This repository was archived by the owner on Feb 21, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 3
Expand file tree
/
Copy pathauth_headers_test.go
More file actions
96 lines (78 loc) · 3.02 KB
/
auth_headers_test.go
File metadata and controls
96 lines (78 loc) · 3.02 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
package zuora
import (
"context"
"net/http"
"net/http/httptest"
"testing"
)
func TestAuthHeaders(t *testing.T) {
ctx := context.Background()
authHeaders := NewBasicAuthHeader("testClientID", "testClientSecret")
want := "Basic dGVzdENsaWVudElEOnRlc3RDbGllbnRTZWNyZXQ="
got, err := authHeaders.AuthHeaders(ctx)
if err != nil {
t.Errorf("AuthHeaders() return an error: %v", err)
}
if got != want {
t.Errorf("AuthHeaders() = %q, want %q", got, want)
}
}
func TestOAuthHeadersWhenTokenValid(t *testing.T) {
ctx := context.Background()
mockServer := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {
t.Logf("Sending fake request to %v", req.URL)
rw.WriteHeader(200)
rw.Write([]byte(`{"access_token": "reallylongaccesstoken", "token_type": "fake", "expires_in": 100, "scope": "all", "jti": ""}`))
}))
defer mockServer.Close()
oauthHeader := NewOAuthHeader(mockServer.Client(), &MemoryTokenStore{}, "testClientID", "testClientSecret", mockServer.URL)
want := "Bearer reallylongaccesstoken"
got, err := oauthHeader.AuthHeaders(ctx)
if err != nil {
t.Errorf("OAuthHeader.AuthHeaders() returned an error: %v", err)
}
if got != want {
t.Errorf("OAuthHeader.AuthHeaders() = %q, want %q", got, want)
}
}
func TestOAuthHeadersWhenTokenAlreadyCached(t *testing.T) {
ctx := context.Background()
mockServer := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {
t.Logf("Sending fake request to %v", req.URL)
rw.WriteHeader(200)
rw.Write([]byte(`{"access_token": "reallylongaccesstoken", "token_type": "fake", "expires_in": 200, "scope": "all", "jti": ""}`))
}))
oauthHeader := NewOAuthHeader(mockServer.Client(), &MemoryTokenStore{}, "testClientID", "testClientSecret", mockServer.URL)
want := "Bearer reallylongaccesstoken"
got, err := oauthHeader.AuthHeaders(ctx)
if err != nil {
t.Errorf("OAuthHeader.AuthHeaders() returned an error: %v", err)
}
if got != want {
t.Errorf("OAuthHeader.AuthHeaders() = %q, want %q", got, want)
}
mockServer.Close() //Closing to make sure that it does not make another HTTP request
again, err := oauthHeader.AuthHeaders(ctx)
if err != nil {
t.Errorf("OAuthHeader.AuthHeaders() returned an error: %v", err)
}
if again != want {
t.Errorf("OAuthHeader.AuthHeaders() = %q, want %q", again, want)
}
}
func TestOAuthHeadersWhenTokenFails(t *testing.T) {
ctx := context.Background()
mockServer := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {
t.Logf("Sending fake request to %v", req.URL)
rw.WriteHeader(401)
rw.Write([]byte(`{"something": "happened"}`))
}))
defer mockServer.Close()
oauthHeader := NewOAuthHeader(mockServer.Client(), &MemoryTokenStore{}, "testClientID", "testClientSecret", mockServer.URL)
want := `error while trying to read body response into memory: <nil> - data: {"something": "happened"}`
g, err := oauthHeader.AuthHeaders(ctx)
t.Log(g, err)
if err.Error() != want {
t.Errorf("OAuthHeader.AuthHeaders() wanted an error: %v but got: %v", want, err)
}
}