@@ -9,19 +9,22 @@ import (
9
9
10
10
"github.com/RangelReale/osin"
11
11
"github.com/RangelReale/osincli"
12
+
12
13
apierrs "k8s.io/apimachinery/pkg/api/errors"
13
14
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
15
+ "k8s.io/apimachinery/pkg/runtime"
16
+ "k8s.io/apiserver/pkg/authentication/user"
17
+ clienttesting "k8s.io/client-go/testing"
14
18
15
19
"github.com/openshift/origin/pkg/auth/api"
16
20
"github.com/openshift/origin/pkg/auth/oauth/handlers"
17
21
"github.com/openshift/origin/pkg/auth/userregistry/identitymapper"
18
22
oapi "github.com/openshift/origin/pkg/oauth/apis/oauth"
19
- "github.com/openshift/origin/pkg/oauth/registry/test "
23
+ oauthfake "github.com/openshift/origin/pkg/oauth/generated/internalclientset/fake "
20
24
"github.com/openshift/origin/pkg/oauth/server/osinserver"
21
25
"github.com/openshift/origin/pkg/oauth/server/osinserver/registrystorage"
22
26
userapi "github.com/openshift/origin/pkg/user/apis/user"
23
27
usertest "github.com/openshift/origin/pkg/user/registry/test"
24
- "k8s.io/apiserver/pkg/authentication/user"
25
28
)
26
29
27
30
type testHandlers struct {
@@ -167,6 +170,7 @@ func TestRegistryAndServer(t *testing.T) {
167
170
Name : "user" ,
168
171
},
169
172
ClientAuth : & oapi.OAuthClientAuthorization {
173
+ ObjectMeta : metav1.ObjectMeta {Name : "user:test" },
170
174
UserName : "user" ,
171
175
ClientName : "test" ,
172
176
Scopes : []string {"user:info" },
@@ -185,6 +189,7 @@ func TestRegistryAndServer(t *testing.T) {
185
189
Name : "user" ,
186
190
},
187
191
ClientAuth : & oapi.OAuthClientAuthorization {
192
+ ObjectMeta : metav1.ObjectMeta {Name : "user:test" },
188
193
UserName : "user" ,
189
194
ClientName : "test" ,
190
195
Scopes : []string {"user:info" , "user:check-access" },
@@ -203,6 +208,7 @@ func TestRegistryAndServer(t *testing.T) {
203
208
Name : "user" ,
204
209
},
205
210
ClientAuth : & oapi.OAuthClientAuthorization {
211
+ ObjectMeta : metav1.ObjectMeta {Name : "user:test" },
206
212
UserName : "user" ,
207
213
ClientName : "test" ,
208
214
Scopes : []string {"user:full" },
@@ -227,20 +233,15 @@ func TestRegistryAndServer(t *testing.T) {
227
233
h := & testHandlers {}
228
234
h .Authenticate = testCase .AuthSuccess
229
235
h .User = testCase .AuthUser
230
- access , authorize := & test.AccessTokenRegistry {}, & test.AuthorizeTokenRegistry {}
231
- client := & test.ClientRegistry {
232
- Client : testCase .Client ,
233
- }
234
- if testCase .Client == nil {
235
- client .Err = apierrs .NewNotFound (oapi .Resource ("OAuthClient" ), "unknown" )
236
+ objs := []runtime.Object {}
237
+ if testCase .Client != nil {
238
+ objs = append (objs , testCase .Client )
236
239
}
237
- grant := & test. ClientAuthorizationRegistry {
238
- ClientAuthorization : testCase .ClientAuth ,
240
+ if testCase . ClientAuth != nil {
241
+ objs = append ( objs , testCase .ClientAuth )
239
242
}
240
- if testCase .ClientAuth == nil {
241
- grant .GetErr = apierrs .NewNotFound (oapi .Resource ("OAuthClientAuthorization" ), "test:test" )
242
- }
243
- storage := registrystorage .New (access , authorize , client , NewUserConversion ())
243
+ fakeOAuthClient := oauthfake .NewSimpleClientset (objs ... )
244
+ storage := registrystorage .New (fakeOAuthClient .Oauth ().OAuthAccessTokens (), fakeOAuthClient .Oauth ().OAuthAuthorizeTokens (), fakeOAuthClient .Oauth ().OAuthClients (), NewUserConversion ())
244
245
config := osinserver .NewDefaultServerConfig ()
245
246
246
247
h .AuthorizeHandler = osinserver.AuthorizeHandlers {
@@ -250,7 +251,7 @@ func TestRegistryAndServer(t *testing.T) {
250
251
h ,
251
252
),
252
253
handlers .NewGrantCheck (
253
- NewClientAuthorizationGrantChecker (grant ),
254
+ NewClientAuthorizationGrantChecker (fakeOAuthClient . Oauth (). OAuthClientAuthorizations () ),
254
255
h ,
255
256
h ,
256
257
),
@@ -299,9 +300,9 @@ func TestRegistryAndServer(t *testing.T) {
299
300
}
300
301
301
302
func TestAuthenticateTokenNotFound (t * testing.T ) {
302
- tokenRegistry := & test. AccessTokenRegistry { Err : apierrs . NewNotFound ( oapi . Resource ( "OAuthAccessToken" ), "token" )}
303
+ fakeOAuthClient := oauthfake . NewSimpleClientset ()
303
304
userRegistry := usertest .NewUserRegistry ()
304
- tokenAuthenticator := NewTokenAuthenticator (tokenRegistry , userRegistry , identitymapper.NoopGroupMapper {})
305
+ tokenAuthenticator := NewTokenAuthenticator (fakeOAuthClient . Oauth (). OAuthAccessTokens () , userRegistry , identitymapper.NoopGroupMapper {})
305
306
306
307
userInfo , found , err := tokenAuthenticator .AuthenticateToken ("token" )
307
308
if found {
@@ -318,9 +319,12 @@ func TestAuthenticateTokenNotFound(t *testing.T) {
318
319
}
319
320
}
320
321
func TestAuthenticateTokenOtherGetError (t * testing.T ) {
321
- tokenRegistry := & test.AccessTokenRegistry {Err : errors .New ("get error" )}
322
+ fakeOAuthClient := oauthfake .NewSimpleClientset ()
323
+ fakeOAuthClient .PrependReactor ("get" , "oauthaccesstokens" , func (action clienttesting.Action ) (handled bool , ret runtime.Object , err error ) {
324
+ return true , nil , errors .New ("get error" )
325
+ })
322
326
userRegistry := usertest .NewUserRegistry ()
323
- tokenAuthenticator := NewTokenAuthenticator (tokenRegistry , userRegistry , identitymapper.NoopGroupMapper {})
327
+ tokenAuthenticator := NewTokenAuthenticator (fakeOAuthClient . Oauth (). OAuthAccessTokens () , userRegistry , identitymapper.NoopGroupMapper {})
324
328
325
329
userInfo , found , err := tokenAuthenticator .AuthenticateToken ("token" )
326
330
if found {
@@ -329,23 +333,22 @@ func TestAuthenticateTokenOtherGetError(t *testing.T) {
329
333
if err == nil {
330
334
t .Error ("Expected error is missing!" )
331
335
}
332
- if err .Error () != tokenRegistry . Err . Error () {
333
- t .Errorf ("Expected error %v, but got error %v" , tokenRegistry . Err , err )
336
+ if err .Error () != "get error" {
337
+ t .Errorf ("Expected error %v, but got error %v" , "get error" , err )
334
338
}
335
339
if userInfo != nil {
336
340
t .Errorf ("Unexpected user: %v" , userInfo )
337
341
}
338
342
}
339
343
func TestAuthenticateTokenExpired (t * testing.T ) {
340
- tokenRegistry := & test.AccessTokenRegistry {
341
- Err : nil ,
342
- AccessToken : & oapi.OAuthAccessToken {
343
- ObjectMeta : metav1.ObjectMeta {CreationTimestamp : metav1.Time {Time : time .Now ().Add (- 1 * time .Hour )}},
344
+ fakeOAuthClient := oauthfake .NewSimpleClientset (
345
+ & oapi.OAuthAccessToken {
346
+ ObjectMeta : metav1.ObjectMeta {Name : "token" , CreationTimestamp : metav1.Time {Time : time .Now ().Add (- 1 * time .Hour )}},
344
347
ExpiresIn : 600 , // 10 minutes
345
348
},
346
- }
349
+ )
347
350
userRegistry := usertest .NewUserRegistry ()
348
- tokenAuthenticator := NewTokenAuthenticator (tokenRegistry , userRegistry , identitymapper.NoopGroupMapper {})
351
+ tokenAuthenticator := NewTokenAuthenticator (fakeOAuthClient . Oauth (). OAuthAccessTokens () , userRegistry , identitymapper.NoopGroupMapper {})
349
352
350
353
userInfo , found , err := tokenAuthenticator .AuthenticateToken ("token" )
351
354
if found {
@@ -359,19 +362,18 @@ func TestAuthenticateTokenExpired(t *testing.T) {
359
362
}
360
363
}
361
364
func TestAuthenticateTokenValidated (t * testing.T ) {
362
- tokenRegistry := & test.AccessTokenRegistry {
363
- Err : nil ,
364
- AccessToken : & oapi.OAuthAccessToken {
365
- ObjectMeta : metav1.ObjectMeta {CreationTimestamp : metav1.Time {Time : time .Now ()}},
365
+ fakeOAuthClient := oauthfake .NewSimpleClientset (
366
+ & oapi.OAuthAccessToken {
367
+ ObjectMeta : metav1.ObjectMeta {Name : "token" , CreationTimestamp : metav1.Time {Time : time .Now ()}},
366
368
ExpiresIn : 600 , // 10 minutes
367
369
UserName : "foo" ,
368
370
UserUID : string ("bar" ),
369
371
},
370
- }
372
+ )
371
373
userRegistry := usertest .NewUserRegistry ()
372
374
userRegistry .GetUsers ["foo" ] = & userapi.User {ObjectMeta : metav1.ObjectMeta {UID : "bar" }}
373
375
374
- tokenAuthenticator := NewTokenAuthenticator (tokenRegistry , userRegistry , identitymapper.NoopGroupMapper {})
376
+ tokenAuthenticator := NewTokenAuthenticator (fakeOAuthClient . Oauth (). OAuthAccessTokens () , userRegistry , identitymapper.NoopGroupMapper {})
375
377
376
378
userInfo , found , err := tokenAuthenticator .AuthenticateToken ("token" )
377
379
if ! found {
0 commit comments