Browse Source

Remove the test code.

Tim Fletcher 16 years ago
parent
commit
98bfd9f150
5 changed files with 0 additions and 194 deletions
  1. 0 36
      test/oauth_google.erl
  2. 0 32
      test/oauth_termie.erl
  3. 0 95
      test/oauth_unit.erl
  4. 0 15
      test/rsa_private_key.pem
  5. 0 16
      test/rsa_private_key.pkcs8

+ 0 - 36
test/oauth_google.erl

@@ -1,36 +0,0 @@
--module(oauth_google).
-
--compile(export_all).
-
--include_lib("xmerl/include/xmerl.hrl").
-
-% cf. http://groups.google.com/group/oauth/msg/0cf50121f946a889
-
-
-test() ->
-  SignatureMethod = {"RSA-SHA1", "test/rsa_private_key.pem"},
-  get_request_token(oauth_consumer:new("weitu.googlepages.com", "x", SignatureMethod)).
-
-get_request_token(Consumer) ->
-  RequestTokenURL = "https://www.google.com/accounts/OAuthGetRequestToken",
-  Params = [{scope, "http://www.google.com/m8/feeds"}],
-  Response = oauth:get(RequestTokenURL, Consumer, Params),
-  authorize_token(Consumer, tee("RequestTokenPair: ", oauth_token_pair:new(Response))).
-
-authorize_token(Consumer, RequestTokenPair={RequestToken, _}) ->
-  AuthorizeTokenURL = "https://www.google.com/accounts/OAuthAuthorizeToken",
-  Params = [{oauth_token, RequestToken}],
-  Prompt = fmt:sprintf("Please authorize at %s?%s~n", [AuthorizeTokenURL, oauth_params:to_string(Params)]),
-  io:get_line(Prompt),
-  get_access_token(Consumer, RequestTokenPair).
-
-get_access_token(Consumer, RequestTokenPair) ->
-  AccessTokenURL = "https://www.google.com/accounts/OAuthGetAccessToken",
-  AccessTokenPair = tee("AccessTokenPair: ", oauth_token_pair:new(oauth:get(AccessTokenURL, Consumer, RequestTokenPair))),
-  {ok, {_, _, Data}} = oauth:get("http://www.google.com/m8/feeds/contacts/default/base", Consumer, AccessTokenPair),
-  {XML, _} = xmerl_scan:string(Data),
-  Titles = [Node#xmlText.value || Node <- xmerl_xpath:string("//feed/entry/title/text()", XML)],
-  lists:foreach(fun(Title) -> io:format("~s~n", [Title]) end, Titles).
-
-tee(Tag, X) ->
-  io:format("~s: ~p~n~n", [Tag, X]), X.

+ 0 - 32
test/oauth_termie.erl

@@ -1,32 +0,0 @@
--module(oauth_termie).
-
--compile(export_all).
-
-% cf. http://term.ie/oauth/example/
-
-
-test_hmac() ->
-  test(consumer("HMAC-SHA1")).
-
-test_rsa() ->
-  test(consumer({"RSA-SHA1", "test/rsa_private_key.pem"})).
-
-test(Consumer) ->
-  RequestTokenURL = "http://term.ie/oauth/example/request_token.php",
-  test(Consumer, tee(oauth_token_pair:new(oauth:get(RequestTokenURL, Consumer)))).
-
-test(Consumer, RequestTokenPair) ->
-  AccessTokenURL = "http://term.ie/oauth/example/access_token.php",
-  AccessTokenResponse = tee(oauth_token_pair:new(oauth:get(AccessTokenURL, Consumer, RequestTokenPair))),
-  test(Consumer, AccessTokenResponse, [{bar, "baz"}, {method, "foo"}]).
-
-test(Consumer, AccessTokenPair, EchoParams) ->
-  EchoURL = "http://term.ie/oauth/example/echo_api.php",
-  {ok, {_,_,Data}} = tee(oauth:get(EchoURL, Consumer, AccessTokenPair, EchoParams)),
-  tee(lists:keysort(1, oauth_params:from_string(Data))).
-
-consumer(SignatureMethod) ->
-  oauth_consumer:new("key", "secret", SignatureMethod).
-
-tee(X) ->
-  error_logger:info_msg("~p~n~n", [X]), X.

+ 0 - 95
test/oauth_unit.erl

@@ -1,95 +0,0 @@
--module(oauth_unit).
-
--include_lib("eunit/include/eunit.hrl").
-
--include("oauth_test_macros.hrl").
-
-
-params_from_string_test_() ->
-  % cf. http://oauth.net/core/1.0/#response_parameters (5.3)
-  Params = oauth_params:from_string("oauth_token=ab3cd9j4ks73hf7g&oauth_token_secret=xyz4992k83j47x0b"), [
-  ?_assertEqual("ab3cd9j4ks73hf7g", proplists:get_value("oauth_token", Params)),
-  ?_assertEqual("xyz4992k83j47x0b", proplists:get_value("oauth_token_secret", Params))
-].
-
-params_to_header_string_test_() ->
-  % cf. http://oauth.net/core/1.0/#auth_header_authorization (5.4.1)
-  Params = [{oauth_consumer_key, "0685bd9184jfhq22"}, {oauth_token, "ad180jjd733klru7"}],
-  String = "oauth_consumer_key=\"0685bd9184jfhq22\",oauth_token=\"ad180jjd733klru7\"", [
-  ?_assertEqual(String, oauth_params:to_header_string(Params))
-].
-
-plaintext_signature_test_() -> [
-  % cf. http://oauth.net/core/1.0/#rfc.section.9.4.1
-  ?plaintext_signature_test("djr9rjt0jd78jf88", "jjd999tj88uiths3", "djr9rjt0jd78jf88%26jjd999tj88uiths3"),
-  ?plaintext_signature_test("djr9rjt0jd78jf88", "jjd99$tj88uiths3", "djr9rjt0jd78jf88%26jjd99%2524tj88uiths3"),
-  ?plaintext_signature_test("djr9rjt0jd78jf88", "", "djr9rjt0jd78jf88%26")
-].
-
-normalize_test_() -> [
-  % cf. http://wiki.oauth.net/TestCases
-  ?normalize_test("name=", [{name,undefined}]),
-  ?normalize_test("a=b", [{a,b}]),
-  ?normalize_test("a=b&c=d", [{a,b},{c,d}]),
-  ?normalize_test("a=x%20y&a=x%21y", [{a,"x!y"},{a,"x y"}]),
-  ?normalize_test("x=a&x%21y=a", [{"x!y",a},{x,a}])
-].
-
-base_string_test_() -> [
-  % cf. http://wiki.oauth.net/TestCases
-  ?base_string_test("GET", "http://example.com/", [{n,v}], ["GET&http%3A%2F%2Fexample.com%2F&n%3Dv"]),
-  ?base_string_test("GET", "http://example.com", [{n,v}], ["GET&http%3A%2F%2Fexample.com%2F&n%3Dv"]),
-  ?base_string_test("POST", "https://photos.example.net/request_token", [
-    {oauth_version, "1.0"},
-    {oauth_consumer_key, "dpf43f3p2l4k3l03"},
-    {oauth_timestamp, "1191242090"},
-    {oauth_nonce, "hsu94j3884jdopsl"},
-    {oauth_signature_method, "PLAINTEXT"}
-  ], [
-    "POST&https%3A%2F%2Fphotos.example.net%2Frequest_token&oauth_consumer_key",
-    "%3Ddpf43f3p2l4k3l03%26oauth_nonce%3Dhsu94j3884jdopsl%26oauth_signature_method",
-    "%3DPLAINTEXT%26oauth_timestamp%3D1191242090%26oauth_version%3D1.0"
-  ]),
-  ?base_string_test("GET", "http://photos.example.net/photos", [
-    {file, "vacation.jpg"},
-    {size, "original"},
-    {oauth_version, "1.0"},
-    {oauth_consumer_key, "dpf43f3p2l4k3l03"},
-    {oauth_token, "nnch734d00sl2jdk"},
-    {oauth_timestamp, "1191242096"},
-    {oauth_nonce, "kllo9940pd9333jh"},
-    {oauth_signature_method, "HMAC-SHA1"}
-  ], [
-    "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26",
-    "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26oauth_nonce%3Dkllo9940pd9333jh%26",
-    "oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26",
-    "oauth_token%3Dnnch734d00sl2jdk%26oauth_version%3D1.0%26size%3Doriginal"
-  ])
-].
-
-hmac_signature_test_() -> [
-  % cf. http://wiki.oauth.net/TestCases
-  ?hmac_signature_test("egQqG5AJep5sJ7anhXju1unge2I=", "cs", "", ["bs"]),
-  ?hmac_signature_test("VZVjXceV7JgPq/dOTnNmEfO0Fv8=", "cs", "ts", ["bs"]),
-  ?hmac_signature_test("tR3+Ty81lMeYAr/Fid0kMTYa/WM=", "kd94hf93k423kf44", "pfkkdhi9sl3r4s00", [
-    "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26",
-    "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26oauth_nonce%3Dkllo9940pd9333jh%26",
-    "oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26",
-    "oauth_token%3Dnnch734d00sl2jdk%26oauth_version%3D1.0%26size%3Doriginal"
-  ])
-].
-
-rsa_signature_test() ->
-  BaseString = lists:concat([
-    "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacaction.jpg",
-    "%26oauth_consumer_key%3Ddpf43f3p2l4k3l03%26oauth_nonce%3D13917289812797014437",
-    "%26oauth_signature_method%3DRSA-SHA1%26oauth_timestamp%3D1196666512",
-    "%26oauth_version%3D1.0%26size%3Doriginal"
-  ]),
-  ExpectedSignature = lists:concat([
-    "jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/",
-    "9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//",
-    "e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE="
-  ]),
-  Signature = oauth_crypto:rsa_signature(BaseString, "test/rsa_private_key.pem"),
-  ?assertEqual(ExpectedSignature, Signature).

+ 0 - 15
test/rsa_private_key.pem

@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC0YjCwIfYoprq/FQO6lb3asXrxLlJFuCvtinTF5p0GxvQGu5O3
-gYytUvtC2JlYzypSRjVxwxrsuRcP3e641SdASwfrmzyvIgP08N4S0IFzEURkV1wp
-/IpH7kH41EtbmUmrXSwfNZsnQRE5SYSOhh+LcK2wyQkdgcMv11l4KoBkcwIDAQAB
-AoGAWFlbZXlM2r5G6z48tE+RTKLvB1/btgAtq8vLw/5e3KnnbcDD6fZO07m4DRaP
-jRryrJdsp8qazmUdcY0O1oK4FQfpprknDjP+R1XHhbhkQ4WEwjmxPstZMUZaDWF5
-8d3otc23mCzwh3YcUWFu09KnMpzZsK59OfyjtkS44EDWpbECQQDXgN0ODboKsuEA
-VAhAtPUqspU9ivRa6yLai9kCnPb9GcztrsJZQm4NHcKVbmD2F2L4pDRx4Pmglhfl
-V7G/a6T7AkEA1kfU0+DkXc6I/jXHJ6pDLA5s7dBHzWgDsBzplSdkVQbKT3MbeYje
-ByOxzXhulOWLBQW/vxmW4HwU95KTRlj06QJASPoBYY3yb0cN/J94P/lHgJMDCNky
-UEuJ/PoYndLrrN/8zow8kh91xwlJ6HJ9cTiQMmTgwaOOxPuu0eI1df4M2wJBAJJS
-WrKUT1z/O+zbLDOZwGTFNPzvzRgmft4z4A1J6OlmyZ+XKpvDKloVtcRpCJoEZPn5
-AwaroquID4k/PfI7rIECQHeWa6+kPADv9IrK/92mujujS0MSEiynDw5NjTnHAH0v
-8TrXzs+LCWDN/gbOCKPfnWRkgwgOeC8NN3h0zUIIUtA=
------END RSA PRIVATE KEY-----

+ 0 - 16
test/rsa_private_key.pkcs8

@@ -1,16 +0,0 @@
------BEGIN PRIVATE KEY-----
-MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALRiMLAh9iimur8V
-A7qVvdqxevEuUkW4K+2KdMXmnQbG9Aa7k7eBjK1S+0LYmVjPKlJGNXHDGuy5Fw/d
-7rjVJ0BLB+ubPK8iA/Tw3hLQgXMRRGRXXCn8ikfuQfjUS1uZSatdLB81mydBETlJ
-hI6GH4twrbDJCR2Bwy/XWXgqgGRzAgMBAAECgYBYWVtleUzavkbrPjy0T5FMou8H
-X9u2AC2ry8vD/l7cqedtwMPp9k7TubgNFo+NGvKsl2ynyprOZR1xjQ7WgrgVB+mm
-uScOM/5HVceFuGRDhYTCObE+y1kxRloNYXnx3ei1zbeYLPCHdhxRYW7T0qcynNmw
-rn05/KO2RLjgQNalsQJBANeA3Q4Nugqy4QBUCEC09SqylT2K9FrrItqL2QKc9v0Z
-zO2uwllCbg0dwpVuYPYXYvikNHHg+aCWF+VXsb9rpPsCQQDWR9TT4ORdzoj+Nccn
-qkMsDmzt0EfNaAOwHOmVJ2RVBspPcxt5iN4HI7HNeG6U5YsFBb+/GZbgfBT3kpNG
-WPTpAkBI+gFhjfJvRw38n3g/+UeAkwMI2TJQS4n8+hid0uus3/zOjDySH3XHCUno
-cn1xOJAyZODBo47E+67R4jV1/gzbAkEAklJaspRPXP877NssM5nAZMU0/O/NGCZ+
-3jPgDUno6WbJn5cqm8MqWhW1xGkImgRk+fkDBquiq4gPiT898jusgQJAd5Zrr6Q8
-AO/0isr/3aa6O6NLQxISLKcPDk2NOccAfS/xOtfOz4sJYM3+Bs4Io9+dZGSDCA54
-Lw03eHTNQghS0A==
------END PRIVATE KEY-----