@@ -115,10 +115,6 @@ var invalidHTTPClientConfigs = []struct {
115
115
httpClientConfigFile : "testdata/http.conf.oauth2-no-client-id.bad.yaml" ,
116
116
errMsg : "oauth2 client_id must be configured" ,
117
117
},
118
- {
119
- httpClientConfigFile : "testdata/http.conf.oauth2-no-client-secret.bad.yaml" ,
120
- errMsg : "either oauth2 client_secret or client_secret_file must be configured" ,
121
- },
122
118
{
123
119
httpClientConfigFile : "testdata/http.conf.oauth2-no-token-url.bad.yaml" ,
124
120
errMsg : "oauth2 token_url must be configured" ,
@@ -423,6 +419,46 @@ func TestNewClientFromConfig(t *testing.T) {
423
419
}
424
420
},
425
421
},
422
+ {
423
+ clientConfig : HTTPClientConfig {
424
+ OAuth2 : & OAuth2 {
425
+ ClientID : "ExpectedUsername" ,
426
+ TLSConfig : TLSConfig {
427
+ CAFile : TLSCAChainPath ,
428
+ CertFile : ClientCertificatePath ,
429
+ KeyFile : ClientKeyNoPassPath ,
430
+ ServerName : "" ,
431
+ InsecureSkipVerify : false ,
432
+ },
433
+ },
434
+ TLSConfig : TLSConfig {
435
+ CAFile : TLSCAChainPath ,
436
+ CertFile : ClientCertificatePath ,
437
+ KeyFile : ClientKeyNoPassPath ,
438
+ ServerName : "" ,
439
+ InsecureSkipVerify : false ,
440
+ },
441
+ },
442
+ handler : func (w http.ResponseWriter , r * http.Request ) {
443
+ switch r .URL .Path {
444
+ case "/token" :
445
+ res , _ := json .Marshal (oauth2TestServerResponse {
446
+ AccessToken : ExpectedAccessToken ,
447
+ TokenType : "Bearer" ,
448
+ })
449
+ w .Header ().Add ("Content-Type" , "application/json" )
450
+ _ , _ = w .Write (res )
451
+
452
+ default :
453
+ authorization := r .Header .Get ("Authorization" )
454
+ if authorization != "Bearer " + ExpectedAccessToken {
455
+ fmt .Fprintf (w , "Expected Authorization header %q, got %q" , "Bearer " + ExpectedAccessToken , authorization )
456
+ } else {
457
+ fmt .Fprint (w , ExpectedMessage )
458
+ }
459
+ }
460
+ },
461
+ },
426
462
{
427
463
clientConfig : HTTPClientConfig {
428
464
OAuth2 : & OAuth2 {
@@ -1448,38 +1484,81 @@ type oauth2TestServerResponse struct {
1448
1484
TokenType string `json:"token_type"`
1449
1485
}
1450
1486
1451
- func TestOAuth2 (t * testing.T ) {
1452
- ts := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
1487
+ type testOAuthServer struct {
1488
+ tokenTS * httptest.Server
1489
+ ts * httptest.Server
1490
+ }
1491
+
1492
+ // newTestOAuthServer returns a new test server with the expected base64 encoded client ID and secret.
1493
+ func newTestOAuthServer (t testing.TB , expectedAuth * string ) testOAuthServer {
1494
+ var previousAuth string
1495
+ tokenTS := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
1496
+ auth := r .Header .Get ("Authorization" )
1497
+ if auth != * expectedAuth {
1498
+ t .Fatalf ("bad auth, expected %s, got %s" , * expectedAuth , auth )
1499
+ }
1500
+ if auth == previousAuth {
1501
+ t .Fatal ("token endpoint called twice" )
1502
+ }
1503
+ previousAuth = auth
1453
1504
res , _ := json .Marshal (oauth2TestServerResponse {
1454
1505
AccessToken : "12345" ,
1455
1506
TokenType : "Bearer" ,
1456
1507
})
1457
1508
w .Header ().Add ("Content-Type" , "application/json" )
1458
1509
_ , _ = w .Write (res )
1459
1510
}))
1460
- defer ts .Close ()
1511
+ ts := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
1512
+ auth := r .Header .Get ("Authorization" )
1513
+ if auth != "Bearer 12345" {
1514
+ t .Fatalf ("bad auth, expected %s, got %s" , "Bearer 12345" , auth )
1515
+ }
1516
+ fmt .Fprintln (w , "Hello, client" )
1517
+ }))
1518
+ return testOAuthServer {
1519
+ tokenTS : tokenTS ,
1520
+ ts : ts ,
1521
+ }
1522
+ }
1523
+
1524
+ func (s * testOAuthServer ) url () string {
1525
+ return s .ts .URL
1526
+ }
1527
+
1528
+ func (s * testOAuthServer ) tokenURL () string {
1529
+ return s .tokenTS .URL
1530
+ }
1531
+
1532
+ func (s * testOAuthServer ) close () {
1533
+ s .tokenTS .Close ()
1534
+ s .ts .Close ()
1535
+ }
1536
+
1537
+ func TestOAuth2 (t * testing.T ) {
1538
+ var expectedAuth string
1539
+ ts := newTestOAuthServer (t , & expectedAuth )
1540
+ defer ts .close ()
1461
1541
1462
1542
yamlConfig := fmt .Sprintf (`
1463
1543
client_id: 1
1464
1544
client_secret: 2
1465
1545
scopes:
1466
1546
- A
1467
1547
- B
1468
- token_url: %s/token
1548
+ token_url: %s
1469
1549
endpoint_params:
1470
1550
hi: hello
1471
- ` , ts .URL )
1551
+ ` , ts .tokenURL () )
1472
1552
expectedConfig := OAuth2 {
1473
1553
ClientID : "1" ,
1474
1554
ClientSecret : "2" ,
1475
1555
Scopes : []string {"A" , "B" },
1476
1556
EndpointParams : map [string ]string {"hi" : "hello" },
1477
- TokenURL : fmt . Sprintf ( "%s/token" , ts .URL ),
1557
+ TokenURL : ts .tokenURL ( ),
1478
1558
}
1479
1559
1480
1560
var unmarshalledConfig OAuth2
1481
- err := yaml .Unmarshal ([]byte (yamlConfig ), & unmarshalledConfig )
1482
- if err != nil {
1561
+ if err := yaml .Unmarshal ([]byte (yamlConfig ), & unmarshalledConfig ); err != nil {
1483
1562
t .Fatalf ("Expected no error unmarshalling yaml, got %v" , err )
1484
1563
}
1485
1564
if ! reflect .DeepEqual (unmarshalledConfig , expectedConfig ) {
@@ -1491,9 +1570,59 @@ endpoint_params:
1491
1570
client := http.Client {
1492
1571
Transport : rt ,
1493
1572
}
1494
- resp , _ := client .Get (ts .URL )
1573
+
1574
+ // Default secret.
1575
+ expectedAuth = "Basic MToy"
1576
+ resp , err := client .Get (ts .url ())
1577
+ if err != nil {
1578
+ t .Fatal (err )
1579
+ }
1495
1580
1496
1581
authorization := resp .Request .Header .Get ("Authorization" )
1582
+ if authorization != "Bearer 12345" {
1583
+ t .Fatalf ("Expected authorization header to be 'Bearer', got '%s'" , authorization )
1584
+ }
1585
+
1586
+ // Making a second request with the same secret should not re-call the token API.
1587
+ _ , err = client .Get (ts .url ())
1588
+ if err != nil {
1589
+ t .Fatal (err )
1590
+ }
1591
+
1592
+ // Empty secret.
1593
+ expectedAuth = "Basic MTo="
1594
+ expectedConfig .ClientSecret = ""
1595
+ resp , err = client .Get (ts .url ())
1596
+ if err != nil {
1597
+ t .Fatal (err )
1598
+ }
1599
+
1600
+ authorization = resp .Request .Header .Get ("Authorization" )
1601
+ if authorization != "Bearer 12345" {
1602
+ t .Fatalf ("Expected authorization header to be 'Bearer 12345', got '%s'" , authorization )
1603
+ }
1604
+
1605
+ // Making a second request with the same secret should not re-call the token API.
1606
+ resp , err = client .Get (ts .url ())
1607
+ if err != nil {
1608
+ t .Fatal (err )
1609
+ }
1610
+
1611
+ // Update secret.
1612
+ expectedAuth = "Basic MToxMjM0NTY3"
1613
+ expectedConfig .ClientSecret = "1234567"
1614
+ _ , err = client .Get (ts .url ())
1615
+ if err != nil {
1616
+ t .Fatal (err )
1617
+ }
1618
+
1619
+ // Making a second request with the same secret should not re-call the token API.
1620
+ _ , err = client .Get (ts .url ())
1621
+ if err != nil {
1622
+ t .Fatal (err )
1623
+ }
1624
+
1625
+ authorization = resp .Request .Header .Get ("Authorization" )
1497
1626
if authorization != "Bearer 12345" {
1498
1627
t .Fatalf ("Expected authorization header to be 'Bearer 12345', got '%s'" , authorization )
1499
1628
}
@@ -1543,33 +1672,9 @@ func TestOAuth2UserAgent(t *testing.T) {
1543
1672
}
1544
1673
1545
1674
func TestOAuth2WithFile (t * testing.T ) {
1546
- var expectedAuth * string
1547
- var previousAuth string
1548
- tokenTS := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
1549
- auth := r .Header .Get ("Authorization" )
1550
- if auth != * expectedAuth {
1551
- t .Fatalf ("bad auth, expected %s, got %s" , * expectedAuth , auth )
1552
- }
1553
- if auth == previousAuth {
1554
- t .Fatal ("token endpoint called twice" )
1555
- }
1556
- previousAuth = auth
1557
- res , _ := json .Marshal (oauth2TestServerResponse {
1558
- AccessToken : "12345" ,
1559
- TokenType : "Bearer" ,
1560
- })
1561
- w .Header ().Add ("Content-Type" , "application/json" )
1562
- _ , _ = w .Write (res )
1563
- }))
1564
- defer tokenTS .Close ()
1565
- ts := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
1566
- auth := r .Header .Get ("Authorization" )
1567
- if auth != "Bearer 12345" {
1568
- t .Fatalf ("bad auth, expected %s, got %s" , "Bearer 12345" , auth )
1569
- }
1570
- fmt .Fprintln (w , "Hello, client" )
1571
- }))
1572
- defer ts .Close ()
1675
+ var expectedAuth string
1676
+ ts := newTestOAuthServer (t , & expectedAuth )
1677
+ defer ts .close ()
1573
1678
1574
1679
secretFile , err := os .CreateTemp ("" , "oauth2_secret" )
1575
1680
if err != nil {
@@ -1586,13 +1691,13 @@ scopes:
1586
1691
token_url: %s
1587
1692
endpoint_params:
1588
1693
hi: hello
1589
- ` , secretFile .Name (), tokenTS . URL )
1694
+ ` , secretFile .Name (), ts . tokenURL () )
1590
1695
expectedConfig := OAuth2 {
1591
1696
ClientID : "1" ,
1592
1697
ClientSecretFile : secretFile .Name (),
1593
1698
Scopes : []string {"A" , "B" },
1594
1699
EndpointParams : map [string ]string {"hi" : "hello" },
1595
- TokenURL : tokenTS . URL ,
1700
+ TokenURL : ts . tokenURL () ,
1596
1701
}
1597
1702
1598
1703
var unmarshalledConfig OAuth2
@@ -1610,40 +1715,57 @@ endpoint_params:
1610
1715
Transport : rt ,
1611
1716
}
1612
1717
1613
- tk := "Basic MToxMjM0NTY="
1614
- expectedAuth = & tk
1718
+ // Empty secret file.
1719
+ expectedAuth = "Basic MTo="
1720
+ resp , err := client .Get (ts .url ())
1721
+ if err != nil {
1722
+ t .Fatal (err )
1723
+ }
1724
+
1725
+ authorization := resp .Request .Header .Get ("Authorization" )
1726
+ if authorization != "Bearer 12345" {
1727
+ t .Fatalf ("Expected authorization header to be 'Bearer', got '%s'" , authorization )
1728
+ }
1729
+
1730
+ // Making a second request with the same file content should not re-call the token API.
1731
+ _ , err = client .Get (ts .url ())
1732
+ if err != nil {
1733
+ t .Fatal (err )
1734
+ }
1735
+
1736
+ // File populated.
1737
+ expectedAuth = "Basic MToxMjM0NTY="
1615
1738
if _ , err := secretFile .Write ([]byte ("123456" )); err != nil {
1616
1739
t .Fatal (err )
1617
1740
}
1618
- resp , err : = client .Get (ts .URL )
1741
+ resp , err = client .Get (ts .url () )
1619
1742
if err != nil {
1620
1743
t .Fatal (err )
1621
1744
}
1622
1745
1623
- authorization : = resp .Request .Header .Get ("Authorization" )
1746
+ authorization = resp .Request .Header .Get ("Authorization" )
1624
1747
if authorization != "Bearer 12345" {
1625
1748
t .Fatalf ("Expected authorization header to be 'Bearer 12345', got '%s'" , authorization )
1626
1749
}
1627
1750
1628
1751
// Making a second request with the same file content should not re-call the token API.
1629
- resp , err = client .Get (ts .URL )
1752
+ resp , err = client .Get (ts .url () )
1630
1753
if err != nil {
1631
1754
t .Fatal (err )
1632
1755
}
1633
1756
1634
- tk = "Basic MToxMjM0NTY3"
1635
- expectedAuth = & tk
1757
+ // Update file.
1758
+ expectedAuth = "Basic MToxMjM0NTY3"
1636
1759
if _ , err := secretFile .Write ([]byte ("7" )); err != nil {
1637
1760
t .Fatal (err )
1638
1761
}
1639
-
1640
- _ , err = client .Get (ts .URL )
1762
+ _ , err = client .Get (ts .url ())
1641
1763
if err != nil {
1642
1764
t .Fatal (err )
1643
1765
}
1644
1766
1645
1767
// Making a second request with the same file content should not re-call the token API.
1646
- _ , err = client .Get (ts .URL )
1768
+ _ , err = client .Get (ts .url () )
1647
1769
if err != nil {
1648
1770
t .Fatal (err )
1649
1771
}
0 commit comments