forked from snowflakedb/gosnowflake
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathauth_with_oauth_snowflake_authorization_code_wildcards_test.go
More file actions
110 lines (91 loc) · 3.95 KB
/
auth_with_oauth_snowflake_authorization_code_wildcards_test.go
File metadata and controls
110 lines (91 loc) · 3.95 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
package gosnowflake
import (
"fmt"
"sync"
"testing"
"time"
)
func TestOauthSnowflakeAuthorizationCodeWildcardsSuccessful(t *testing.T) {
cfg := setupOauthSnowflakeAuthorizationCodeWildcardsTest(t)
browserCfg, err := getOauthSnowflakeAuthorizationCodeTestCredentials()
assertNilF(t, err, fmt.Sprintf("failed to get browser config: %v", err))
var wg sync.WaitGroup
wg.Add(2)
go func() {
defer wg.Done()
provideExternalBrowserCredentials(t, externalBrowserType.OauthSnowflakeSuccess, browserCfg.User, browserCfg.Password)
}()
go func() {
defer wg.Done()
err := verifyConnectionToSnowflakeAuthTests(t, cfg)
assertNilE(t, err, fmt.Sprintf("Connection failed due to %v", err))
}()
wg.Wait()
}
func TestOauthSnowflakeAuthorizationCodeWildcardsMismatchedUsername(t *testing.T) {
cfg := setupOauthSnowflakeAuthorizationCodeWildcardsTest(t)
browserCfg, err := getOauthSnowflakeAuthorizationCodeTestCredentials()
assertNilF(t, err, fmt.Sprintf("failed to get browser config: %v", err))
var wg sync.WaitGroup
wg.Add(2)
go func() {
defer wg.Done()
provideExternalBrowserCredentials(t, externalBrowserType.OauthSnowflakeSuccess, browserCfg.User, browserCfg.Password)
}()
go func() {
defer wg.Done()
cfg.User = "fakeUser@snowflake.com"
err := verifyConnectionToSnowflakeAuthTests(t, cfg)
var snowflakeErr *SnowflakeError
assertErrorsAsF(t, err, &snowflakeErr)
assertEqualE(t, snowflakeErr.Number, 390309, fmt.Sprintf("Expected 390309, but got %v", snowflakeErr.Number))
}()
wg.Wait()
}
func TestOauthSnowflakeAuthorizationWildcardsCodeTimeout(t *testing.T) {
cfg := setupOauthSnowflakeAuthorizationCodeWildcardsTest(t)
cfg.ExternalBrowserTimeout = time.Duration(1) * time.Second
err := verifyConnectionToSnowflakeAuthTests(t, cfg)
assertNotNilF(t, err, "should failed due to timeout")
assertEqualE(t, err.Error(), "authentication via browser timed out", fmt.Sprintf("Expecteed timeout, but got %v", err))
}
func TestOauthSnowflakeAuthorizationCodeWildcardsWithoutTokenCache(t *testing.T) {
cfg := setupOauthSnowflakeAuthorizationCodeWildcardsTest(t)
browserCfg, err := getOauthSnowflakeAuthorizationCodeTestCredentials()
assertNilF(t, err, fmt.Sprintf("failed to get browser config: %v", err))
cfg.ClientStoreTemporaryCredential = 2
var wg sync.WaitGroup
cfg.DisableQueryContextCache = true
wg.Add(2)
go func() {
defer wg.Done()
provideExternalBrowserCredentials(t, externalBrowserType.OauthSnowflakeSuccess, browserCfg.User, browserCfg.Password)
}()
go func() {
defer wg.Done()
err := verifyConnectionToSnowflakeAuthTests(t, cfg)
assertNilE(t, err, fmt.Sprintf("Connection failed due to %v", err))
}()
wg.Wait()
cleanupBrowserProcesses(t)
cfg.ExternalBrowserTimeout = time.Duration(1) * time.Second
err = verifyConnectionToSnowflakeAuthTests(t, cfg)
assertNotNilF(t, err, "Expected an error but got nil")
assertEqualE(t, err.Error(), "authentication via browser timed out", fmt.Sprintf("Expecteed timeout, but got %v", err))
}
func setupOauthSnowflakeAuthorizationCodeWildcardsTest(t *testing.T) *Config {
skipAuthTests(t, "Skipping Snowflake Authorization Code tests")
cfg, err := getAuthTestsConfig(t, AuthTypeOAuthAuthorizationCode)
assertNilF(t, err, fmt.Sprintf("failed to get config: %v", err))
cleanupBrowserProcesses(t)
cfg.OauthClientID, err = GetFromEnv("SNOWFLAKE_AUTH_TEST_INTERNAL_OAUTH_SNOWFLAKE_WILDCARDS_CLIENT_ID", true)
assertNilF(t, err, fmt.Sprintf("failed to setup config: %v", err))
cfg.OauthClientSecret, err = GetFromEnv("SNOWFLAKE_AUTH_TEST_INTERNAL_OAUTH_SNOWFLAKE_WILDCARDS_CLIENT_SECRET", true)
assertNilF(t, err, fmt.Sprintf("failed to setup config: %v", err))
cfg.User, err = GetFromEnv("SNOWFLAKE_AUTH_TEST_EXTERNAL_OAUTH_OKTA_CLIENT_ID", true)
assertNilF(t, err, fmt.Sprintf("failed to setup config: %v", err))
cfg.Role, err = GetFromEnv("SNOWFLAKE_AUTH_TEST_INTERNAL_OAUTH_SNOWFLAKE_ROLE", true)
assertNilF(t, err, fmt.Sprintf("failed to setup config: %v", err))
cfg.ClientStoreTemporaryCredential = 2
return cfg
}