Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
D
dex
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
go
dex
Commits
786e12b1
Commit
786e12b1
authored
Nov 01, 2016
by
Eric Chiang
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
storage/conformance: expand transaction test suite
parent
52e2a166
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
124 additions
and
4 deletions
+124
-4
transactions.go
storage/conformance/transactions.go
+124
-4
No files found.
storage/conformance/transactions.go
View file @
786e12b1
...
...
@@ -4,6 +4,9 @@ package conformance
import
(
"testing"
"time"
"golang.org/x/crypto/bcrypt"
"github.com/coreos/dex/storage"
)
...
...
@@ -17,7 +20,10 @@ import (
// conformance.
func
RunTransactionTests
(
t
*
testing
.
T
,
newStorage
func
()
storage
.
Storage
)
{
runTests
(
t
,
newStorage
,
[]
subTest
{
{
"AuthRequestConcurrentUpdate"
,
testAuthRequestConcurrentUpdate
},
{
"ClientConcurrentUpdate"
,
testClientConcurrentUpdate
},
{
"PasswordConcurrentUpdate"
,
testPasswordConcurrentUpdate
},
{
"KeysConcurrentUpdate"
,
testKeysConcurrentUpdate
},
})
}
...
...
@@ -45,10 +51,124 @@ func testClientConcurrentUpdate(t *testing.T, s storage.Storage) {
return
old
,
nil
})
t
.
Logf
(
"update1: %v"
,
err1
)
t
.
Logf
(
"update2: %v"
,
err2
)
if
(
err1
==
nil
)
==
(
err2
==
nil
)
{
t
.
Errorf
(
"update client:
\n
update1: %v
\n
update2: %v
\n
"
,
err1
,
err2
)
}
}
func
testAuthRequestConcurrentUpdate
(
t
*
testing
.
T
,
s
storage
.
Storage
)
{
a
:=
storage
.
AuthRequest
{
ID
:
storage
.
NewID
(),
ClientID
:
"foobar"
,
ResponseTypes
:
[]
string
{
"code"
},
Scopes
:
[]
string
{
"openid"
,
"email"
},
RedirectURI
:
"https://localhost:80/callback"
,
Nonce
:
"foo"
,
State
:
"bar"
,
ForceApprovalPrompt
:
true
,
LoggedIn
:
true
,
Expiry
:
neverExpire
,
ConnectorID
:
"ldap"
,
ConnectorData
:
[]
byte
(
`{"some":"data"}`
),
Claims
:
storage
.
Claims
{
UserID
:
"1"
,
Username
:
"jane"
,
Email
:
"jane.doe@example.com"
,
EmailVerified
:
true
,
Groups
:
[]
string
{
"a"
,
"b"
},
},
}
if
err
:=
s
.
CreateAuthRequest
(
a
);
err
!=
nil
{
t
.
Fatalf
(
"failed creating auth request: %v"
,
err
)
}
var
err1
,
err2
error
err1
=
s
.
UpdateAuthRequest
(
a
.
ID
,
func
(
old
storage
.
AuthRequest
)
(
storage
.
AuthRequest
,
error
)
{
old
.
State
=
"state 1"
err2
=
s
.
UpdateAuthRequest
(
a
.
ID
,
func
(
old
storage
.
AuthRequest
)
(
storage
.
AuthRequest
,
error
)
{
old
.
State
=
"state 2"
return
old
,
nil
})
return
old
,
nil
})
if
(
err1
==
nil
)
==
(
err2
==
nil
)
{
t
.
Errorf
(
"update auth request:
\n
update1: %v
\n
update2: %v
\n
"
,
err1
,
err2
)
}
}
func
testPasswordConcurrentUpdate
(
t
*
testing
.
T
,
s
storage
.
Storage
)
{
// Use bcrypt.MinCost to keep the tests short.
passwordHash
,
err
:=
bcrypt
.
GenerateFromPassword
([]
byte
(
"secret"
),
bcrypt
.
MinCost
)
if
err
!=
nil
{
t
.
Fatal
(
err
)
}
password
:=
storage
.
Password
{
Email
:
"jane@example.com"
,
Hash
:
passwordHash
,
Username
:
"jane"
,
UserID
:
"foobar"
,
}
if
err
:=
s
.
CreatePassword
(
password
);
err
!=
nil
{
t
.
Fatalf
(
"create password token: %v"
,
err
)
}
var
err1
,
err2
error
err1
=
s
.
UpdatePassword
(
password
.
Email
,
func
(
old
storage
.
Password
)
(
storage
.
Password
,
error
)
{
old
.
Username
=
"user 1"
err2
=
s
.
UpdatePassword
(
password
.
Email
,
func
(
old
storage
.
Password
)
(
storage
.
Password
,
error
)
{
old
.
Username
=
"user 2"
return
old
,
nil
})
return
old
,
nil
})
if
(
err1
==
nil
)
==
(
err2
==
nil
)
{
t
.
Errorf
(
"update password: concurrent updates both returned no error"
)
}
}
func
testKeysConcurrentUpdate
(
t
*
testing
.
T
,
s
storage
.
Storage
)
{
// Test twice. Once for a create, once for an update.
for
i
:=
0
;
i
<
2
;
i
++
{
n
:=
time
.
Now
()
.
UTC
()
.
Round
(
time
.
Second
)
keys1
:=
storage
.
Keys
{
SigningKey
:
jsonWebKeys
[
0
]
.
Private
,
SigningKeyPub
:
jsonWebKeys
[
0
]
.
Public
,
NextRotation
:
n
,
}
keys2
:=
storage
.
Keys
{
SigningKey
:
jsonWebKeys
[
2
]
.
Private
,
SigningKeyPub
:
jsonWebKeys
[
2
]
.
Public
,
NextRotation
:
n
.
Add
(
time
.
Hour
),
VerificationKeys
:
[]
storage
.
VerificationKey
{
{
PublicKey
:
jsonWebKeys
[
0
]
.
Public
,
Expiry
:
n
.
Add
(
time
.
Hour
),
},
{
PublicKey
:
jsonWebKeys
[
1
]
.
Public
,
Expiry
:
n
.
Add
(
time
.
Hour
*
2
),
},
},
}
var
err1
,
err2
error
err1
=
s
.
UpdateKeys
(
func
(
old
storage
.
Keys
)
(
storage
.
Keys
,
error
)
{
err2
=
s
.
UpdateKeys
(
func
(
old
storage
.
Keys
)
(
storage
.
Keys
,
error
)
{
return
keys1
,
nil
})
return
keys2
,
nil
})
if
err1
==
nil
&&
err2
==
nil
{
t
.
Errorf
(
"update client: concurrent updates both returned no error"
)
if
(
err1
==
nil
)
==
(
err2
==
nil
)
{
t
.
Errorf
(
"update keys: concurrent updates both returned no error"
)
}
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment