auth_handler.go: ignore encoding timestamp for deterministic tests
Signed-off-by: Ryan Richard <richardry@vmware.com>
This commit is contained in:
parent
6d380c629a
commit
3a943a3b9a
@ -248,6 +248,7 @@ func TestAuthorizationEndpoint(t *testing.T) {
|
|||||||
wantCSRFCookieHeader string
|
wantCSRFCookieHeader string
|
||||||
|
|
||||||
wantUpstreamStateParamInLocationHeader bool
|
wantUpstreamStateParamInLocationHeader bool
|
||||||
|
wantBodyStringWithLocationInHref bool
|
||||||
}
|
}
|
||||||
tests := []testCase{
|
tests := []testCase{
|
||||||
{
|
{
|
||||||
@ -262,13 +263,10 @@ func TestAuthorizationEndpoint(t *testing.T) {
|
|||||||
path: happyGetRequestPath,
|
path: happyGetRequestPath,
|
||||||
wantStatus: http.StatusFound,
|
wantStatus: http.StatusFound,
|
||||||
wantContentType: "text/html; charset=utf-8",
|
wantContentType: "text/html; charset=utf-8",
|
||||||
wantBodyString: fmt.Sprintf(`<a href="%s">Found</a>.%s`,
|
|
||||||
html.EscapeString(expectedRedirectLocation(expectedUpstreamStateParam(nil))),
|
|
||||||
"\n\n",
|
|
||||||
),
|
|
||||||
wantCSRFCookieHeader: happyCSRFSetCookieHeaderValue,
|
wantCSRFCookieHeader: happyCSRFSetCookieHeaderValue,
|
||||||
wantLocationHeader: expectedRedirectLocation(expectedUpstreamStateParam(nil)),
|
wantLocationHeader: expectedRedirectLocation(expectedUpstreamStateParam(nil)),
|
||||||
wantUpstreamStateParamInLocationHeader: true,
|
wantUpstreamStateParamInLocationHeader: true,
|
||||||
|
wantBodyStringWithLocationInHref: true,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "happy path using POST",
|
name: "happy path using POST",
|
||||||
@ -303,17 +301,12 @@ func TestAuthorizationEndpoint(t *testing.T) {
|
|||||||
}),
|
}),
|
||||||
wantStatus: http.StatusFound,
|
wantStatus: http.StatusFound,
|
||||||
wantContentType: "text/html; charset=utf-8",
|
wantContentType: "text/html; charset=utf-8",
|
||||||
wantBodyString: fmt.Sprintf(`<a href="%s">Found</a>.%s`,
|
|
||||||
html.EscapeString(expectedRedirectLocation(expectedUpstreamStateParam(map[string]string{
|
|
||||||
"redirect_uri": downstreamRedirectURIWithDifferentPort, // not the same port number that is registered for the client
|
|
||||||
}))),
|
|
||||||
"\n\n",
|
|
||||||
),
|
|
||||||
wantCSRFCookieHeader: happyCSRFSetCookieHeaderValue,
|
wantCSRFCookieHeader: happyCSRFSetCookieHeaderValue,
|
||||||
wantLocationHeader: expectedRedirectLocation(expectedUpstreamStateParam(map[string]string{
|
wantLocationHeader: expectedRedirectLocation(expectedUpstreamStateParam(map[string]string{
|
||||||
"redirect_uri": downstreamRedirectURIWithDifferentPort, // not the same port number that is registered for the client
|
"redirect_uri": downstreamRedirectURIWithDifferentPort, // not the same port number that is registered for the client
|
||||||
})),
|
})),
|
||||||
wantUpstreamStateParamInLocationHeader: true,
|
wantUpstreamStateParamInLocationHeader: true,
|
||||||
|
wantBodyStringWithLocationInHref: true,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "downstream redirect uri does not match what is configured for client",
|
name: "downstream redirect uri does not match what is configured for client",
|
||||||
@ -494,13 +487,10 @@ func TestAuthorizationEndpoint(t *testing.T) {
|
|||||||
path: modifiedHappyGetRequestPath(map[string]string{"prompt": "none login", "scope": "email"}),
|
path: modifiedHappyGetRequestPath(map[string]string{"prompt": "none login", "scope": "email"}),
|
||||||
wantStatus: http.StatusFound,
|
wantStatus: http.StatusFound,
|
||||||
wantContentType: "text/html; charset=utf-8",
|
wantContentType: "text/html; charset=utf-8",
|
||||||
wantBodyString: fmt.Sprintf(`<a href="%s">Found</a>.%s`,
|
|
||||||
html.EscapeString(expectedRedirectLocation(expectedUpstreamStateParam(map[string]string{"prompt": "none login", "scope": "email"}))),
|
|
||||||
"\n\n",
|
|
||||||
),
|
|
||||||
wantCSRFCookieHeader: happyCSRFSetCookieHeaderValue,
|
wantCSRFCookieHeader: happyCSRFSetCookieHeaderValue,
|
||||||
wantLocationHeader: expectedRedirectLocation(expectedUpstreamStateParam(map[string]string{"prompt": "none login", "scope": "email"})),
|
wantLocationHeader: expectedRedirectLocation(expectedUpstreamStateParam(map[string]string{"prompt": "none login", "scope": "email"})),
|
||||||
wantUpstreamStateParamInLocationHeader: true,
|
wantUpstreamStateParamInLocationHeader: true,
|
||||||
|
wantBodyStringWithLocationInHref: true,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "state does not have enough entropy",
|
name: "state does not have enough entropy",
|
||||||
@ -634,18 +624,24 @@ func TestAuthorizationEndpoint(t *testing.T) {
|
|||||||
require.Equal(t, test.wantStatus, rsp.Code)
|
require.Equal(t, test.wantStatus, rsp.Code)
|
||||||
requireEqualContentType(t, rsp.Header().Get("Content-Type"), test.wantContentType)
|
requireEqualContentType(t, rsp.Header().Get("Content-Type"), test.wantContentType)
|
||||||
|
|
||||||
if test.wantLocationHeader != "" {
|
|
||||||
actualLocation := rsp.Header().Get("Location")
|
actualLocation := rsp.Header().Get("Location")
|
||||||
|
if test.wantLocationHeader != "" {
|
||||||
if test.wantUpstreamStateParamInLocationHeader {
|
if test.wantUpstreamStateParamInLocationHeader {
|
||||||
requireEqualDecodedStateParams(t, actualLocation, test.wantLocationHeader, test.encoder)
|
requireEqualDecodedStateParams(t, actualLocation, test.wantLocationHeader, test.encoder)
|
||||||
}
|
}
|
||||||
requireEqualURLs(t, actualLocation, test.wantLocationHeader)
|
// The upstream state param is encoded using a timestamp at the beginning so we don't want to
|
||||||
|
// compare those states since they may be different, but we do want to compare the downstream
|
||||||
|
// state param that should be exactly the same.
|
||||||
|
requireEqualURLs(t, actualLocation, test.wantLocationHeader, test.wantUpstreamStateParamInLocationHeader)
|
||||||
} else {
|
} else {
|
||||||
require.Empty(t, rsp.Header().Values("Location"))
|
require.Empty(t, rsp.Header().Values("Location"))
|
||||||
}
|
}
|
||||||
|
|
||||||
if test.wantBodyJSON != "" {
|
if test.wantBodyJSON != "" {
|
||||||
require.JSONEq(t, test.wantBodyJSON, rsp.Body.String())
|
require.JSONEq(t, test.wantBodyJSON, rsp.Body.String())
|
||||||
|
} else if test.wantBodyStringWithLocationInHref {
|
||||||
|
anchorTagWithLocationHref := fmt.Sprintf("<a href=\"%s\">Found</a>.\n\n", html.EscapeString(actualLocation))
|
||||||
|
require.Equal(t, anchorTagWithLocationHref, rsp.Body.String())
|
||||||
} else {
|
} else {
|
||||||
require.Equal(t, test.wantBodyString, rsp.Body.String())
|
require.Equal(t, test.wantBodyString, rsp.Body.String())
|
||||||
}
|
}
|
||||||
@ -769,7 +765,7 @@ func requireEqualDecodedStateParams(t *testing.T, actualURL string, expectedURL
|
|||||||
require.Equal(t, expectedDecodedStateParam, actualDecodedStateParam)
|
require.Equal(t, expectedDecodedStateParam, actualDecodedStateParam)
|
||||||
}
|
}
|
||||||
|
|
||||||
func requireEqualURLs(t *testing.T, actualURL string, expectedURL string) {
|
func requireEqualURLs(t *testing.T, actualURL string, expectedURL string, ignoreState bool) {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
actualLocationURL, err := url.Parse(actualURL)
|
actualLocationURL, err := url.Parse(actualURL)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
@ -779,7 +775,16 @@ func requireEqualURLs(t *testing.T, actualURL string, expectedURL string) {
|
|||||||
require.Equal(t, expectedLocationURL.User, actualLocationURL.User)
|
require.Equal(t, expectedLocationURL.User, actualLocationURL.User)
|
||||||
require.Equal(t, expectedLocationURL.Host, actualLocationURL.Host)
|
require.Equal(t, expectedLocationURL.Host, actualLocationURL.Host)
|
||||||
require.Equal(t, expectedLocationURL.Path, actualLocationURL.Path)
|
require.Equal(t, expectedLocationURL.Path, actualLocationURL.Path)
|
||||||
require.Equal(t, expectedLocationURL.Query(), actualLocationURL.Query())
|
|
||||||
|
expectedLocationQuery := expectedLocationURL.Query()
|
||||||
|
actualLocationQuery := actualLocationURL.Query()
|
||||||
|
// Let the caller ignore the state, since it may contain a digest at the end that is difficult to
|
||||||
|
// predict because it depends on a time.Now() timestamp.
|
||||||
|
if ignoreState {
|
||||||
|
expectedLocationQuery.Del("state")
|
||||||
|
actualLocationQuery.Del("state")
|
||||||
|
}
|
||||||
|
require.Equal(t, expectedLocationQuery, actualLocationQuery)
|
||||||
}
|
}
|
||||||
|
|
||||||
func newIDPListGetter(upstreamOIDCIdentityProviders ...provider.UpstreamOIDCIdentityProvider) provider.DynamicUpstreamIDPProvider {
|
func newIDPListGetter(upstreamOIDCIdentityProviders ...provider.UpstreamOIDCIdentityProvider) provider.DynamicUpstreamIDPProvider {
|
||||||
|
Loading…
Reference in New Issue
Block a user