1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
11 "git.arvados.org/arvados.git/sdk/go/arvados"
12 "git.arvados.org/arvados.git/sdk/go/arvadostest"
13 "git.arvados.org/arvados.git/sdk/go/auth"
14 check "gopkg.in/check.v1"
17 var _ = check.Suite(&LoginSuite{})
19 type LoginSuite struct {
23 func (s *LoginSuite) TestDeferToLoginCluster(c *check.C) {
24 s.addHTTPRemote(c, "zhome", &arvadostest.APIStub{})
25 s.cluster.Login.LoginCluster = "zhome"
27 returnTo := "https://app.example.com/foo?bar"
28 for _, remote := range []string{"", "ccccc"} {
29 resp, err := s.fed.Login(context.Background(), arvados.LoginOptions{Remote: remote, ReturnTo: returnTo})
30 c.Check(err, check.IsNil)
31 c.Logf("remote %q -- RedirectLocation %q", remote, resp.RedirectLocation)
32 target, err := url.Parse(resp.RedirectLocation)
33 c.Check(err, check.IsNil)
34 c.Check(target.Host, check.Equals, s.cluster.RemoteClusters["zhome"].Host)
35 c.Check(target.Scheme, check.Equals, "http")
36 c.Check(target.Query().Get("return_to"), check.Equals, returnTo)
37 c.Check(target.Query().Get("remote"), check.Equals, remote)
38 _, remotePresent := target.Query()["remote"]
39 c.Check(remotePresent, check.Equals, remote != "")
43 func (s *LoginSuite) TestLogout(c *check.C) {
44 s.cluster.Services.Workbench1.ExternalURL = arvados.URL{Scheme: "https", Host: "workbench1.example.com"}
45 s.cluster.Services.Workbench2.ExternalURL = arvados.URL{Scheme: "https", Host: "workbench2.example.com"}
46 s.cluster.Login.Google.Enable = true
47 s.cluster.Login.Google.ClientID = "zzzzzzzzzzzzzz"
48 s.addHTTPRemote(c, "zhome", &arvadostest.APIStub{})
49 s.cluster.Login.LoginCluster = "zhome"
50 // s.fed is already set by SetUpTest, but we need to
51 // reinitialize with the above config changes.
52 s.fed = New(s.cluster)
54 returnTo := "https://app.example.com/foo?bar"
55 for _, trial := range []struct {
60 {token: "", returnTo: "", target: s.cluster.Services.Workbench2.ExternalURL.String()},
61 {token: "", returnTo: returnTo, target: returnTo},
62 {token: "zzzzzzzzzzzzzzzzzzzzz", returnTo: returnTo, target: returnTo},
63 {token: "v2/zzzzz-aaaaa-aaaaaaaaaaaaaaa/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", returnTo: returnTo, target: returnTo},
64 {token: "v2/zhome-aaaaa-aaaaaaaaaaaaaaa/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", returnTo: returnTo, target: "http://" + s.cluster.RemoteClusters["zhome"].Host + "/logout?" + url.Values{"return_to": {returnTo}}.Encode()},
66 c.Logf("trial %#v", trial)
67 ctx := context.Background()
68 if trial.token != "" {
69 ctx = auth.NewContext(ctx, &auth.Credentials{Tokens: []string{trial.token}})
71 resp, err := s.fed.Logout(ctx, arvados.LogoutOptions{ReturnTo: trial.returnTo})
72 c.Assert(err, check.IsNil)
73 c.Logf(" RedirectLocation %q", resp.RedirectLocation)
74 target, err := url.Parse(resp.RedirectLocation)
75 c.Check(err, check.IsNil)
76 c.Check(target.String(), check.Equals, trial.target)