Skip to content

Commit 4fb2836

Browse files
committed
Remove unnecessary fields from bearerToken
These fields need to exist when parsing JSON; but we can just record the outcome of processing them. Should not change behavior. Signed-off-by: Miloslav Trmač <[email protected]>
1 parent 1230139 commit 4fb2836

File tree

2 files changed

+12
-21
lines changed

2 files changed

+12
-21
lines changed

docker/docker_client.go

+9-14
Original file line numberDiff line numberDiff line change
@@ -89,9 +89,6 @@ type extensionSignatureList struct {
8989
// bearerToken records a cached token we can use to authenticate.
9090
type bearerToken struct {
9191
token string
92-
AccessToken string
93-
ExpiresIn int
94-
IssuedAt time.Time
9592
expirationTime time.Time
9693
}
9794

@@ -173,22 +170,20 @@ func newBearerTokenFromHTTPResponseBody(res *http.Response) (*bearerToken, error
173170
}
174171

175172
bt := &bearerToken{
176-
token: token.Token,
177-
AccessToken: token.AccessToken,
178-
ExpiresIn: token.ExpiresIn,
179-
IssuedAt: token.IssuedAt,
173+
token: token.Token,
180174
}
181175
if bt.token == "" {
182-
bt.token = bt.AccessToken
176+
bt.token = token.AccessToken
183177
}
184-
if bt.ExpiresIn < minimumTokenLifetimeSeconds {
185-
bt.ExpiresIn = minimumTokenLifetimeSeconds
186-
logrus.Debugf("Increasing token expiration to: %d seconds", bt.ExpiresIn)
178+
179+
if token.ExpiresIn < minimumTokenLifetimeSeconds {
180+
token.ExpiresIn = minimumTokenLifetimeSeconds
181+
logrus.Debugf("Increasing token expiration to: %d seconds", token.ExpiresIn)
187182
}
188-
if bt.IssuedAt.IsZero() {
189-
bt.IssuedAt = time.Now().UTC()
183+
if token.IssuedAt.IsZero() {
184+
token.IssuedAt = time.Now().UTC()
190185
}
191-
bt.expirationTime = bt.IssuedAt.Add(time.Duration(bt.ExpiresIn) * time.Second)
186+
bt.expirationTime = token.IssuedAt.Add(time.Duration(token.ExpiresIn) * time.Second)
192187
return bt, nil
193188
}
194189

docker/docker_client_test.go

+3-7
Original file line numberDiff line numberDiff line change
@@ -117,15 +117,15 @@ func TestNewBearerTokenFromHTTPResponseBody(t *testing.T) {
117117
},
118118
{ // "token"
119119
input: `{"token":"IAmAToken","expires_in":100,"issued_at":"2018-01-01T10:00:02+00:00"}`,
120-
expected: &bearerToken{token: "IAmAToken", ExpiresIn: 100, IssuedAt: time.Unix(1514800802, 0), expirationTime: time.Unix(1514800802+100, 0)},
120+
expected: &bearerToken{token: "IAmAToken", expirationTime: time.Unix(1514800802+100, 0)},
121121
},
122122
{ // "access_token"
123123
input: `{"access_token":"IAmAToken","expires_in":100,"issued_at":"2018-01-01T10:00:02+00:00"}`,
124-
expected: &bearerToken{token: "IAmAToken", ExpiresIn: 100, IssuedAt: time.Unix(1514800802, 0), expirationTime: time.Unix(1514800802+100, 0)},
124+
expected: &bearerToken{token: "IAmAToken", expirationTime: time.Unix(1514800802+100, 0)},
125125
},
126126
{ // Small expiry
127127
input: `{"token":"IAmAToken","expires_in":1,"issued_at":"2018-01-01T10:00:02+00:00"}`,
128-
expected: &bearerToken{token: "IAmAToken", ExpiresIn: 60, IssuedAt: time.Unix(1514800802, 0), expirationTime: time.Unix(1514800802+60, 0)},
128+
expected: &bearerToken{token: "IAmAToken", expirationTime: time.Unix(1514800802+60, 0)},
129129
},
130130
} {
131131
token, err := newBearerTokenFromHTTPResponseBody(testTokenHTTPResponse(t, c.input))
@@ -134,9 +134,6 @@ func TestNewBearerTokenFromHTTPResponseBody(t *testing.T) {
134134
} else {
135135
require.NoError(t, err, c.input)
136136
assert.Equal(t, c.expected.token, token.token, c.input)
137-
assert.Equal(t, c.expected.ExpiresIn, token.ExpiresIn, c.input)
138-
assert.True(t, c.expected.IssuedAt.Equal(token.IssuedAt),
139-
"expected [%s] to equal [%s], it did not", token.IssuedAt, c.expected.IssuedAt)
140137
assert.True(t, c.expected.expirationTime.Equal(token.expirationTime),
141138
"expected [%s] to equal [%s], it did not", token.expirationTime, c.expected.expirationTime)
142139
}
@@ -149,7 +146,6 @@ func TestNewBearerTokenFromHTTPResponseBodyIssuedAtZero(t *testing.T) {
149146
tokenBlob := fmt.Sprintf(`{"token":"IAmAToken","expires_in":100,"issued_at":"%s"}`, zeroTime)
150147
token, err := newBearerTokenFromHTTPResponseBody(testTokenHTTPResponse(t, tokenBlob))
151148
require.NoError(t, err)
152-
assert.False(t, token.IssuedAt.Before(now), "expected [%s] not to be before [%s]", token.IssuedAt, now)
153149
expectedExpiration := now.Add(time.Duration(100) * time.Second)
154150
require.False(t, token.expirationTime.Before(expectedExpiration),
155151
"expected [%s] not to be before [%s]", token.expirationTime, expectedExpiration)

0 commit comments

Comments
 (0)