1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
|
use strict;
use warnings;
use lib 't/lib';
use Test::More tests => 36;
use TestDataHandler;
use OAuth::Lite2::Server::Endpoint::Token;
use OAuth::Lite2::Agent::PSGIMock;
use OAuth::Lite2::Client::UsernameAndPassword;
TestDataHandler->clear;
TestDataHandler->add_client(id => q{foo}, secret => q{bar});
TestDataHandler->add_user(username => q{buz}, password => q{hoge});
my $dh = TestDataHandler->new;
my $app = OAuth::Lite2::Server::Endpoint::Token->new(
data_handler => "TestDataHandler",
);
$app->support_grant_types(qw(password refresh_token));
my $agent = OAuth::Lite2::Agent::PSGIMock->new(app => $app);
my $client = OAuth::Lite2::Client::UsernameAndPassword->new(
id => q{foo},
secret => q{bar},
access_token_uri => q{http://localhost/access_token},
agent => $agent,
);
my $res;
$res = $client->get_access_token(
username => q{invalid},
password => q{hoge},
);
ok(!$res, q{response should be undef});
is($client->errstr, q{invalid_grant}, q{user should be invalid});
$res = $client->get_access_token(
username => q{invalid},
password => q{hoge},
use_basic_schema => 1,
);
ok(!$res, q{response should be undef});
is($client->errstr, q{invalid_grant}, q{user should be invalid});
$res = $client->get_access_token(
username => q{buz},
password => q{invalid},
);
ok(!$res, q{response should be undef});
is($client->errstr, q{invalid_grant}, q{user should be invalid});
$res = $client->get_access_token(
username => q{buz},
password => q{invalid},
use_basic_schema => 1,
);
ok(!$res, q{response should be undef});
is($client->errstr, q{invalid_grant}, q{user should be invalid});
$res = $client->get_access_token(
username => q{buz},
password => q{hoge},
);
ok($res, q{response should be not undef});
is($res->access_token, q{access_token_0});
is($res->refresh_token, q{refresh_token_0});
is($res->expires_in, q{3600});
ok(!$res->access_token_secret);
ok(!$res->scope);
$res = $client->get_access_token(
username => q{buz},
password => q{hoge},
use_basic_schema => 1,
);
ok($res, q{response should be not undef});
is($res->access_token, q{access_token_1});
is($res->refresh_token, q{refresh_token_1});
is($res->expires_in, q{3600});
ok(!$res->access_token_secret);
ok(!$res->scope);
$res = $client->refresh_access_token(
refresh_token => q{invalid_refresh_token},
);
ok(!$res, q{response should be undef});
is($client->errstr, q{invalid_grant}, q{refresh-token should be invalid});
$res = $client->refresh_access_token(
refresh_token => q{invalid_refresh_token},
use_basic_schema => 1,
);
ok(!$res, q{response should be undef});
is($client->errstr, q{invalid_grant}, q{refresh-token should be invalid});
$res = $client->refresh_access_token(
refresh_token => q{refresh_token_0},
);
ok($res, q{response should be not undef});
is($res->access_token, q{access_token_2});
is($res->refresh_token, q{refresh_token_0});
is($res->expires_in, q{3600});
ok(!$res->access_token_secret);
ok(!$res->scope);
$res = $client->refresh_access_token(
refresh_token => q{refresh_token_0},
use_basic_schema => 1,
);
ok($res, q{response should be not undef});
is($res->access_token, q{access_token_3});
is($res->refresh_token, q{refresh_token_0});
is($res->expires_in, q{3600});
ok(!$res->access_token_secret);
ok(!$res->scope);
|