- }
- func TestRefreshInValidToken(t *testing.T) {
- data := url.Values{
- "grant_type": []string{"refresh_token"},
- "client_id": []string{clientID},
- "scope": []string{"offline_access https://management.docker.com/.default"},
- "refresh_token": []string{"refreshToken"},
- }
- helperMock := &MockAzureHelper{}
- helperMock.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "123456").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- cloudEnvironmentSvcMock := &MockCloudEnvironmentService{}
- cloudEnvironmentSvcMock.On("Get", "AzureDockerCloud").Return(CloudEnvironment{
- Name: "AzureDockerCloud",
- Authentication: CloudEnvironmentAuthentication{
- LoginEndpoint: "https://login.docker.com",
- Audiences: []string{
- "https://management.docker.com",
- "https://management-ext.docker.com",
- },
- Tenant: "common",
- },
- ResourceManagerURL: "https://management.docker.com",
- Suffixes: map[string]string{},
- }, nil)
- azureLogin, err := testLoginService(t, helperMock, cloudEnvironmentSvcMock)
- assert.NilError(t, err)
- err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: time.Now().Add(-1 * time.Hour),
- TokenType: "Bearer",
- },
- CloudEnvironment: "AzureDockerCloud",
- })
- assert.NilError(t, err)
- token, tenantID, err := azureLogin.GetValidToken()
- assert.NilError(t, err)
- assert.Equal(t, tenantID, "123456")
- assert.Equal(t, token.AccessToken, "newAccessToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(token.Expiry))
- storedToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, storedToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, storedToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(storedToken.Token.Expiry))
- assert.Equal(t, storedToken.CloudEnvironment, "AzureDockerCloud")
- }
- func TestDoesNotRefreshValidToken(t *testing.T) {
- expiryDate := time.Now().Add(1 * time.Hour)
- azureLogin, err := testLoginService(t, nil, nil)
- assert.NilError(t, err)
- err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: expiryDate,
- TokenType: "Bearer",
- },
- CloudEnvironment: AzurePublicCloudName,
- })
- assert.NilError(t, err)
- token, tenantID, err := azureLogin.GetValidToken()
- assert.NilError(t, err)
- assert.Equal(t, token.AccessToken, "accessToken")
- assert.Equal(t, tenantID, "123456")
- }
- func TestTokenStoreAssumesAzurePublicCloud(t *testing.T) {
- expiryDate := time.Now().Add(1 * time.Hour)
- azureLogin, err := testLoginService(t, nil, nil)
- assert.NilError(t, err)
- err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
- TenantID: "123456",
- Token: oauth2.Token{
- AccessToken: "accessToken",
- RefreshToken: "refreshToken",
- Expiry: expiryDate,
- TokenType: "Bearer",
- },
- // Simulates upgrade from older version of Docker CLI that did not have cloud environment concept
- CloudEnvironment: "",
- })
- assert.NilError(t, err)
- token, tenantID, err := azureLogin.GetValidToken()
- assert.NilError(t, err)
- assert.Equal(t, tenantID, "123456")
- assert.Equal(t, token.AccessToken, "accessToken")
- ce, err := azureLogin.GetCloudEnvironment()
- assert.NilError(t, err)
- assert.Equal(t, ce.Name, AzurePublicCloudName)
- }
- func TestInvalidLogin(t *testing.T) {
- m := &MockAzureHelper{}
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL := args.Get(0).(string)
- err := queryKeyValue(redirectURL, "error", "access denied: login failed")
- assert.NilError(t, err)
- }).Return(nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(context.TODO(), "", AzurePublicCloudName)
- assert.Error(t, err, "no login code: login failed")
- }
- func TestValidLogin(t *testing.T) {
- var redirectURL string
- ctx := context.TODO()
- m := &MockAzureHelper{}
- ce, err := CloudEnvironments.Get(AzurePublicCloudName)
- assert.NilError(t, err)
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- }).Return(nil)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{ce.GetTokenScope()},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken", ce)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "", AzurePublicCloudName)
- assert.NilError(t, err)
- loginToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
- assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
- assert.Equal(t, loginToken.Token.Type(), "Bearer")
- assert.Equal(t, loginToken.CloudEnvironment, "AzureCloud")
- }
- func TestValidLoginRequestedTenant(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- ce, err := CloudEnvironments.Get(AzurePublicCloudName)
- assert.NilError(t, err)
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- }).Return(nil)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{ce.GetTokenScope()},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/00000000-c56d-43e8-9549-dd230ce8a038","tenantId":"00000000-c56d-43e8-9549-dd230ce8a038"},
- {"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- ctx := context.TODO()
- m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken", ce)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "12345a7c-c56d-43e8-9549-dd230ce8a038", AzurePublicCloudName)
- assert.NilError(t, err)
- loginToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
- assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
- assert.Equal(t, loginToken.Token.Type(), "Bearer")
- assert.Equal(t, loginToken.CloudEnvironment, "AzureCloud")
- }
- func TestLoginNoTenant(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- ce, err := CloudEnvironments.Get(AzurePublicCloudName)
- assert.NilError(t, err)
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- }).Return(nil)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{ce.GetTokenScope()},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- ctx := context.TODO()
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "00000000-c56d-43e8-9549-dd230ce8a038", AzurePublicCloudName)
- assert.Error(t, err, "could not find requested azure tenant 00000000-c56d-43e8-9549-dd230ce8a038: login failed")
- }
- func TestLoginRequestedTenantNotFound(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- ce, err := CloudEnvironments.Get(AzurePublicCloudName)
- assert.NilError(t, err)
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- }).Return(nil)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{ce.GetTokenScope()},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- ctx := context.TODO()
- authBody := `{"value":[]}`
- m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "", AzurePublicCloudName)
- assert.Error(t, err, "could not find azure tenant: login failed")
- }
- func TestLoginAuthorizationFailed(t *testing.T) {
- var redirectURL string
- m := &MockAzureHelper{}
- ce, err := CloudEnvironments.Get(AzurePublicCloudName)
- assert.NilError(t, err)
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- }).Return(nil)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{ce.GetTokenScope()},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `[access denied]`
- ctx := context.TODO()
- m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 400, nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "", AzurePublicCloudName)
- assert.Error(t, err, "unable to login status code 400: [access denied]: login failed")
- }
- func TestValidThroughDeviceCodeFlow(t *testing.T) {
- m := &MockAzureHelper{}
- ce, err := CloudEnvironments.Get(AzurePublicCloudName)
- assert.NilError(t, err)
- m.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Return(errors.New("Could not open browser"))
- m.On("getDeviceCodeFlowToken", mock.AnythingOfType("CloudEnvironment")).Return(adal.Token{AccessToken: "firstAccessToken", RefreshToken: "firstRefreshToken"}, nil)
- authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
- ctx := context.TODO()
- m.On("queryAPIWithHeader", ctx, ce.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken", ce)
- m.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, m, nil)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "", AzurePublicCloudName)
- assert.NilError(t, err)
- loginToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
- assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
- assert.Equal(t, loginToken.Token.Type(), "Bearer")
- assert.Equal(t, loginToken.CloudEnvironment, "AzureCloud")
- }
- func TestNonstandardCloudEnvironment(t *testing.T) {
- dockerCloudMetadata := []byte(`
- [{
- "authentication": {
- "loginEndpoint": "https://login.docker.com/",
- "audiences": [
- "https://management.docker.com/",
- "https://management.cli.docker.com/"
- ],
- "tenant": "F5773994-FE88-482E-9E33-6E799D250416"
- },
- "name": "AzureDockerCloud",
- "suffixes": {
- "acrLoginServer": "azurecr.docker.io"
- },
- "resourceManager": "https://management.docker.com/"
- }]`)
- var metadataReqCount int32
- srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- _, err := w.Write(dockerCloudMetadata)
- assert.NilError(t, err)
- atomic.AddInt32(&metadataReqCount, 1)
- }))
- defer srv.Close()
- cloudMetadataURL, cloudMetadataURLSet := os.LookupEnv(CloudMetadataURLVar)
- if cloudMetadataURLSet {
- defer func() {
- err := os.Setenv(CloudMetadataURLVar, cloudMetadataURL)
- assert.NilError(t, err)
- }()
- }
- err := os.Setenv(CloudMetadataURLVar, srv.URL)
- assert.NilError(t, err)
- ctx := context.TODO()
- ces := newCloudEnvironmentService()
- ces.cloudMetadataURL = srv.URL
- dockerCloudEnv, err := ces.Get("AzureDockerCloud")
- assert.NilError(t, err)
- helperMock := &MockAzureHelper{}
- var redirectURL string
- helperMock.On("openAzureLoginPage", mock.AnythingOfType("string"), mock.AnythingOfType("CloudEnvironment")).Run(func(args mock.Arguments) {
- redirectURL = args.Get(0).(string)
- err := queryKeyValue(redirectURL, "code", "123456879")
- assert.NilError(t, err)
- }).Return(nil)
- helperMock.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), mock.MatchedBy(func(data url.Values) bool {
- //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
- return reflect.DeepEqual(data, url.Values{
- "grant_type": []string{"authorization_code"},
- "client_id": []string{clientID},
- "code": []string{"123456879"},
- "scope": []string{dockerCloudEnv.GetTokenScope()},
- "redirect_uri": []string{redirectURL},
- })
- }), "organizations").Return(azureToken{
- RefreshToken: "firstRefreshToken",
- AccessToken: "firstAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- authBody := `{"value":[{"id":"/tenants/F5773994-FE88-482E-9E33-6E799D250416","tenantId":"F5773994-FE88-482E-9E33-6E799D250416"}]}`
- helperMock.On("queryAPIWithHeader", ctx, dockerCloudEnv.GetTenantQueryURL(), "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
- data := refreshTokenData("firstRefreshToken", dockerCloudEnv)
- helperMock.On("queryToken", mock.AnythingOfType("login.CloudEnvironment"), data, "F5773994-FE88-482E-9E33-6E799D250416").Return(azureToken{
- RefreshToken: "newRefreshToken",
- AccessToken: "newAccessToken",
- ExpiresIn: 3600,
- Foci: "1",
- }, nil)
- azureLogin, err := testLoginService(t, helperMock, ces)
- assert.NilError(t, err)
- err = azureLogin.Login(ctx, "", "AzureDockerCloud")
- assert.NilError(t, err)
- loginToken, err := azureLogin.tokenStore.readToken()
- assert.NilError(t, err)
- assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
- assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
- assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
- assert.Equal(t, loginToken.TenantID, "F5773994-FE88-482E-9E33-6E799D250416")
- assert.Equal(t, loginToken.Token.Type(), "Bearer")
- assert.Equal(t, loginToken.CloudEnvironment, "AzureDockerCloud")
- assert.Equal(t, metadataReqCount, int32(1))
- }
- // Don't warn about refreshToken parameter taking the same value for all invocations
- // nolint:unparam
- func refreshTokenData(refreshToken string, ce CloudEnvironment) url.Values {
- return url.Values{
- "grant_type": []string{"refresh_token"},
- "client_id": []string{clientID},
- "scope": []string{ce.GetTokenScope()},
- "refresh_token": []string{refreshToken},
- }
- }
- func queryKeyValue(redirectURL string, key string, value string) error {
- req, err := http.NewRequest("GET", redirectURL, nil)
- if err != nil {
- return err
- }
- q := req.URL.Query()
- q.Add(key, value)
- req.URL.RawQuery = q.Encode()
- client := &http.Client{}
- _, err = client.Do(req)
- return err
- }
- type MockAzureHelper struct {
- mock.Mock
- }
- func (s *MockAzureHelper) getDeviceCodeFlowToken(ce CloudEnvironment) (adal.Token, error) {
- args := s.Called(ce)
- return args.Get(0).(adal.Token), args.Error(1)
- }
- func (s *MockAzureHelper) queryToken(ce CloudEnvironment, data url.Values, tenantID string) (token azureToken, err error) {
- args := s.Called(ce, data, tenantID)
- return args.Get(0).(azureToken), args.Error(1)
- }
- func (s *MockAzureHelper) queryAPIWithHeader(ctx context.Context, authorizationURL string, authorizationHeader string) ([]byte, int, error) {
- args := s.Called(ctx, authorizationURL, authorizationHeader)
- return args.Get(0).([]byte), args.Int(1), args.Error(2)
- }
- func (s *MockAzureHelper) openAzureLoginPage(redirectURL string, ce CloudEnvironment) error {
- args := s.Called(redirectURL, ce)
- return args.Error(0)
- }
- type MockCloudEnvironmentService struct {
- mock.Mock
- }
- func (s *MockCloudEnvironmentService) Get(name string) (CloudEnvironment, error) {
- args := s.Called(name)
- return args.Get(0).(CloudEnvironment), args.Error(1)
- }
|