64
64
import static com .mongodb .MongoCredential .OIDC_HUMAN_CALLBACK_KEY ;
65
65
import static com .mongodb .MongoCredential .OidcCallback ;
66
66
import static com .mongodb .MongoCredential .OidcCallbackContext ;
67
- import static com .mongodb .MongoCredential .OidcTokens ;
67
+ import static com .mongodb .MongoCredential .OidcCallbackResult ;
68
68
import static com .mongodb .assertions .Assertions .assertNotNull ;
69
69
import static java .lang .System .getenv ;
70
70
import static java .util .Arrays .asList ;
@@ -211,7 +211,7 @@ public void test2p3CallbackReturnsMissingData() {
211
211
// conforming to the OIDCRequestTokenResult with missing field(s).
212
212
OidcCallback callback = (context ) -> {
213
213
//noinspection ConstantConditions
214
- return new OidcTokens (null );
214
+ return new OidcCallbackResult (null );
215
215
};
216
216
// we ensure that the error is propagated
217
217
MongoClientSettings clientSettings = createSettings (callback );
@@ -238,7 +238,7 @@ public void test3p1AuthFailsWithCachedToken() throws ExecutionException, Interru
238
238
// reference to the token to poison
239
239
CompletableFuture <String > poisonToken = new CompletableFuture <>();
240
240
OidcCallback callback = (context ) -> {
241
- OidcTokens result = callbackWrapped .onRequest (context );
241
+ OidcCallbackResult result = callbackWrapped .onRequest (context );
242
242
String accessToken = result .getAccessToken ();
243
243
if (!poisonToken .isDone ()) {
244
244
poisonToken .complete (accessToken );
@@ -272,7 +272,7 @@ public void test3p1AuthFailsWithCachedToken() throws ExecutionException, Interru
272
272
@ Test
273
273
public void test3p2AuthFailsWithoutCachedToken () {
274
274
OidcCallback callback =
275
- (x ) -> new OidcTokens ("invalid_token" );
275
+ (x ) -> new OidcCallbackResult ("invalid_token" );
276
276
MongoClientSettings clientSettings = createSettings (callback );
277
277
try (MongoClient mongoClient = createMongoClient (clientSettings )) {
278
278
assertCause (MongoCommandException .class ,
@@ -328,8 +328,8 @@ public void test4p2ReadCommandsFailIfReauthenticationFails() {
328
328
// and then bad tokens after the first call.
329
329
TestCallback wrappedCallback = createCallback ();
330
330
OidcCallback callback = (context ) -> {
331
- OidcTokens result1 = wrappedCallback .callback (context );
332
- return new OidcTokens (wrappedCallback .getInvocations () > 1 ? "bad" : result1 .getAccessToken ());
331
+ OidcCallbackResult result1 = wrappedCallback .callback (context );
332
+ return new OidcCallbackResult (wrappedCallback .getInvocations () > 1 ? "bad" : result1 .getAccessToken ());
333
333
};
334
334
MongoClientSettings clientSettings = createSettings (callback );
335
335
try (MongoClient mongoClient = createMongoClient (clientSettings )) {
@@ -348,8 +348,8 @@ public void test4p3WriteCommandsFailIfReauthenticationFails() {
348
348
// and then bad tokens after the first call.
349
349
TestCallback wrappedCallback = createCallback ();
350
350
OidcCallback callback = (context ) -> {
351
- OidcTokens result1 = wrappedCallback .callback (context );
352
- return new OidcTokens (
351
+ OidcCallbackResult result1 = wrappedCallback .callback (context );
352
+ return new OidcCallbackResult (
353
353
wrappedCallback .getInvocations () > 1 ? "bad" : result1 .getAccessToken ());
354
354
};
355
355
MongoClientSettings clientSettings = createSettings (callback );
@@ -526,7 +526,7 @@ public void testh2p2HumanCallbackReturnsMissingData() {
526
526
527
527
//noinspection ConstantConditions
528
528
OidcCallback callback =
529
- (context ) -> new OidcTokens (null );
529
+ (context ) -> new OidcCallbackResult (null );
530
530
assertFindFails (createHumanSettings (callback , null ),
531
531
IllegalArgumentException .class ,
532
532
"accessToken can not be null" );
@@ -537,7 +537,7 @@ public void testh2p2HumanCallbackReturnsMissingData() {
537
537
public void testRefreshTokenAbsent () {
538
538
// additionally, check validation for refresh in machine workflow:
539
539
OidcCallback callbackMachineRefresh =
540
- (context ) -> new OidcTokens ("access" , Duration .ZERO , "exists" );
540
+ (context ) -> new OidcCallbackResult ("access" , Duration .ZERO , "exists" );
541
541
assertFindFails (createSettings (callbackMachineRefresh ),
542
542
MongoConfigurationException .class ,
543
543
"Refresh token must only be provided in human workflow" );
@@ -648,8 +648,8 @@ public void testh4p3SucceedsAfterRefreshFails() {
648
648
assumeTestEnvironment ();
649
649
TestCallback callback1 = createHumanCallback ();
650
650
OidcCallback callback2 = (context ) -> {
651
- OidcTokens oidcTokens = callback1 .onRequest (context );
652
- return new OidcTokens ( oidcTokens .getAccessToken (), Duration .ofMinutes (5 ), "BAD_REFRESH" );
651
+ OidcCallbackResult oidcCallbackResult = callback1 .onRequest (context );
652
+ return new OidcCallbackResult ( oidcCallbackResult .getAccessToken (), Duration .ofMinutes (5 ), "BAD_REFRESH" );
653
653
};
654
654
MongoClientSettings clientSettings = createHumanSettings (callback2 , null );
655
655
try (MongoClient mongoClient = createMongoClient (clientSettings )) {
@@ -670,8 +670,8 @@ public void testh4p4Fails() {
670
670
TestCallback callback1 = createHumanCallback ()
671
671
.setPathSupplier (() -> tokens .remove ());
672
672
OidcCallback callback2 = (context ) -> {
673
- OidcTokens oidcTokens = callback1 .onRequest (context );
674
- return new OidcTokens ( oidcTokens .getAccessToken (), Duration .ofMinutes (5 ), "BAD_REFRESH" );
673
+ OidcCallbackResult oidcCallbackResult = callback1 .onRequest (context );
674
+ return new OidcCallbackResult ( oidcCallbackResult .getAccessToken (), Duration .ofMinutes (5 ), "BAD_REFRESH" );
675
675
};
676
676
MongoClientSettings clientSettings = createHumanSettings (callback2 , null );
677
677
try (MongoClient mongoClient = createMongoClient (clientSettings )) {
@@ -976,7 +976,7 @@ public int getInvocations() {
976
976
}
977
977
978
978
@ Override
979
- public OidcTokens onRequest (final OidcCallbackContext context ) {
979
+ public OidcCallbackResult onRequest (final OidcCallbackContext context ) {
980
980
if (testListener != null ) {
981
981
testListener .add ("onRequest invoked ("
982
982
+ "Refresh Token: " + (context .getRefreshToken () == null ? "none" : "present" )
@@ -986,7 +986,7 @@ public OidcTokens onRequest(final OidcCallbackContext context) {
986
986
return callback (context );
987
987
}
988
988
989
- private OidcTokens callback (final OidcCallbackContext context ) {
989
+ private OidcCallbackResult callback (final OidcCallbackContext context ) {
990
990
if (concurrentTracker != null ) {
991
991
if (concurrentTracker .get () > 0 ) {
992
992
throw new RuntimeException ("Callbacks should not be invoked by multiple threads." );
@@ -1007,12 +1007,7 @@ private OidcTokens callback(final OidcCallbackContext context) {
1007
1007
c = OidcAuthenticator .getAzureCallback (credential );
1008
1008
} else if (oidcEnv .contains ("gcp" )) {
1009
1009
c = OidcAuthenticator .getGcpCallback (credential );
1010
- } else if (oidcEnv .contains ("test" )) {
1011
- c = null ;
1012
1010
} else {
1013
- c = null ;
1014
- }
1015
- if (c == null ) {
1016
1011
c = getProseTestCallback ();
1017
1012
}
1018
1013
return c .onRequest (context );
@@ -1034,7 +1029,7 @@ private OidcCallback getProseTestCallback() {
1034
1029
if (testListener != null ) {
1035
1030
testListener .add ("read access token: " + path .getFileName ());
1036
1031
}
1037
- return new OidcTokens (accessToken , Duration .ZERO , refreshToken );
1032
+ return new OidcCallbackResult (accessToken , Duration .ZERO , refreshToken );
1038
1033
} catch (IOException e ) {
1039
1034
throw new RuntimeException (e );
1040
1035
}
0 commit comments