1
1
// Copyright © 2022 Ory Corp
2
2
// SPDX-License-Identifier: Apache-2.0
3
3
4
- package consent
4
+ package test
5
5
6
6
import (
7
7
"context"
@@ -10,6 +10,10 @@ import (
10
10
"testing"
11
11
"time"
12
12
13
+ "github.com/ory/fosite/handler/openid"
14
+ "github.com/ory/hydra/v2/consent"
15
+ "github.com/ory/hydra/v2/oauth2"
16
+
13
17
"github.com/ory/hydra/v2/aead"
14
18
"github.com/ory/hydra/v2/flow"
15
19
"github.com/ory/x/assertx"
@@ -178,7 +182,7 @@ func MockAuthRequest(key string, authAt bool, network string) (c *flow.LoginRequ
178
182
return c , h , f
179
183
}
180
184
181
- func SaneMockHandleConsentRequest (t * testing.T , m Manager , f * flow.Flow , c * flow.OAuth2ConsentRequest , authAt time.Time , rememberFor int , remember bool , hasError bool ) * flow.AcceptOAuth2ConsentRequest {
185
+ func SaneMockHandleConsentRequest (t * testing.T , m consent. Manager , f * flow.Flow , c * flow.OAuth2ConsentRequest , authAt time.Time , rememberFor int , remember bool , hasError bool ) * flow.AcceptOAuth2ConsentRequest {
182
186
var rde * flow.RequestDeniedError
183
187
if hasError {
184
188
rde = & flow.RequestDeniedError {
@@ -212,7 +216,7 @@ func SaneMockHandleConsentRequest(t *testing.T, m Manager, f *flow.Flow, c *flow
212
216
}
213
217
214
218
// SaneMockConsentRequest does the same thing as MockConsentRequest but uses less insanity and implicit dependencies.
215
- func SaneMockConsentRequest (t * testing.T , m Manager , f * flow.Flow , skip bool ) (c * flow.OAuth2ConsentRequest ) {
219
+ func SaneMockConsentRequest (t * testing.T , m consent. Manager , f * flow.Flow , skip bool ) (c * flow.OAuth2ConsentRequest ) {
216
220
c = & flow.OAuth2ConsentRequest {
217
221
RequestedScope : []string {"scopea" , "scopeb" },
218
222
RequestedAudience : []string {"auda" , "audb" },
@@ -244,7 +248,7 @@ func SaneMockConsentRequest(t *testing.T, m Manager, f *flow.Flow, skip bool) (c
244
248
}
245
249
246
250
// SaneMockAuthRequest does the same thing as MockAuthRequest but uses less insanity and implicit dependencies.
247
- func SaneMockAuthRequest (t * testing.T , m Manager , ls * flow.LoginSession , cl * client.Client ) (c * flow.LoginRequest ) {
251
+ func SaneMockAuthRequest (t * testing.T , m consent. Manager , ls * flow.LoginSession , cl * client.Client ) (c * flow.LoginRequest ) {
248
252
c = & flow.LoginRequest {
249
253
OpenIDConnectContext : & flow.OAuth2ConsentRequestOpenIDConnectContext {
250
254
ACRValues : []string {"1" , "2" },
@@ -275,7 +279,7 @@ func makeID(base string, network string, key string) string {
275
279
func TestHelperNID (r interface {
276
280
client.ManagerProvider
277
281
FlowCipher () * aead.XChaCha20Poly1305
278
- }, t1ValidNID Manager , t2InvalidNID Manager ) func (t * testing.T ) {
282
+ }, t1ValidNID consent. Manager , t2InvalidNID consent. Manager ) func (t * testing.T ) {
279
283
testClient := client.Client {ID : "2022-03-11-client-nid-test-1" }
280
284
testLS := flow.LoginSession {
281
285
ID : "2022-03-11-ls-nid-test-1" ,
@@ -338,7 +342,7 @@ type Deps interface {
338
342
contextx.Provider
339
343
}
340
344
341
- func ManagerTests (deps Deps , m Manager , clientManager client.Manager , fositeManager x.FositeStorer , network string , parallel bool ) func (t * testing.T ) {
345
+ func ManagerTests (deps Deps , m consent. Manager , clientManager client.Manager , fositeManager x.FositeStorer , network string , parallel bool ) func (t * testing.T ) {
342
346
lr := make (map [string ]* flow.LoginRequest )
343
347
344
348
return func (t * testing.T ) {
@@ -590,7 +594,7 @@ func ManagerTests(deps Deps, m Manager, clientManager client.Manager, fositeMana
590
594
rs , err := m .FindGrantedAndRememberedConsentRequests (ctx , "fk-client-" + tc .keyC , "subject" + tc .keyS )
591
595
if tc .expectedLength == 0 {
592
596
assert .Nil (t , rs )
593
- assert .EqualError (t , err , ErrNoPreviousConsentFound .Error ())
597
+ assert .EqualError (t , err , consent . ErrNoPreviousConsentFound .Error ())
594
598
} else {
595
599
require .NoError (t , err )
596
600
assert .Len (t , rs , tc .expectedLength )
@@ -674,22 +678,22 @@ func ManagerTests(deps Deps, m Manager, clientManager client.Manager, fositeMana
674
678
require .NoError (t , fositeManager .CreateAccessTokenSession (
675
679
ctx ,
676
680
makeID ("" , network , "trva1" ),
677
- & fosite.Request {Client : cr1 .Client , ID : crr1 .ID , RequestedAt : time .Now ()},
681
+ & fosite.Request {Client : cr1 .Client , ID : crr1 .ID , RequestedAt : time .Now (), Session : & oauth2. Session { DefaultSession : openid . NewDefaultSession ()} },
678
682
))
679
683
require .NoError (t , fositeManager .CreateRefreshTokenSession (
680
684
ctx ,
681
685
makeID ("" , network , "rrva1" ),
682
- & fosite.Request {Client : cr1 .Client , ID : crr1 .ID , RequestedAt : time .Now ()},
686
+ & fosite.Request {Client : cr1 .Client , ID : crr1 .ID , RequestedAt : time .Now (), Session : & oauth2. Session { DefaultSession : openid . NewDefaultSession ()} },
683
687
))
684
688
require .NoError (t , fositeManager .CreateAccessTokenSession (
685
689
ctx ,
686
690
makeID ("" , network , "trva2" ),
687
- & fosite.Request {Client : cr2 .Client , ID : crr2 .ID , RequestedAt : time .Now ()},
691
+ & fosite.Request {Client : cr2 .Client , ID : crr2 .ID , RequestedAt : time .Now (), Session : & oauth2. Session { DefaultSession : openid . NewDefaultSession ()} },
688
692
))
689
693
require .NoError (t , fositeManager .CreateRefreshTokenSession (
690
694
ctx ,
691
695
makeID ("" , network , "rrva2" ),
692
- & fosite.Request {Client : cr2 .Client , ID : crr2 .ID , RequestedAt : time .Now ()},
696
+ & fosite.Request {Client : cr2 .Client , ID : crr2 .ID , RequestedAt : time .Now (), Session : & oauth2. Session { DefaultSession : openid . NewDefaultSession ()} },
693
697
))
694
698
695
699
for i , tc := range []struct {
@@ -800,7 +804,7 @@ func ManagerTests(deps Deps, m Manager, clientManager client.Manager, fositeMana
800
804
assert .Equal (t , len (tc .challenges ), len (consents ))
801
805
802
806
if len (tc .challenges ) == 0 {
803
- assert .EqualError (t , err , ErrNoPreviousConsentFound .Error ())
807
+ assert .EqualError (t , err , consent . ErrNoPreviousConsentFound .Error ())
804
808
} else {
805
809
require .NoError (t , err )
806
810
for _ , consent := range consents {
@@ -842,7 +846,7 @@ func ManagerTests(deps Deps, m Manager, clientManager client.Manager, fositeMana
842
846
assert .Equal (t , len (tc .challenges ), len (consents ))
843
847
844
848
if len (tc .challenges ) == 0 {
845
- assert .EqualError (t , err , ErrNoPreviousConsentFound .Error ())
849
+ assert .EqualError (t , err , consent . ErrNoPreviousConsentFound .Error ())
846
850
} else {
847
851
require .NoError (t , err )
848
852
for _ , consent := range consents {
@@ -862,7 +866,7 @@ func ManagerTests(deps Deps, m Manager, clientManager client.Manager, fositeMana
862
866
_ , err := m .GetForcedObfuscatedLoginSession (ctx , "fk-client-1" , "obfuscated-1" )
863
867
require .True (t , errors .Is (err , x .ErrNotFound ))
864
868
865
- expect := & ForcedObfuscatedLoginSession {
869
+ expect := & consent. ForcedObfuscatedLoginSession {
866
870
ClientID : "fk-client-1" ,
867
871
Subject : "subject-1" ,
868
872
SubjectObfuscated : "obfuscated-1" ,
@@ -875,7 +879,7 @@ func ManagerTests(deps Deps, m Manager, clientManager client.Manager, fositeMana
875
879
got .NID = gofrsuuid .Nil
876
880
assert .EqualValues (t , expect , got )
877
881
878
- expect = & ForcedObfuscatedLoginSession {
882
+ expect = & consent. ForcedObfuscatedLoginSession {
879
883
ClientID : "fk-client-1" ,
880
884
Subject : "subject-1" ,
881
885
SubjectObfuscated : "obfuscated-2" ,
0 commit comments