components-contrib/middleware/http/oauth2clientcredentials/oauth2clientcredentials_mid...

181 lines
6.2 KiB
Go

// ------------------------------------------------------------
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
// ------------------------------------------------------------
package oauth2clientcredentials
import (
"testing"
"time"
mock "github.com/dapr/components-contrib/middleware/http/oauth2clientcredentials/mocks"
"github.com/dapr/dapr/pkg/logger"
"github.com/dapr/components-contrib/middleware"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
fh "github.com/valyala/fasthttp"
oauth2 "golang.org/x/oauth2"
)
func mockedRequestHandler(ctx *fh.RequestCtx) {}
// TestOAuth2ClientCredentialsMetadata will check
// - if the metadata checks are correct in place
func TestOAuth2ClientCredentialsMetadata(t *testing.T) {
// Specify components metadata
var metadata middleware.Metadata
// Missing all
metadata.Properties = map[string]string{}
log := logger.NewLogger("oauth2clientcredentials.test")
_, err := NewOAuth2ClientCredentialsMiddleware(log).GetHandler(metadata)
assert.EqualError(t, err, "Parameter 'headerName' needs to be set. Parameter 'clientID' needs to be set. Parameter 'clientSecret' needs to be set. Parameter 'scopes' needs to be set. Parameter 'tokenURL' needs to be set. Parameter 'authStyle' needs to be set. Parameter 'authStyle' can only have the values 0,1,2. Received: ''. ")
// Invalid authStyle (non int)
metadata.Properties = map[string]string{
"clientID": "testId",
"clientSecret": "testSecret",
"scopes": "ascope",
"tokenURL": "https://localhost:9999",
"headerName": "someHeader",
"authStyle": "asdf", // This is the value to test
}
_, err2 := NewOAuth2ClientCredentialsMiddleware(log).GetHandler(metadata)
assert.EqualError(t, err2, "Parameter 'authStyle' can only have the values 0,1,2. Received: 'asdf'. ")
// Invalid authStyle (int > 2)
metadata.Properties["authStyle"] = "3"
_, err3 := NewOAuth2ClientCredentialsMiddleware(log).GetHandler(metadata)
assert.EqualError(t, err3, "Parameter 'authStyle' can only have the values 0,1,2. Received: '3'. ")
// Invalid authStyle (int < 0)
metadata.Properties["authStyle"] = "-1"
_, err4 := NewOAuth2ClientCredentialsMiddleware(log).GetHandler(metadata)
assert.EqualError(t, err4, "Parameter 'authStyle' can only have the values 0,1,2. Received: '-1'. ")
}
// TestOAuth2ClientCredentialsToken will check
// - if the Token was added to the RequestHeader value specified
func TestOAuth2ClientCredentialsToken(t *testing.T) {
// Setup
mockCtrl := gomock.NewController(t)
defer mockCtrl.Finish()
// Mock mockTokenProvider
mockTokenProvider := mock.NewMockTokenProviderInterface(mockCtrl)
gomock.InOrder(
// First call returning abc and Bearer, expires within 1 second
mockTokenProvider.
EXPECT().
GetToken(gomock.Any()).
Return(&oauth2.Token{
AccessToken: "abcd",
TokenType: "Bearer",
Expiry: time.Now().In(time.UTC).Add(1 * time.Second),
}, nil).
Times(1),
)
// Specify components metadata
var metadata middleware.Metadata
metadata.Properties = map[string]string{
"clientID": "testId",
"clientSecret": "testSecret",
"scopes": "ascope",
"tokenURL": "https://localhost:9999",
"headerName": "someHeader",
"authStyle": "1",
}
// Initialize middleware component and inject mocked TokenProvider
log := logger.NewLogger("oauth2clientcredentials.test")
oauth2clientcredentialsMiddleware := NewOAuth2ClientCredentialsMiddleware(log)
oauth2clientcredentialsMiddleware.SetTokenProvider(mockTokenProvider)
handler, err := oauth2clientcredentialsMiddleware.GetHandler(metadata)
require.NoError(t, err)
// First handler call should return abc Token
var requestContext1 fh.RequestCtx
handler(mockedRequestHandler)(&requestContext1)
// Assertion
assert.Equal(t, "Bearer abcd", string(requestContext1.Request.Header.Peek("someHeader")))
}
// TestOAuth2ClientCredentialsCache will check
// - if the Cache is working
func TestOAuth2ClientCredentialsCache(t *testing.T) {
// Setup
mockCtrl := gomock.NewController(t)
defer mockCtrl.Finish()
// Mock mockTokenProvider
mockTokenProvider := mock.NewMockTokenProviderInterface(mockCtrl)
gomock.InOrder(
// First call returning abc and Bearer, expires within 1 second
mockTokenProvider.
EXPECT().
GetToken(gomock.Any()).
Return(&oauth2.Token{
AccessToken: "abc",
TokenType: "Bearer",
Expiry: time.Now().In(time.UTC).Add(1 * time.Second),
}, nil).
Times(1),
// Second call returning def and MAC, expires within 1 second
mockTokenProvider.
EXPECT().
GetToken(gomock.Any()).
Return(&oauth2.Token{
AccessToken: "def",
TokenType: "MAC",
Expiry: time.Now().In(time.UTC).Add(1 * time.Second),
}, nil).
Times(1),
)
// Specify components metadata
var metadata middleware.Metadata
metadata.Properties = map[string]string{
"clientID": "testId",
"clientSecret": "testSecret",
"scopes": "ascope",
"tokenURL": "https://localhost:9999",
"headerName": "someHeader",
"authStyle": "1",
}
// Initialize middleware component and inject mocked TokenProvider
log := logger.NewLogger("oauth2clientcredentials.test")
oauth2clientcredentialsMiddleware := NewOAuth2ClientCredentialsMiddleware(log)
oauth2clientcredentialsMiddleware.SetTokenProvider(mockTokenProvider)
handler, err := oauth2clientcredentialsMiddleware.GetHandler(metadata)
require.NoError(t, err)
// First handler call should return abc Token
var requestContext1 fh.RequestCtx
handler(mockedRequestHandler)(&requestContext1)
// Assertion
assert.Equal(t, "Bearer abc", string(requestContext1.Request.Header.Peek("someHeader")))
// Second handler call should still return 'cached' abc Token
var requestContext2 fh.RequestCtx
handler(mockedRequestHandler)(&requestContext2)
// Assertion
assert.Equal(t, "Bearer abc", string(requestContext2.Request.Header.Peek("someHeader")))
// Wait at a second to invalidate cache entry for abc
time.Sleep(1 * time.Second)
// Third call should return def Token
var requestContext3 fh.RequestCtx
handler(mockedRequestHandler)(&requestContext3)
// Assertion
assert.Equal(t, "MAC def", string(requestContext3.Request.Header.Peek("someHeader")))
}