| Index: utils/tests/pub/oauth2_test.dart
|
| diff --git a/utils/tests/pub/oauth2_test.dart b/utils/tests/pub/oauth2_test.dart
|
| deleted file mode 100644
|
| index dd35a9e0d35b69d976431184b2bb478cccd0bbbc..0000000000000000000000000000000000000000
|
| --- a/utils/tests/pub/oauth2_test.dart
|
| +++ /dev/null
|
| @@ -1,264 +0,0 @@
|
| -// Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file
|
| -// for details. All rights reserved. Use of this source code is governed by a
|
| -// BSD-style license that can be found in the LICENSE file.
|
| -
|
| -library oauth2_test;
|
| -
|
| -import 'dart:io';
|
| -import 'dart:json' as json;
|
| -import 'dart:uri';
|
| -
|
| -import 'package:http/http.dart' as http;
|
| -import 'package:scheduled_test/scheduled_process.dart';
|
| -import 'package:scheduled_test/scheduled_test.dart';
|
| -import 'package:scheduled_test/scheduled_server.dart';
|
| -
|
| -import '../../pub/io.dart';
|
| -import '../../pub/utils.dart';
|
| -import 'descriptor.dart' as d;
|
| -import 'test_pub.dart';
|
| -
|
| -import 'dart:async';
|
| -
|
| -main() {
|
| - setUp(() => d.validPackage.create());
|
| -
|
| - integration('with no credentials.json, authenticates and saves '
|
| - 'credentials.json', () {
|
| - var server = new ScheduledServer();
|
| - var pub = startPublish(server);
|
| - confirmPublish(pub);
|
| - authorizePub(pub, server);
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - expect(request.headers.value('authorization'),
|
| - equals('Bearer access token'));
|
| -
|
| - request.response.close();
|
| - });
|
| -
|
| - // After we give pub an invalid response, it should crash. We wait for it to
|
| - // do so rather than killing it so it'll write out the credentials file.
|
| - pub.shouldExit(1);
|
| -
|
| - d.credentialsFile(server, 'access token').validate();
|
| - });
|
| -
|
| - integration('with a pre-existing credentials.json does not authenticate', () {
|
| - var server = new ScheduledServer();
|
| - d.credentialsFile(server, 'access token').create();
|
| - var pub = startPublish(server);
|
| - confirmPublish(pub);
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - expect(request.headers.value('authorization'),
|
| - equals('Bearer access token'));
|
| -
|
| - request.response.close();
|
| - });
|
| -
|
| - pub.kill();
|
| - });
|
| -
|
| - integration('with an expired credentials.json, refreshes and saves the '
|
| - 'refreshed access token to credentials.json', () {
|
| - var server = new ScheduledServer();
|
| - d.credentialsFile(server, 'access token',
|
| - refreshToken: 'refresh token',
|
| - expiration: new DateTime.now().subtract(new Duration(hours: 1)))
|
| - .create();
|
| -
|
| - var pub = startPublish(server);
|
| - confirmPublish(pub);
|
| -
|
| - server.handle('POST', '/token', (request) {
|
| - return new ByteStream(request).toBytes().then((bytes) {
|
| - var body = new String.fromCharCodes(bytes);
|
| - expect(body, matches(
|
| - new RegExp(r'(^|&)refresh_token=refresh\+token(&|$)')));
|
| -
|
| - request.response.headers.contentType =
|
| - new ContentType("application", "json");
|
| - request.response.write(json.stringify({
|
| - "access_token": "new access token",
|
| - "token_type": "bearer"
|
| - }));
|
| - request.response.close();
|
| - });
|
| - });
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - expect(request.headers.value('authorization'),
|
| - equals('Bearer new access token'));
|
| -
|
| - request.response.close();
|
| - });
|
| -
|
| - pub.shouldExit();
|
| -
|
| - d.credentialsFile(server, 'new access token', refreshToken: 'refresh token')
|
| - .validate();
|
| - });
|
| -
|
| - integration('with an expired credentials.json without a refresh token, '
|
| - 'authenticates again and saves credentials.json', () {
|
| - var server = new ScheduledServer();
|
| - d.credentialsFile(server, 'access token',
|
| - expiration: new DateTime.now().subtract(new Duration(hours: 1)))
|
| - .create();
|
| -
|
| - var pub = startPublish(server);
|
| - confirmPublish(pub);
|
| -
|
| - expect(pub.nextErrLine(), completion(equals("Pub's authorization to upload "
|
| - "packages has expired and can't be automatically refreshed.")));
|
| - authorizePub(pub, server, "new access token");
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - expect(request.headers.value('authorization'),
|
| - equals('Bearer new access token'));
|
| -
|
| - request.response.close();
|
| - });
|
| -
|
| - // After we give pub an invalid response, it should crash. We wait for it to
|
| - // do so rather than killing it so it'll write out the credentials file.
|
| - pub.shouldExit(1);
|
| -
|
| - d.credentialsFile(server, 'new access token').validate();
|
| - });
|
| -
|
| - integration('with a malformed credentials.json, authenticates again and '
|
| - 'saves credentials.json', () {
|
| - var server = new ScheduledServer();
|
| - d.dir(cachePath, [
|
| - d.file('credentials.json', '{bad json')
|
| - ]).create();
|
| -
|
| - var pub = startPublish(server);
|
| - confirmPublish(pub);
|
| - authorizePub(pub, server, "new access token");
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - expect(request.headers.value('authorization'),
|
| - equals('Bearer new access token'));
|
| -
|
| - request.response.close();
|
| - });
|
| -
|
| - // After we give pub an invalid response, it should crash. We wait for it to
|
| - // do so rather than killing it so it'll write out the credentials file.
|
| - pub.shouldExit(1);
|
| -
|
| - d.credentialsFile(server, 'new access token').validate();
|
| - });
|
| -
|
| - // Regression test for issue 8849.
|
| - integration('with a server-rejected refresh token, authenticates again and '
|
| - 'saves credentials.json', () {
|
| - var server = new ScheduledServer();
|
| - d.credentialsFile(server, 'access token',
|
| - refreshToken: 'bad refresh token',
|
| - expiration: new DateTime.now().subtract(new Duration(hours: 1)))
|
| - .create();
|
| -
|
| - var pub = startPublish(server);
|
| - confirmPublish(pub);
|
| -
|
| - server.handle('POST', '/token', (request) {
|
| - return new ByteStream(request).toBytes().then((bytes) {
|
| - var response = request.response;
|
| - response.statusCode = 400;
|
| - response.reasonPhrase = 'Bad request';
|
| - response.headers.contentType = new ContentType("application", "json");
|
| - response.write(json.stringify({"error": "invalid_request"}));
|
| - response.close();
|
| - });
|
| - });
|
| -
|
| - authorizePub(pub, server, 'new access token');
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - expect(request.headers.value('authorization'),
|
| - equals('Bearer new access token'));
|
| -
|
| - request.response.close();
|
| - });
|
| -
|
| - pub.kill();
|
| - });
|
| -
|
| - integration('with server-rejected credentials, authenticates again and saves '
|
| - 'credentials.json', () {
|
| - var server = new ScheduledServer();
|
| - d.credentialsFile(server, 'access token').create();
|
| - var pub = startPublish(server);
|
| -
|
| - confirmPublish(pub);
|
| -
|
| - server.handle('GET', '/packages/versions/new.json', (request) {
|
| - var response = request.response;
|
| - response.statusCode = 401;
|
| - response.headers.set('www-authenticate', 'Bearer error="invalid_token",'
|
| - ' error_description="your token sucks"');
|
| - response.write(json.stringify({
|
| - 'error': {'message': 'your token sucks'}
|
| - }));
|
| - response.close();
|
| - });
|
| -
|
| - expect(pub.nextErrLine(), completion(equals('OAuth2 authorization failed '
|
| - '(your token sucks).')));
|
| - // TODO(rnystrom): The confirm line is run together with this one because
|
| - // in normal usage, the user will have entered a newline on stdin which
|
| - // gets echoed to the terminal. Do something better here?
|
| - expect(pub.nextLine(), completion(equals(
|
| - 'Looks great! Are you ready to upload your package (y/n)? '
|
| - 'Pub needs your authorization to upload packages on your behalf.')));
|
| - pub.kill();
|
| - });
|
| -}
|
| -
|
| -void authorizePub(ScheduledProcess pub, ScheduledServer server,
|
| - [String accessToken="access token"]) {
|
| - // TODO(rnystrom): The confirm line is run together with this one because
|
| - // in normal usage, the user will have entered a newline on stdin which
|
| - // gets echoed to the terminal. Do something better here?
|
| - expect(pub.nextLine(), completion(equals(
|
| - 'Looks great! Are you ready to upload your package (y/n)? '
|
| - 'Pub needs your authorization to upload packages on your behalf.')));
|
| -
|
| - expect(pub.nextLine().then((line) {
|
| - var match = new RegExp(r'[?&]redirect_uri=([0-9a-zA-Z%+-]+)[$&]')
|
| - .firstMatch(line);
|
| - expect(match, isNotNull);
|
| -
|
| - var redirectUrl = Uri.parse(decodeUriComponent(match.group(1)));
|
| - redirectUrl = addQueryParameters(redirectUrl, {'code': 'access code'});
|
| - return (new http.Request('GET', redirectUrl)..followRedirects = false)
|
| - .send();
|
| - }).then((response) {
|
| - expect(response.headers['location'],
|
| - equals('http://pub.dartlang.org/authorized'));
|
| - }), completes);
|
| -
|
| - handleAccessTokenRequest(server, accessToken);
|
| -}
|
| -
|
| -void handleAccessTokenRequest(ScheduledServer server, String accessToken) {
|
| - server.handle('POST', '/token', (request) {
|
| - return new ByteStream(request).toBytes().then((bytes) {
|
| - var body = new String.fromCharCodes(bytes);
|
| - expect(body, matches(new RegExp(r'(^|&)code=access\+code(&|$)')));
|
| -
|
| - request.response.headers.contentType =
|
| - new ContentType("application", "json");
|
| - request.response.write(json.stringify({
|
| - "access_token": accessToken,
|
| - "token_type": "bearer"
|
| - }));
|
| - request.response.close();
|
| - });
|
| - });
|
| -}
|
| -
|
|
|