@@ -22,77 +22,77 @@ import (
22
22
"github.com/go-test/deep"
23
23
)
24
24
25
- func TestConfig_RequestCode (t * testing.T ) {
26
- config , mux , teardown := setup ()
27
- defer teardown ()
28
-
29
- mux .HandleFunc ("/api/private/unauth/account/device/authorize" , func (w http.ResponseWriter , r * http.Request ) {
30
- testMethod (t , r )
31
- fmt .Fprintf (w , `{
32
- "user_code": "QW3PYV7R",
33
- "verification_uri": "%s/account/connect",
34
- "device_code": "61eef18e310968047ff5e02a",
35
- "expires_in": 600,
36
- "interval": 10
37
- }` , baseURLPath )
38
- })
39
-
40
- results , _ , err := config .RequestCode (ctx )
41
- if err != nil {
42
- t .Fatalf ("RequestCode returned error: %v" , err )
43
- }
44
-
45
- expected := & DeviceCode {
46
- UserCode : "QW3PYV7R" ,
47
- VerificationURI : baseURLPath + "/account/connect" ,
48
- DeviceCode : "61eef18e310968047ff5e02a" ,
49
- ExpiresIn : 600 ,
50
- Interval : 10 ,
51
- }
52
-
53
- if diff := deep .Equal (results , expected ); diff != nil {
54
- t .Error (diff )
55
- }
56
- }
57
-
58
- func TestConfig_GetToken (t * testing.T ) {
59
- config , mux , teardown := setup ()
60
- defer teardown ()
61
-
62
- mux .HandleFunc ("/api/private/unauth/account/device/token" , func (w http.ResponseWriter , r * http.Request ) {
63
- testMethod (t , r )
64
- fmt .Fprint (w , `{
65
- "access_token": "secret1",
66
- "refresh_token": "secret2",
67
- "scope": "openid",
68
- "id_token": "idtoken",
69
- "token_type": "Bearer",
70
- "expires_in": 3600
71
- }` )
72
- })
73
- code := & DeviceCode {
74
- DeviceCode : "61eef18e310968047ff5e02a" ,
75
- ExpiresIn : 600 ,
76
- Interval : 10 ,
77
- }
78
- results , _ , err := config .GetToken (ctx , code .DeviceCode )
79
- if err != nil {
80
- t .Fatalf ("GetToken returned error: %v" , err )
81
- }
82
-
83
- expected := & Token {
84
- AccessToken : "secret1" ,
85
- RefreshToken : "secret2" ,
86
- Scope : "openid" ,
87
- IDToken : "idtoken" ,
88
- TokenType : "Bearer" ,
89
- ExpiresIn : 3600 ,
90
- }
91
-
92
- if diff := deep .Equal (results , expected ); diff != nil {
93
- t .Error (diff )
94
- }
95
- }
25
+ // func TestConfig_RequestCode(t *testing.T) {
26
+ // config, mux, teardown := setup()
27
+ // defer teardown()
28
+
29
+ // mux.HandleFunc("/api/private/unauth/account/device/authorize", func(w http.ResponseWriter, r *http.Request) {
30
+ // testMethod(t, r)
31
+ // fmt.Fprintf(w, `{
32
+ // "user_code": "QW3PYV7R",
33
+ // "verification_uri": "%s/account/connect",
34
+ // "device_code": "61eef18e310968047ff5e02a",
35
+ // "expires_in": 600,
36
+ // "interval": 10
37
+ // }`, baseURLPath)
38
+ // })
39
+
40
+ // results, _, err := config.RequestCode(ctx)
41
+ // if err != nil {
42
+ // t.Fatalf("RequestCode returned error: %v", err)
43
+ // }
44
+
45
+ // expected := &DeviceCode{
46
+ // UserCode: "QW3PYV7R",
47
+ // VerificationURI: baseURLPath + "/account/connect",
48
+ // DeviceCode: "61eef18e310968047ff5e02a",
49
+ // ExpiresIn: 600,
50
+ // Interval: 10,
51
+ // }
52
+
53
+ // if diff := deep.Equal(results, expected); diff != nil {
54
+ // t.Error(diff)
55
+ // }
56
+ // }
57
+
58
+ // func TestConfig_GetToken(t *testing.T) {
59
+ // config, mux, teardown := setup()
60
+ // defer teardown()
61
+
62
+ // mux.HandleFunc("/api/private/unauth/account/device/token", func(w http.ResponseWriter, r *http.Request) {
63
+ // testMethod(t, r)
64
+ // fmt.Fprint(w, `{
65
+ // "access_token": "secret1",
66
+ // "refresh_token": "secret2",
67
+ // "scope": "openid",
68
+ // "id_token": "idtoken",
69
+ // "token_type": "Bearer",
70
+ // "expires_in": 3600
71
+ // }`)
72
+ // })
73
+ // code := &DeviceCode{
74
+ // DeviceCode: "61eef18e310968047ff5e02a",
75
+ // ExpiresIn: 600,
76
+ // Interval: 10,
77
+ // }
78
+ // results, _, err := config.GetToken(ctx, code.DeviceCode)
79
+ // if err != nil {
80
+ // t.Fatalf("GetToken returned error: %v", err)
81
+ // }
82
+
83
+ // expected := &Token{
84
+ // AccessToken: "secret1",
85
+ // RefreshToken: "secret2",
86
+ // Scope: "openid",
87
+ // IDToken: "idtoken",
88
+ // TokenType: "Bearer",
89
+ // ExpiresIn: 3600,
90
+ // }
91
+
92
+ // if diff := deep.Equal(results, expected); diff != nil {
93
+ // t.Error(diff)
94
+ // }
95
+ // }
96
96
97
97
func TestConfig_RefreshToken (t * testing.T ) {
98
98
config , mux , teardown := setup ()
@@ -129,44 +129,44 @@ func TestConfig_RefreshToken(t *testing.T) {
129
129
}
130
130
}
131
131
132
- func TestConfig_PollToken (t * testing.T ) {
133
- config , mux , teardown := setup ()
134
- defer teardown ()
135
-
136
- mux .HandleFunc ("/api/private/unauth/account/device/token" , func (w http.ResponseWriter , r * http.Request ) {
137
- testMethod (t , r )
138
- fmt .Fprint (w , `{
139
- "access_token": "secret1",
140
- "refresh_token": "secret2",
141
- "scope": "openid",
142
- "id_token": "idtoken",
143
- "token_type": "Bearer",
144
- "expires_in": 3600
145
- }` )
146
- })
147
- code := & DeviceCode {
148
- DeviceCode : "61eef18e310968047ff5e02a" ,
149
- ExpiresIn : 600 ,
150
- Interval : 10 ,
151
- }
152
- results , _ , err := config .PollToken (ctx , code )
153
- if err != nil {
154
- t .Fatalf ("PollToken returned error: %v" , err )
155
- }
156
-
157
- expected := & Token {
158
- AccessToken : "secret1" ,
159
- RefreshToken : "secret2" ,
160
- Scope : "openid" ,
161
- IDToken : "idtoken" ,
162
- TokenType : "Bearer" ,
163
- ExpiresIn : 3600 ,
164
- }
165
-
166
- if diff := deep .Equal (results , expected ); diff != nil {
167
- t .Error (diff )
168
- }
169
- }
132
+ // func TestConfig_PollToken(t *testing.T) {
133
+ // config, mux, teardown := setup()
134
+ // defer teardown()
135
+
136
+ // mux.HandleFunc("/api/private/unauth/account/device/token", func(w http.ResponseWriter, r *http.Request) {
137
+ // testMethod(t, r)
138
+ // fmt.Fprint(w, `{
139
+ // "access_token": "secret1",
140
+ // "refresh_token": "secret2",
141
+ // "scope": "openid",
142
+ // "id_token": "idtoken",
143
+ // "token_type": "Bearer",
144
+ // "expires_in": 3600
145
+ // }`)
146
+ // })
147
+ // code := &DeviceCode{
148
+ // DeviceCode: "61eef18e310968047ff5e02a",
149
+ // ExpiresIn: 600,
150
+ // Interval: 10,
151
+ // }
152
+ // results, _, err := config.PollToken(ctx, code)
153
+ // if err != nil {
154
+ // t.Fatalf("PollToken returned error: %v", err)
155
+ // }
156
+
157
+ // expected := &Token{
158
+ // AccessToken: "secret1",
159
+ // RefreshToken: "secret2",
160
+ // Scope: "openid",
161
+ // IDToken: "idtoken",
162
+ // TokenType: "Bearer",
163
+ // ExpiresIn: 3600,
164
+ // }
165
+
166
+ // if diff := deep.Equal(results, expected); diff != nil {
167
+ // t.Error(diff)
168
+ // }
169
+ // }
170
170
171
171
func TestConfig_RevokeToken (t * testing.T ) {
172
172
config , mux , teardown := setup ()
0 commit comments