File: redirect_test.go

package info (click to toggle)
golang-github-yohcop-openid-go 0.0~git20170901.0.cfc72ed-3
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid
  • size: 184 kB
  • sloc: makefile: 3
file content (102 lines) | stat: -rw-r--r-- 3,237 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
package openid

import (
	"net/url"
	"testing"
)

func TestBuildRedirectUrl(t *testing.T) {
	expectURL(t, "https://endpoint/a", "opLocalId", "claimedId", "returnTo", "realm",
		"https://endpoint/a?"+
			"openid.ns=http://specs.openid.net/auth/2.0"+
			"&openid.mode=checkid_setup"+
			"&openid.return_to=returnTo"+
			"&openid.claimed_id=claimedId"+
			"&openid.identity=opLocalId"+
			"&openid.realm=realm")
	// No realm.
	expectURL(t, "https://endpoint/a", "opLocalId", "claimedId", "returnTo", "",
		"https://endpoint/a?"+
			"openid.ns=http://specs.openid.net/auth/2.0"+
			"&openid.mode=checkid_setup"+
			"&openid.return_to=returnTo"+
			"&openid.claimed_id=claimedId"+
			"&openid.identity=opLocalId")
	// No realm, no localId
	expectURL(t, "https://endpoint/a", "", "claimedId", "returnTo", "",
		"https://endpoint/a?"+
			"openid.ns=http://specs.openid.net/auth/2.0"+
			"&openid.mode=checkid_setup"+
			"&openid.return_to=returnTo"+
			"&openid.claimed_id=claimedId"+
			"&openid.identity=claimedId")
	// No realm, no claimedId
	expectURL(t, "https://endpoint/a", "opLocalId", "", "returnTo", "",
		"https://endpoint/a?"+
			"openid.ns=http://specs.openid.net/auth/2.0"+
			"&openid.mode=checkid_setup"+
			"&openid.return_to=returnTo"+
			"&openid.claimed_id="+
			"http://specs.openid.net/auth/2.0/identifier_select"+
			"&openid.identity="+
			"http://specs.openid.net/auth/2.0/identifier_select")
}

func expectURL(t *testing.T, opEndpoint, opLocalID, claimedID, returnTo, realm, expected string) {
	url, err := BuildRedirectURL(opEndpoint, opLocalID, claimedID, returnTo, realm)
	if err != nil {
		t.Errorf("Unexpected error: %s", err)
	}
	compareUrls(t, url, expected)
}

func TestRedirectWithDiscovery(t *testing.T) {
	expected := "foo?" +
		"openid.ns=http://specs.openid.net/auth/2.0" +
		"&openid.mode=checkid_setup" +
		"&openid.return_to=mysite/cb" +
		"&openid.claimed_id=" +
		"http://specs.openid.net/auth/2.0/identifier_select" +
		"&openid.identity=" +
		"http://specs.openid.net/auth/2.0/identifier_select"

	// They all redirect to the same XRDS document
	expectRedirect(t, "http://example.com/xrds",
		"mysite/cb", "", expected, false)
	expectRedirect(t, "http://example.com/xrds-loc",
		"mysite/cb", "", expected, false)
	expectRedirect(t, "http://example.com/xrds-meta",
		"mysite/cb", "", expected, false)
}

func expectRedirect(t *testing.T, uri, callback, realm, exRedirect string, exErr bool) {
	redirect, err := testInstance.RedirectURL(uri, callback, realm)
	if (err != nil) != exErr {
		t.Errorf("Unexpected error: '%s'", err)
		return
	}
	compareUrls(t, redirect, exRedirect)
}

func compareUrls(t *testing.T, url1, expected string) {
	p1, err1 := url.Parse(url1)
	p2, err2 := url.Parse(expected)
	if err1 != nil {
		t.Errorf("Url1 non parsable: %s", err1)
		return
	}
	if err2 != nil {
		t.Errorf("ExpectedUrl non parsable: %s", err2)
		return
	}
	if p1.Scheme != p2.Scheme ||
		p1.Host != p2.Host ||
		p1.Path != p2.Path {
		t.Errorf("URLs don't match: %s vs %s", url1, expected)
	}
	q1, _ := url.ParseQuery(p1.RawQuery)
	q2, _ := url.ParseQuery(p2.RawQuery)
	if err := compareQueryParams(q1, q2); err != nil {
		t.Errorf("URLs query params don't match: %s: %s vs %s", err, url1, expected)
	}
}