@@ -67,7 +67,8 @@ func TestOAuthServiceAccountClient(t *testing.T) {
67
67
if err != nil {
68
68
t .Fatalf ("unexpected error: %v" , err )
69
69
}
70
- clusterAdminOAuthClient := oauthclient .NewForConfigOrDie (clusterAdminClientConfig )
70
+ clusterAdminOAuthClient := oauthclient .NewForConfigOrDie (clusterAdminClientConfig ).Oauth ()
71
+ clusterAdminUserClient := userclient .NewForConfigOrDie (clusterAdminClientConfig )
71
72
72
73
projectName := "hammer-project"
73
74
if _ , _ , err := testserver .CreateNewProject (clusterAdminClientConfig , projectName , "harold" ); err != nil {
@@ -374,6 +375,85 @@ func TestOAuthServiceAccountClient(t *testing.T) {
374
375
})
375
376
clusterAdminOAuthClient .OAuthClientAuthorizations ().Delete ("harold:" + oauthClientConfig .ClientId , nil )
376
377
}
378
+
379
+ {
380
+ oauthClientConfig := & osincli.ClientConfig {
381
+ ClientId : apiserverserviceaccount .MakeUsername (defaultSA .Namespace , defaultSA .Name ),
382
+ ClientSecret : string (oauthSecret .Data [kapi .ServiceAccountTokenKey ]),
383
+ AuthorizeUrl : clusterAdminClientConfig .Host + "/oauth/authorize" ,
384
+ TokenUrl : clusterAdminClientConfig .Host + "/oauth/token" ,
385
+ RedirectUrl : redirectURL ,
386
+ Scope : scope .Join ([]string {"user:info" , "role:edit:" + projectName }),
387
+ SendClientSecretInParams : true ,
388
+ }
389
+ t .Log ("Testing grant flow is reentrant" )
390
+ // First time, the approval steps are needed
391
+ // Second time, the approval steps are skipped
392
+ // Then we delete and recreate the user to make the client authorization UID no longer match
393
+ // Third time, the approval steps are needed
394
+ // Fourth time, the approval steps are skipped
395
+ runOAuthFlow (t , clusterAdminClientConfig , projectName , oauthClientConfig , nil , authorizationCodes , authorizationErrors , true , true , []string {
396
+ "GET /oauth/authorize" ,
397
+ "received challenge" ,
398
+ "GET /oauth/authorize" ,
399
+ "redirect to /oauth/authorize/approve" ,
400
+ "form" ,
401
+ "POST /oauth/authorize/approve" ,
402
+ "redirect to /oauth/authorize" ,
403
+ "redirect to /oauthcallback" ,
404
+ "code" ,
405
+ "scope:" + oauthClientConfig .Scope ,
406
+ })
407
+ runOAuthFlow (t , clusterAdminClientConfig , projectName , oauthClientConfig , nil , authorizationCodes , authorizationErrors , true , true , []string {
408
+ "GET /oauth/authorize" ,
409
+ "received challenge" ,
410
+ "GET /oauth/authorize" ,
411
+ "redirect to /oauthcallback" ,
412
+ "code" ,
413
+ "scope:" + oauthClientConfig .Scope ,
414
+ })
415
+
416
+ // Delete the user to make the client authorization UID no longer match
417
+ // runOAuthFlow will cause the creation of the same user with a different UID during its challenge phase
418
+ if err := deleteUser (clusterAdminUserClient , "harold" ); err != nil {
419
+ t .Fatalf ("Failed to delete and recreate harold user: %v" , err )
420
+ }
421
+
422
+ runOAuthFlow (t , clusterAdminClientConfig , projectName , oauthClientConfig , nil , authorizationCodes , authorizationErrors , true , true , []string {
423
+ "GET /oauth/authorize" ,
424
+ "received challenge" ,
425
+ "GET /oauth/authorize" ,
426
+ "redirect to /oauth/authorize/approve" ,
427
+ "form" ,
428
+ "POST /oauth/authorize/approve" ,
429
+ "redirect to /oauth/authorize" ,
430
+ "redirect to /oauthcallback" ,
431
+ "code" ,
432
+ "scope:" + oauthClientConfig .Scope ,
433
+ })
434
+ runOAuthFlow (t , clusterAdminClientConfig , projectName , oauthClientConfig , nil , authorizationCodes , authorizationErrors , true , true , []string {
435
+ "GET /oauth/authorize" ,
436
+ "received challenge" ,
437
+ "GET /oauth/authorize" ,
438
+ "redirect to /oauthcallback" ,
439
+ "code" ,
440
+ "scope:" + oauthClientConfig .Scope ,
441
+ })
442
+ clusterAdminOAuthClient .OAuthClientAuthorizations ().Delete ("harold:" + oauthClientConfig .ClientId , nil )
443
+ }
444
+ }
445
+
446
+ func deleteUser (clusterAdminUserClient userclient.UserInterface , name string ) error {
447
+ oldUser , err := clusterAdminUserClient .Users ().Get (name , metav1.GetOptions {})
448
+ if err != nil {
449
+ return err
450
+ }
451
+ for _ , identity := range oldUser .Identities {
452
+ if err := clusterAdminUserClient .Identities ().Delete (identity , nil ); err != nil {
453
+ return err
454
+ }
455
+ }
456
+ return clusterAdminUserClient .Users ().Delete (name , nil )
377
457
}
378
458
379
459
func drain (ch chan string ) {
0 commit comments