GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Passed
Push — master ( 20bc66...10e109 )
by Jackson
32:32 queued 21:48
created

credentials/oidc_credentials_provider_test.go   A

Size/Duplication

Total Lines 76
Duplicated Lines 0 %

Importance

Changes 0
Metric Value
cc 7
eloc 58
dl 0
loc 76
rs 10
c 0
b 0
f 0

1 Method

Rating   Name   Duplication   Size   Complexity  
B credentials.Test_oidcCredential_updateCredential 0 64 7
1
package credentials
2
3
import (
4
	"errors"
5
	"net/http"
6
	"os"
7
	"testing"
8
9
	"github.com/aliyun/credentials-go/credentials/utils"
10
	"github.com/stretchr/testify/assert"
11
)
12
13
func Test_oidcCredential_updateCredential(t *testing.T) {
14
	oidcCredential := newOIDCRoleArnCredential("accessKeyId", "accessKeySecret", "RoleArn", "OIDCProviderArn", "tokenFilePath", "roleSessionName", "Policy", 3600, nil)
15
	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) {
16
		return func(req *http.Request) (*http.Response, error) {
17
			return mockResponse(300, ``, errors.New("sdk test"))
18
		}
19
	}
20
	accesskeyId, err := oidcCredential.GetAccessKeyId()
21
	assert.NotNil(t, err)
22
	assert.Equal(t, "refresh RoleArn sts token err: sdk test", err.Error())
23
	assert.Nil(t, accesskeyId)
24
25
	assert.Equal(t, "oidc_role_arn", *oidcCredential.GetType())
26
27
	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) {
28
		return func(req *http.Request) (*http.Response, error) {
29
			return mockResponse(200, `{"Credentials":{"AccessKeyId":"accessKeyId","AccessKeySecret":"accessKeySecret","SecurityToken":"securitytoken","Expiration":"2020-01-02T15:04:05Z"}}`, nil)
30
		}
31
	}
32
33
	accesskeyId, err = oidcCredential.GetAccessKeyId()
34
	assert.Nil(t, err)
35
	assert.Equal(t, "accessKeyId", *accesskeyId)
36
37
	accesskeySecret, err := oidcCredential.GetAccessKeySecret()
38
	assert.Nil(t, err)
39
	assert.Equal(t, "accessKeySecret", *accesskeySecret)
40
41
	ststoken, err := oidcCredential.GetSecurityToken()
42
	assert.Nil(t, err)
43
	assert.Equal(t, "securitytoken", *ststoken)
44
45
	cred, err := oidcCredential.GetCredential()
46
	assert.Nil(t, err)
47
	assert.Equal(t, "accessKeyId", *cred.AccessKeyId)
48
	assert.Equal(t, "accessKeySecret", *cred.AccessKeySecret)
49
	assert.Equal(t, "securitytoken", *cred.SecurityToken)
50
	assert.Nil(t, cred.BearerToken)
51
	assert.Equal(t, "oidc_role_arn", *cred.Type)
52
53
	os.Setenv("ALIBABA_CLOUD_OIDC_TOKEN_FILE", "")
54
	token := getOIDCToken("/test")
55
	assert.Nil(t, token)
56
	path, _ := os.Getwd()
57
	os.Setenv("ALIBABA_CLOUD_OIDC_TOKEN_FILE", path+"/oidc_token")
58
	token = getOIDCToken("/test")
59
	assert.Equal(t, "test_long_oidc_token_eyJhbGciOiJSUzI1NiIsImtpZCI6ImFQaXlpNEVGSU8wWnlGcFh1V0psQUNWbklZVlJsUkNmM2tlSzNMUlhWT1UifQ.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.XGP-wgLj-iMiAHjLe0lZLh7y48Qsj9HzsEbNh706WwerBoxnssdsyGFb9lzd2FyM8CssbAOCstr7OuAMWNdJmDZgpiOGGSbQ-KXXmbfnIS4ix-V3pQF6LVBFr7xJlj20J6YY89um3rv_04t0iCGxKWs2ZMUyU1FbZpIPRep24LVKbUz1saiiVGgDBTIZdHA13Z-jUvYAnsxK_Kj5tc1K-IuQQU0IwSKJh5OShMcdPugMV5LwTL3ogCikfB7yljq5vclBhCeF2lXLIibvwF711TOhuJ5lMlh-a2KkIgwBHhANg_U9k4Mt_VadctfUGc4hxlSbBD0w9o9mDGKwgGmW5Q", *token)
60
	os.Setenv("ALIBABA_CLOUD_OIDC_TOKEN_FILE", "")
61
	token = getOIDCToken(path + "/oidc_token")
62
	assert.Equal(t, 1027, len(*token))
63
	assert.Equal(t, "test_long_oidc_token_eyJhbGciOiJSUzI1NiIsImtpZCI6ImFQaXlpNEVGSU8wWnlGcFh1V0psQUNWbklZVlJsUkNmM2tlSzNMUlhWT1UifQ.eyJhdWQiOlsic3RzLmFsaXl1bmNzLmNvbSJdLCJleHAiOjE2NDUxMTk3ODAsImlhdCI6MTY0NTA4Mzc4MCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWFjay1jbi1oYW5nemhvdS5vc3MtY24taGFuZ3pob3UtaW50ZXJuYWwuYWxpeXVuY3MuY29tL2NmMWQ4ZGIwMjM0ZDk0YzEyOGFiZDM3MTc4NWJjOWQxNSIsImt1YmVybmV0ZXMuaW8iOnsibmFtZXNwYWNlIjoidGVzdC1ycnNhIiwicG9kIjp7Im5hbWUiOiJydW4tYXMtcm9vdCIsInVpZCI6ImIzMGI0MGY2LWNiZTAtNGY0Yy1hZGYyLWM1OGQ4ZmExZTAxMCJ9LCJzZXJ2aWNlYWNjb3VudCI6eyJuYW1lIjoidXNlcjEiLCJ1aWQiOiJiZTEyMzdjYS01MTY4LTQyMzYtYWUyMC00NDM1YjhmMGI4YzAifX0sIm5iZiI6MTY0NTA4Mzc4MCwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50OnRlc3QtcnJzYTp1c2VyMSJ9.XGP-wgLj-iMiAHjLe0lZLh7y48Qsj9HzsEbNh706WwerBoxnssdsyGFb9lzd2FyM8CssbAOCstr7OuAMWNdJmDZgpiOGGSbQ-KXXmbfnIS4ix-V3pQF6LVBFr7xJlj20J6YY89um3rv_04t0iCGxKWs2ZMUyU1FbZpIPRep24LVKbUz1saiiVGgDBTIZdHA13Z-jUvYAnsxK_Kj5tc1K-IuQQU0IwSKJh5OShMcdPugMV5LwTL3ogCikfB7yljq5vclBhCeF2lXLIibvwF711TOhuJ5lMlh-a2KkIgwBHhANg_U9k4Mt_VadctfUGc4hxlSbBD0w9o9mDGKwgGmW5Q", *token)
64
65
	oidcCredential = newOIDCRoleArnCredential("accessKeyId", "accessKeySecret", "RoleArn", "OIDCProviderArn", "tokenFilePath", "roleSessionName", "Policy", 7200, &utils.Runtime{STSEndpoint: "www.aliyun.com"})
66
	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) {
67
		return func(req *http.Request) (*http.Response, error) {
68
			assert.Equal(t, "www.aliyun.com", req.Host)
69
			assert.Contains(t, req.URL.RawQuery, "DurationSeconds=7200")
70
			return mockResponse(400, ``, errors.New("sdk test"))
71
		}
72
	}
73
	accesskeyId, err = oidcCredential.GetAccessKeyId()
74
	assert.NotNil(t, err)
75
	assert.Equal(t, "refresh RoleArn sts token err: sdk test", err.Error())
76
	assert.Nil(t, accesskeyId)
77
}
78