|
1 | 1 | package oidc |
2 | 2 |
|
3 | 3 | import ( |
| 4 | + "encoding/json" |
4 | 5 | "testing" |
5 | 6 | "time" |
6 | 7 |
|
@@ -278,3 +279,174 @@ func TestNewLogoutTokenClaims(t *testing.T) { |
278 | 279 |
|
279 | 280 | assert.Equal(t, want, got) |
280 | 281 | } |
| 282 | + |
| 283 | +func TestTokenExchangeResponse_UnmarshalJSON(t *testing.T) { |
| 284 | + testCases := []struct { |
| 285 | + marshaled string |
| 286 | + want TokenExchangeResponse |
| 287 | + }{ |
| 288 | + { |
| 289 | + marshaled: ` |
| 290 | + { |
| 291 | + "access_token":"access_token", |
| 292 | + "issued_token_type":"test_token", |
| 293 | + "token_type":"test_token", |
| 294 | + "expires_in":12345, |
| 295 | + "scope": "lorem ipsum", |
| 296 | + "refresh_token": "refresh_token", |
| 297 | + "id_token": "id_token" |
| 298 | + }`, |
| 299 | + want: TokenExchangeResponse{ |
| 300 | + AccessToken: "access_token", |
| 301 | + IssuedTokenType: "test_token", |
| 302 | + TokenType: "test_token", |
| 303 | + ExpiresIn: Duration(12345 * time.Second), |
| 304 | + Scopes: []string{"lorem", "ipsum"}, |
| 305 | + RefreshToken: "refresh_token", |
| 306 | + IDToken: "id_token", |
| 307 | + }, |
| 308 | + }, |
| 309 | + { |
| 310 | + marshaled: ` |
| 311 | + { |
| 312 | + "access_token":"access_token", |
| 313 | + "issued_token_type":"test_token", |
| 314 | + "token_type":"test_token", |
| 315 | + "expires_in":"12345", |
| 316 | + "scope": "lorem ipsum", |
| 317 | + "refresh_token": "refresh_token", |
| 318 | + "id_token": "id_token" |
| 319 | + }`, |
| 320 | + want: TokenExchangeResponse{ |
| 321 | + AccessToken: "access_token", |
| 322 | + IssuedTokenType: "test_token", |
| 323 | + TokenType: "test_token", |
| 324 | + ExpiresIn: Duration(12345 * time.Second), |
| 325 | + Scopes: []string{"lorem", "ipsum"}, |
| 326 | + RefreshToken: "refresh_token", |
| 327 | + IDToken: "id_token", |
| 328 | + }, |
| 329 | + }, |
| 330 | + } |
| 331 | + for _, testCase := range testCases { |
| 332 | + got := &TokenExchangeResponse{} |
| 333 | + err := json.Unmarshal([]byte(testCase.marshaled), got) |
| 334 | + assert.Equal(t, nil, err) |
| 335 | + assert.Equal(t, testCase.want.AccessToken, got.AccessToken) |
| 336 | + assert.Equal(t, testCase.want.IssuedTokenType, got.IssuedTokenType) |
| 337 | + assert.Equal(t, testCase.want.TokenType, got.TokenType) |
| 338 | + assert.Equal(t, testCase.want.ExpiresIn, got.ExpiresIn) |
| 339 | + assert.Equal(t, testCase.want.Scopes, got.Scopes) |
| 340 | + assert.Equal(t, testCase.want.RefreshToken, got.RefreshToken) |
| 341 | + assert.Equal(t, testCase.want.IDToken, got.IDToken) |
| 342 | + } |
| 343 | +} |
| 344 | +func TestTokenExchangeResponse_MarshalJSON(t *testing.T) { |
| 345 | + testCases := []struct { |
| 346 | + want string |
| 347 | + unmarshaled TokenExchangeResponse |
| 348 | + }{ |
| 349 | + { |
| 350 | + want: `{"access_token":"access_token","issued_token_type":"test_token","token_type":"test_token","expires_in":12345,"scope":"lorem ipsum","refresh_token":"refresh_token","id_token":"id_token"}`, |
| 351 | + unmarshaled: TokenExchangeResponse{ |
| 352 | + AccessToken: "access_token", |
| 353 | + IssuedTokenType: "test_token", |
| 354 | + TokenType: "test_token", |
| 355 | + ExpiresIn: Duration(12345 * time.Second), |
| 356 | + Scopes: []string{"lorem", "ipsum"}, |
| 357 | + RefreshToken: "refresh_token", |
| 358 | + IDToken: "id_token", |
| 359 | + }, |
| 360 | + }, |
| 361 | + } |
| 362 | + for _, testCase := range testCases { |
| 363 | + got, err := json.Marshal(testCase.unmarshaled) |
| 364 | + assert.Equal(t, nil, err) |
| 365 | + assert.Equal(t, testCase.want, string(got)) |
| 366 | + } |
| 367 | +} |
| 368 | +func TestAccessTokenResponse_UnmarshalJSON(t *testing.T) { |
| 369 | + testCases := []struct { |
| 370 | + marshaled string |
| 371 | + want AccessTokenResponse |
| 372 | + }{ |
| 373 | + { |
| 374 | + marshaled: ` |
| 375 | + { |
| 376 | + "access_token":"access_token", |
| 377 | + "token_type":"test_token", |
| 378 | + "refresh_token": "refresh_token", |
| 379 | + "expires_in":12345, |
| 380 | + "id_token": "id_token", |
| 381 | + "state": "state", |
| 382 | + "scope": "lorem ipsum" |
| 383 | + }`, |
| 384 | + want: AccessTokenResponse{ |
| 385 | + AccessToken: "access_token", |
| 386 | + TokenType: "test_token", |
| 387 | + RefreshToken: "refresh_token", |
| 388 | + ExpiresIn: Duration(12345 * time.Second), |
| 389 | + IDToken: "id_token", |
| 390 | + State: "state", |
| 391 | + Scope: []string{"lorem", "ipsum"}, |
| 392 | + }, |
| 393 | + }, |
| 394 | + { |
| 395 | + marshaled: ` |
| 396 | + { |
| 397 | + "access_token":"access_token", |
| 398 | + "token_type":"test_token", |
| 399 | + "refresh_token": "refresh_token", |
| 400 | + "expires_in":"12345", |
| 401 | + "id_token": "id_token", |
| 402 | + "state": "state", |
| 403 | + "scope": "lorem ipsum" |
| 404 | + }`, |
| 405 | + want: AccessTokenResponse{ |
| 406 | + AccessToken: "access_token", |
| 407 | + TokenType: "test_token", |
| 408 | + RefreshToken: "refresh_token", |
| 409 | + ExpiresIn: Duration(12345 * time.Second), |
| 410 | + IDToken: "id_token", |
| 411 | + State: "state", |
| 412 | + Scope: []string{"lorem", "ipsum"}, |
| 413 | + }, |
| 414 | + }, |
| 415 | + } |
| 416 | + for _, testCase := range testCases { |
| 417 | + got := &AccessTokenResponse{} |
| 418 | + err := json.Unmarshal([]byte(testCase.marshaled), got) |
| 419 | + assert.Equal(t, nil, err) |
| 420 | + assert.Equal(t, testCase.want.AccessToken, got.AccessToken) |
| 421 | + assert.Equal(t, testCase.want.TokenType, got.TokenType) |
| 422 | + assert.Equal(t, testCase.want.RefreshToken, got.RefreshToken) |
| 423 | + assert.Equal(t, testCase.want.ExpiresIn, got.ExpiresIn) |
| 424 | + assert.Equal(t, testCase.want.IDToken, got.IDToken) |
| 425 | + assert.Equal(t, testCase.want.State, got.State) |
| 426 | + assert.Equal(t, testCase.want.Scope, got.Scope) |
| 427 | + } |
| 428 | +} |
| 429 | +func TestAccessTokenResponse_MarshalJSON(t *testing.T) { |
| 430 | + testCases := []struct { |
| 431 | + want string |
| 432 | + unmarshaled AccessTokenResponse |
| 433 | + }{ |
| 434 | + { |
| 435 | + want: `{"access_token":"access_token","token_type":"test_token","refresh_token":"refresh_token","expires_in":12345,"id_token":"id_token","state":"state","scope":"lorem ipsum"}`, |
| 436 | + unmarshaled: AccessTokenResponse{ |
| 437 | + AccessToken: "access_token", |
| 438 | + TokenType: "test_token", |
| 439 | + RefreshToken: "refresh_token", |
| 440 | + ExpiresIn: Duration(12345 * time.Second), |
| 441 | + IDToken: "id_token", |
| 442 | + State: "state", |
| 443 | + Scope: []string{"lorem", "ipsum"}, |
| 444 | + }, |
| 445 | + }, |
| 446 | + } |
| 447 | + for _, testCase := range testCases { |
| 448 | + got, err := json.Marshal(testCase.unmarshaled) |
| 449 | + assert.Equal(t, nil, err) |
| 450 | + assert.Equal(t, testCase.want, string(got)) |
| 451 | + } |
| 452 | +} |
0 commit comments