| Index: utils/tests/pub/oauth2_test.dart
|
| diff --git a/utils/tests/pub/oauth2_test.dart b/utils/tests/pub/oauth2_test.dart
|
| index afeedc6521dc5232dce6a3c31d3623af8a464b27..0b2772b95acae80bc99c64dcc0de98c9c4b38629 100644
|
| --- a/utils/tests/pub/oauth2_test.dart
|
| +++ b/utils/tests/pub/oauth2_test.dart
|
| @@ -8,47 +8,53 @@ import 'dart:io';
|
| import 'dart:json' as json;
|
| import 'dart:uri';
|
|
|
| -import 'test_pub.dart';
|
| import '../../../pkg/http/lib/http.dart' as http;
|
| -import '../../../pkg/unittest/lib/unittest.dart';
|
| +import '../../../pkg/scheduled_test/lib/scheduled_process.dart';
|
| +import '../../../pkg/scheduled_test/lib/scheduled_test.dart';
|
| +import '../../../pkg/scheduled_test/lib/scheduled_server.dart';
|
| +
|
| import '../../pub/io.dart';
|
| import '../../pub/utils.dart';
|
| +import 'descriptor.dart' as d;
|
| +import 'test_pub.dart';
|
| +
|
| +import 'dart:async';
|
|
|
| main() {
|
| - setUp(() => normalPackage.scheduleCreate());
|
| + setUp(() => d.validPackage.create());
|
|
|
| integration('with no credentials.json, authenticates and saves '
|
| 'credentials.json', () {
|
| var server = new ScheduledServer();
|
| - var pub = startPubLish(server);
|
| + var pub = startPublish(server);
|
| confirmPublish(pub);
|
| authorizePub(pub, server);
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| expect(request.headers.value('authorization'),
|
| equals('Bearer access token'));
|
|
|
| - response.close();
|
| + request.response.close();
|
| });
|
|
|
| // After we give pub an invalid response, it should crash. We wait for it to
|
| // do so rather than killing it so it'll write out the credentials file.
|
| pub.shouldExit(1);
|
|
|
| - credentialsFile(server, 'access token').scheduleValidate();
|
| + d.credentialsFile(server, 'access token').validate();
|
| });
|
|
|
| integration('with a pre-existing credentials.json does not authenticate', () {
|
| var server = new ScheduledServer();
|
| - credentialsFile(server, 'access token').scheduleCreate();
|
| - var pub = startPubLish(server);
|
| + d.credentialsFile(server, 'access token').create();
|
| + var pub = startPublish(server);
|
| confirmPublish(pub);
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| expect(request.headers.value('authorization'),
|
| equals('Bearer access token'));
|
|
|
| - response.close();
|
| + request.response.close();
|
| });
|
|
|
| pub.kill();
|
| @@ -57,110 +63,111 @@ main() {
|
| integration('with an expired credentials.json, refreshes and saves the '
|
| 'refreshed access token to credentials.json', () {
|
| var server = new ScheduledServer();
|
| - credentialsFile(server, 'access token',
|
| + d.credentialsFile(server, 'access token',
|
| refreshToken: 'refresh token',
|
| expiration: new DateTime.now().subtract(new Duration(hours: 1)))
|
| - .scheduleCreate();
|
| + .create();
|
|
|
| - var pub = startPubLish(server);
|
| + var pub = startPublish(server);
|
| confirmPublish(pub);
|
|
|
| - server.handle('POST', '/token', (request, response) {
|
| + server.handle('POST', '/token', (request) {
|
| return new ByteStream(request).toBytes().then((bytes) {
|
| var body = new String.fromCharCodes(bytes);
|
| expect(body, matches(
|
| new RegExp(r'(^|&)refresh_token=refresh\+token(&|$)')));
|
|
|
| - response.headers.contentType = new ContentType("application", "json");
|
| - response.write(json.stringify({
|
| + request.response.headers.contentType =
|
| + new ContentType("application", "json");
|
| + request.response.write(json.stringify({
|
| "access_token": "new access token",
|
| "token_type": "bearer"
|
| }));
|
| - response.close();
|
| + request.response.close();
|
| });
|
| });
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| expect(request.headers.value('authorization'),
|
| equals('Bearer new access token'));
|
|
|
| - response.close();
|
| + request.response.close();
|
| });
|
|
|
| pub.shouldExit();
|
|
|
| - credentialsFile(server, 'new access token', refreshToken: 'refresh token')
|
| - .scheduleValidate();
|
| + d.credentialsFile(server, 'new access token', refreshToken: 'refresh token')
|
| + .validate();
|
| });
|
|
|
| integration('with an expired credentials.json without a refresh token, '
|
| 'authenticates again and saves credentials.json', () {
|
| var server = new ScheduledServer();
|
| - credentialsFile(server, 'access token',
|
| + d.credentialsFile(server, 'access token',
|
| expiration: new DateTime.now().subtract(new Duration(hours: 1)))
|
| - .scheduleCreate();
|
| + .create();
|
|
|
| - var pub = startPubLish(server);
|
| + var pub = startPublish(server);
|
| confirmPublish(pub);
|
|
|
| - expectLater(pub.nextErrLine(), equals("Pub's authorization to upload "
|
| - "packages has expired and can't be automatically refreshed."));
|
| + expect(pub.nextErrLine(), completion(equals("Pub's authorization to upload "
|
| + "packages has expired and can't be automatically refreshed.")));
|
| authorizePub(pub, server, "new access token");
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| expect(request.headers.value('authorization'),
|
| equals('Bearer new access token'));
|
|
|
| - response.close();
|
| + request.response.close();
|
| });
|
|
|
| // After we give pub an invalid response, it should crash. We wait for it to
|
| // do so rather than killing it so it'll write out the credentials file.
|
| pub.shouldExit(1);
|
|
|
| - credentialsFile(server, 'new access token').scheduleValidate();
|
| + d.credentialsFile(server, 'new access token').validate();
|
| });
|
|
|
| integration('with a malformed credentials.json, authenticates again and '
|
| 'saves credentials.json', () {
|
| var server = new ScheduledServer();
|
| - dir(cachePath, [
|
| - file('credentials.json', '{bad json')
|
| - ]).scheduleCreate();
|
| + d.dir(cachePath, [
|
| + d.file('credentials.json', '{bad json')
|
| + ]).create();
|
|
|
| - var pub = startPubLish(server);
|
| + var pub = startPublish(server);
|
| confirmPublish(pub);
|
| authorizePub(pub, server, "new access token");
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| expect(request.headers.value('authorization'),
|
| equals('Bearer new access token'));
|
|
|
| - response.close();
|
| + request.response.close();
|
| });
|
|
|
| -
|
| // After we give pub an invalid response, it should crash. We wait for it to
|
| // do so rather than killing it so it'll write out the credentials file.
|
| pub.shouldExit(1);
|
|
|
| - credentialsFile(server, 'new access token').scheduleValidate();
|
| + d.credentialsFile(server, 'new access token').validate();
|
| });
|
|
|
| // Regression test for issue 8849.
|
| integration('with a server-rejected refresh token, authenticates again and '
|
| 'saves credentials.json', () {
|
| var server = new ScheduledServer();
|
| - credentialsFile(server, 'access token',
|
| + d.credentialsFile(server, 'access token',
|
| refreshToken: 'bad refresh token',
|
| expiration: new DateTime.now().subtract(new Duration(hours: 1)))
|
| - .scheduleCreate();
|
| + .create();
|
|
|
| - var pub = startPubLish(server);
|
| + var pub = startPublish(server);
|
| confirmPublish(pub);
|
|
|
| - server.handle('POST', '/token', (request, response) {
|
| + server.handle('POST', '/token', (request) {
|
| return new ByteStream(request).toBytes().then((bytes) {
|
| + var response = request.response;
|
| response.statusCode = 400;
|
| response.reasonPhrase = 'Bad request';
|
| response.headers.contentType = new ContentType("application", "json");
|
| @@ -171,11 +178,11 @@ main() {
|
|
|
| authorizePub(pub, server, 'new access token');
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| expect(request.headers.value('authorization'),
|
| equals('Bearer new access token'));
|
|
|
| - response.close();
|
| + request.response.close();
|
| });
|
|
|
| pub.kill();
|
| @@ -184,12 +191,13 @@ main() {
|
| integration('with server-rejected credentials, authenticates again and saves '
|
| 'credentials.json', () {
|
| var server = new ScheduledServer();
|
| - credentialsFile(server, 'access token').scheduleCreate();
|
| - var pub = startPubLish(server);
|
| + d.credentialsFile(server, 'access token').create();
|
| + var pub = startPublish(server);
|
|
|
| confirmPublish(pub);
|
|
|
| - server.handle('GET', '/packages/versions/new.json', (request, response) {
|
| + server.handle('GET', '/packages/versions/new.json', (request) {
|
| + var response = request.response;
|
| response.statusCode = 401;
|
| response.headers.set('www-authenticate', 'Bearer error="invalid_token",'
|
| ' error_description="your token sucks"');
|
| @@ -199,14 +207,14 @@ main() {
|
| response.close();
|
| });
|
|
|
| - expectLater(pub.nextErrLine(), equals('OAuth2 authorization failed (your '
|
| - 'token sucks).'));
|
| + expect(pub.nextErrLine(), completion(equals('OAuth2 authorization failed '
|
| + '(your token sucks).')));
|
| // TODO(rnystrom): The confirm line is run together with this one because
|
| // in normal usage, the user will have entered a newline on stdin which
|
| // gets echoed to the terminal. Do something better here?
|
| - expectLater(pub.nextLine(), equals(
|
| + expect(pub.nextLine(), completion(equals(
|
| 'Looks great! Are you ready to upload your package (y/n)? '
|
| - 'Pub needs your authorization to upload packages on your behalf.'));
|
| + 'Pub needs your authorization to upload packages on your behalf.')));
|
| pub.kill();
|
| });
|
| }
|
| @@ -216,11 +224,11 @@ void authorizePub(ScheduledProcess pub, ScheduledServer server,
|
| // TODO(rnystrom): The confirm line is run together with this one because
|
| // in normal usage, the user will have entered a newline on stdin which
|
| // gets echoed to the terminal. Do something better here?
|
| - expectLater(pub.nextLine(), equals(
|
| + expect(pub.nextLine(), completion(equals(
|
| 'Looks great! Are you ready to upload your package (y/n)? '
|
| - 'Pub needs your authorization to upload packages on your behalf.'));
|
| + 'Pub needs your authorization to upload packages on your behalf.')));
|
|
|
| - expectLater(pub.nextLine().then((line) {
|
| + expect(pub.nextLine().then((line) {
|
| var match = new RegExp(r'[?&]redirect_uri=([0-9a-zA-Z%+-]+)[$&]')
|
| .firstMatch(line);
|
| expect(match, isNotNull);
|
| @@ -232,23 +240,24 @@ void authorizePub(ScheduledProcess pub, ScheduledServer server,
|
| }).then((response) {
|
| expect(response.headers['location'],
|
| equals('http://pub.dartlang.org/authorized'));
|
| - }), anything);
|
| + }), completes);
|
|
|
| handleAccessTokenRequest(server, accessToken);
|
| }
|
|
|
| void handleAccessTokenRequest(ScheduledServer server, String accessToken) {
|
| - server.handle('POST', '/token', (request, response) {
|
| + server.handle('POST', '/token', (request) {
|
| return new ByteStream(request).toBytes().then((bytes) {
|
| var body = new String.fromCharCodes(bytes);
|
| expect(body, matches(new RegExp(r'(^|&)code=access\+code(&|$)')));
|
|
|
| - response.headers.contentType = new ContentType("application", "json");
|
| - response.write(json.stringify({
|
| + request.response.headers.contentType =
|
| + new ContentType("application", "json");
|
| + request.response.write(json.stringify({
|
| "access_token": accessToken,
|
| "token_type": "bearer"
|
| }));
|
| - response.close();
|
| + request.response.close();
|
| });
|
| });
|
| }
|
|
|