use std::{
sync::{Arc, Mutex},
time::Duration,
};
use assert_matches::assert_matches;
use assert_matches2::assert_let;
use matrix_sdk::{
HttpError, RefreshTokenError, SessionChange, SessionTokens,
authentication::{matrix::MatrixSession, oauth::OAuthError},
config::RequestConfig,
executor::spawn,
store::RoomLoadSettings,
test_utils::{
client::{
mock_prev_session_tokens_with_refresh, mock_session_meta,
mock_session_tokens_with_refresh, oauth::mock_session,
},
logged_in_client_with_server,
mocks::{LoginResponseTemplate200, MatrixMockServer},
no_retry_test_client_with_server, test_client_builder_with_server,
},
};
use matrix_sdk_test::{async_test, test_json};
use ruma::{
api::{
MatrixVersion,
client::{account::register, error::ErrorKind},
},
assign, owned_device_id, owned_user_id,
};
use serde_json::json;
use tokio::sync::{broadcast::error::TryRecvError, mpsc};
use wiremock::{
Mock, ResponseTemplate,
matchers::{body_partial_json, header, method, path},
};
fn session() -> MatrixSession {
MatrixSession {
meta: mock_session_meta(),
tokens: SessionTokens {
access_token: "1234".to_owned(),
refresh_token: Some("abcd".to_owned()),
},
}
}
#[async_test]
async fn test_login_username_refresh_token() {
let server = MatrixMockServer::new().await;
server
.mock_login()
.body_matches_partial_json(json!({"refresh_token": true}))
.ok_with(
LoginResponseTemplate200::new(
"abc123",
owned_device_id!("GHTYAJCE"),
owned_user_id!("@cheeky_monkey:matrix.org"),
)
.expires_in(Duration::from_millis(432000000))
.refresh_token("zyx987"),
)
.mount()
.await;
let client = server.client_builder().unlogged().build().await;
let res = client
.matrix_auth()
.login_username("example", "wordpass")
.request_refresh_token()
.send()
.await
.unwrap();
assert!(client.is_active(), "Client should be active");
res.refresh_token.unwrap();
}
#[async_test]
#[cfg(feature = "sso-login")]
async fn test_login_sso_refresh_token() {
let (client, server) = no_retry_test_client_with_server().await;
Mock::given(method("POST"))
.and(path("/_matrix/client/r0/login"))
.and(body_partial_json(json!({
"refresh_token": true,
})))
.respond_with(
ResponseTemplate::new(200).set_body_json(&*test_json::LOGIN_WITH_REFRESH_TOKEN),
)
.mount(&server)
.await;
let idp = ruma::api::client::session::get_login_types::v3::IdentityProvider::new(
"some-id".to_owned(),
"idp-name".to_owned(),
);
let res = client
.matrix_auth()
.login_sso(|sso_url| async move {
let sso_url = url::Url::parse(&sso_url).unwrap();
let (_, redirect) =
sso_url.query_pairs().find(|(key, _)| key == "redirectUrl").unwrap();
let mut redirect_url = url::Url::parse(&redirect).unwrap();
redirect_url.set_query(Some("loginToken=tinytoken"));
reqwest::get(redirect_url.to_string()).await.unwrap();
Ok(())
})
.identity_provider_id(&idp.id)
.request_refresh_token()
.await
.unwrap();
assert!(client.is_active(), "Client should be active");
res.refresh_token.unwrap();
}
#[async_test]
async fn test_register_refresh_token() {
let (client, server) = no_retry_test_client_with_server().await;
Mock::given(method("POST"))
.and(path("/_matrix/client/r0/register"))
.and(body_partial_json(json!({
"refresh_token": true,
})))
.respond_with(
ResponseTemplate::new(200).set_body_json(&*test_json::LOGIN_WITH_REFRESH_TOKEN),
)
.mount(&server)
.await;
let req = assign!(register::v3::Request::new(), {
username: Some("user".to_owned()),
password: Some("password".to_owned()),
auth: None,
refresh_token: true,
});
let res = client.matrix_auth().register(req).await.unwrap();
res.refresh_token.unwrap();
}
#[async_test]
async fn test_no_refresh_token() {
let (client, server) = logged_in_client_with_server().await;
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::REFRESH_TOKEN))
.expect(0)
.mount(&server)
.await;
let res = client.refresh_access_token().await;
assert_matches!(res, Err(RefreshTokenError::RefreshTokenRequired));
}
#[async_test]
async fn test_refresh_token() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let num_save_session_callback_calls = Arc::new(Mutex::new(0));
client
.set_session_callbacks(Box::new(|_| panic!("reload session never called")), {
let num_save_session_callback_calls = num_save_session_callback_calls.clone();
Box::new(move |_client| {
*num_save_session_callback_calls.lock().unwrap() += 1;
Ok(())
})
})
.unwrap();
let mut session_changes = client.subscribe_to_session_changes();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
assert_eq!(*num_save_session_callback_calls.lock().unwrap(), 0);
assert_eq!(session_changes.try_recv(), Err(TryRecvError::Empty));
let tokens = client.session_tokens().unwrap();
assert_eq!(tokens.access_token, "1234");
assert_eq!(tokens.refresh_token.as_deref(), Some("abcd"));
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.and(body_partial_json(json!({
"refresh_token": "abcd",
})))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::REFRESH_TOKEN))
.up_to_n_times(1)
.mount(&server)
.await;
auth.refresh_access_token().await.unwrap();
let tokens = client.session_tokens().unwrap();
assert_eq!(tokens.access_token, "5678");
assert_eq!(tokens.refresh_token.as_deref(), Some("abcd"));
assert_eq!(*num_save_session_callback_calls.lock().unwrap(), 1);
assert_eq!(session_changes.try_recv(), Ok(SessionChange::TokensRefreshed));
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.and(body_partial_json(json!({
"refresh_token": "abcd",
})))
.respond_with(
ResponseTemplate::new(200).set_body_json(&*test_json::REFRESH_TOKEN_WITH_REFRESH_TOKEN),
)
.mount(&server)
.await;
auth.refresh_access_token().await.unwrap();
let tokens = client.session_tokens().unwrap();
assert_eq!(tokens.access_token, "9012");
assert_eq!(tokens.refresh_token.as_deref(), Some("wxyz"));
assert_eq!(*num_save_session_callback_calls.lock().unwrap(), 2);
assert_eq!(session_changes.try_recv(), Ok(SessionChange::TokensRefreshed));
assert_eq!(session_changes.try_recv(), Err(TryRecvError::Empty));
}
#[async_test]
async fn test_refresh_token_not_handled() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::REFRESH_TOKEN))
.expect(0)
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 1234"))
.respond_with(
ResponseTemplate::new(401).set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT),
)
.mount(&server)
.await;
let res = client.whoami().await.unwrap_err();
assert_matches!(res.client_api_error_kind(), Some(ErrorKind::UnknownToken { .. }));
}
#[async_test]
async fn test_refresh_token_handled_success() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.handle_refresh_tokens()
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
let mut session_changes = client.subscribe_to_session_changes();
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::REFRESH_TOKEN))
.expect(1)
.named("`POST /refresh`")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 1234"))
.respond_with(
ResponseTemplate::new(401).set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT),
)
.expect(1)
.named("`GET /whoami` wrong token")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 5678"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::WHOAMI))
.expect(1)
.named("`GET /whoami` good token")
.mount(&server)
.await;
client.whoami().await.unwrap();
assert_eq!(session_changes.try_recv(), Ok(SessionChange::TokensRefreshed));
assert_eq!(session_changes.try_recv(), Err(TryRecvError::Empty));
}
#[async_test]
async fn test_refresh_token_handled_failure() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.handle_refresh_tokens()
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
let mut session_changes = client.subscribe_to_session_changes();
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(
ResponseTemplate::new(401).set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT),
)
.expect(1)
.named("`POST /refresh`")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 1234"))
.respond_with(
ResponseTemplate::new(401).set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT),
)
.expect(1)
.named("`GET /whoami` wrong token")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 5678"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::WHOAMI))
.expect(0)
.named("`GET /whoami` good token")
.mount(&server)
.await;
let res = client.whoami().await;
assert_let!(Err(HttpError::RefreshToken(RefreshTokenError::MatrixAuth(http_err))) = res);
assert_matches!(
http_err.client_api_error_kind(),
Some(ErrorKind::UnknownToken { soft_logout: true })
);
assert_eq!(session_changes.try_recv(), Ok(SessionChange::UnknownToken { soft_logout: true }));
assert_eq!(session_changes.try_recv(), Err(TryRecvError::Empty));
}
#[async_test]
async fn test_refresh_token_handled_multi_success() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.handle_refresh_tokens()
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(
ResponseTemplate::new(200)
.set_body_json(&*test_json::REFRESH_TOKEN)
.set_delay(Duration::from_secs(1)),
)
.expect(1)
.named("`POST /refresh`")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 1234"))
.respond_with(
ResponseTemplate::new(401).set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT),
)
.expect(3)
.named("`GET /whoami` wrong token")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 5678"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::WHOAMI))
.expect(3)
.named("`GET /whoami` good token")
.mount(&server)
.await;
let (sender, mut receiver) = mpsc::channel::<()>(3);
let client_clone = client.clone();
let sender_clone = sender.clone();
spawn(async move {
client_clone.whoami().await.unwrap();
sender_clone.try_send(()).unwrap();
});
let client_clone = client.clone();
let sender_clone = sender.clone();
spawn(async move {
client_clone.whoami().await.unwrap();
sender_clone.try_send(()).unwrap();
});
spawn(async move {
client.whoami().await.unwrap();
sender.try_send(()).unwrap();
});
let mut i = 0;
while i < 3 {
if receiver.recv().await.is_some() {
i += 1;
}
}
}
#[async_test]
async fn test_refresh_token_handled_multi_failure() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.handle_refresh_tokens()
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(
ResponseTemplate::new(401)
.set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT)
.set_delay(Duration::from_secs(1)),
)
.expect(1)
.named("`POST /refresh`")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 1234"))
.respond_with(
ResponseTemplate::new(401).set_body_json(&*test_json::UNKNOWN_TOKEN_SOFT_LOGOUT),
)
.expect(3)
.named("`GET /whoami` wrong token")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.and(header(http::header::AUTHORIZATION, "Bearer 5678"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::WHOAMI))
.expect(0)
.named("`GET /whoami` good token")
.mount(&server)
.await;
let (sender, mut receiver) = mpsc::channel::<()>(3);
let client_clone = client.clone();
let sender_clone = sender.clone();
spawn(async move {
client_clone.whoami().await.unwrap_err();
sender_clone.try_send(()).unwrap();
});
let client_clone = client.clone();
let sender_clone = sender.clone();
spawn(async move {
client_clone.whoami().await.unwrap_err();
sender_clone.try_send(()).unwrap();
});
spawn(async move {
client.whoami().await.unwrap_err();
sender.try_send(()).unwrap();
});
let mut i = 0;
while i < 3 {
if receiver.recv().await.is_some() {
i += 1;
}
}
}
#[async_test]
async fn test_refresh_token_handled_other_error() {
let (builder, server) = test_client_builder_with_server().await;
let client = builder
.request_config(RequestConfig::new().disable_retry())
.server_versions([MatrixVersion::V1_3])
.handle_refresh_tokens()
.build()
.await
.unwrap();
let auth = client.matrix_auth();
let session = session();
auth.restore_session(session, RoomLoadSettings::default()).await.unwrap();
Mock::given(method("POST"))
.and(path("/_matrix/client/v3/refresh"))
.respond_with(ResponseTemplate::new(200).set_body_json(&*test_json::REFRESH_TOKEN))
.expect(0)
.named("`POST /refresh`")
.mount(&server)
.await;
Mock::given(method("GET"))
.and(path("/_matrix/client/v3/account/whoami"))
.respond_with(ResponseTemplate::new(404).set_body_json(&*test_json::NOT_FOUND))
.expect(1)
.named("`GET /whoami`")
.mount(&server)
.await;
client.whoami().await.unwrap_err();
}
#[async_test]
async fn test_oauth_refresh_token_handled_success() {
let server = MatrixMockServer::new().await;
server
.mock_who_am_i()
.expect_access_token("prev-access-token")
.error_unknown_token(true)
.expect(1)
.named("whoami_unknown_token")
.mount()
.await;
server.mock_who_am_i().ok().expect(1).named("whoami_ok").mount().await;
let oauth_server = server.oauth();
oauth_server.mock_server_metadata().ok().expect(1..).named("server_metadata").mount().await;
oauth_server.mock_token().ok().expect(1).named("token").mount().await;
let client = server
.client_builder()
.unlogged()
.on_builder(|builder| builder.handle_refresh_tokens())
.build()
.await;
let oauth = client.oauth();
oauth
.restore_session(
mock_session(mock_prev_session_tokens_with_refresh()),
RoomLoadSettings::default(),
)
.await
.unwrap();
let mut session_changes = client.subscribe_to_session_changes();
client.whoami().await.unwrap();
assert_eq!(
session_changes.try_recv(),
Ok(SessionChange::TokensRefreshed),
"The session changes should be notified of the tokens refresh"
);
assert_eq!(
session_changes.try_recv(),
Err(TryRecvError::Empty),
"There should be no more session changes"
);
}
#[async_test]
async fn test_oauth_refresh_token_handled_failure() {
let server = MatrixMockServer::new().await;
server
.mock_who_am_i()
.expect_access_token("prev-access-token")
.error_unknown_token(false)
.expect(1)
.named("whoami_unknown_token")
.mount()
.await;
let oauth_server = server.oauth();
oauth_server.mock_server_metadata().ok().expect(1..).named("server_metadata").mount().await;
oauth_server.mock_token().invalid_grant().expect(1).named("token").mount().await;
let client = server
.client_builder()
.unlogged()
.on_builder(|builder| builder.handle_refresh_tokens())
.build()
.await;
let oauth = client.oauth();
oauth
.restore_session(
mock_session(mock_prev_session_tokens_with_refresh()),
RoomLoadSettings::default(),
)
.await
.unwrap();
let mut session_changes = client.subscribe_to_session_changes();
let res = client.whoami().await;
assert_let!(
Err(HttpError::RefreshToken(RefreshTokenError::OAuth(oauth_err))) = res,
"The request should fail with a refresh token error from the OAuth 2.0 API"
);
assert_matches!(
*oauth_err,
OAuthError::RefreshToken(_),
"The OAuth 2.0 error should be a refresh token error"
);
assert_eq!(
session_changes.try_recv(),
Ok(SessionChange::UnknownToken { soft_logout: false }),
"The session changes should be notified that the token is invalid"
);
assert_eq!(
session_changes.try_recv(),
Err(TryRecvError::Empty),
"There should be no more session changes"
);
}
#[async_test]
async fn test_oauth_handle_refresh_tokens() {
let server = MatrixMockServer::new().await;
let oauth_server = server.oauth();
oauth_server.mock_server_metadata().ok().expect(1..).named("server_metadata").mount().await;
let client = server
.client_builder()
.unlogged()
.on_builder(|builder| builder.handle_refresh_tokens())
.build()
.await;
let oauth = client.oauth();
oauth
.restore_session(
mock_session(mock_prev_session_tokens_with_refresh()),
RoomLoadSettings::default(),
)
.await
.unwrap();
let num_save_session_callback_calls = Arc::new(Mutex::new(0));
client
.set_session_callbacks(Box::new(|_| panic!("reload session never called")), {
let num_save_session_callback_calls = num_save_session_callback_calls.clone();
Box::new(move |_client| {
*num_save_session_callback_calls.lock().unwrap() += 1;
Ok(())
})
})
.unwrap();
let mut session_changes = client.subscribe_to_session_changes();
assert_eq!(session_changes.try_recv(), Err(TryRecvError::Empty));
assert_eq!(client.session_tokens(), Some(mock_prev_session_tokens_with_refresh()));
oauth_server.mock_token().ok().mock_once().named("refresh_token").mount().await;
oauth.refresh_access_token().await.unwrap();
assert_eq!(
client.session_tokens(),
Some(mock_session_tokens_with_refresh()),
"The session tokens should have been updated with the new values"
);
assert_eq!(
*num_save_session_callback_calls.lock().unwrap(),
1,
"The save session callback should have been called once"
);
assert_eq!(
session_changes.try_recv(),
Ok(SessionChange::TokensRefreshed),
"The session changes should be notified of the tokens refresh"
);
assert_eq!(
session_changes.try_recv(),
Err(TryRecvError::Empty),
"There should be no more session changes"
);
}
#[async_test]
async fn test_oauth_handle_refresh_tokens_without_versions() {
let server = MatrixMockServer::new().await;
let oauth_server = server.oauth();
server
.mock_versions()
.expect_access_token("prev-access-token")
.error_unknown_token(true)
.expect(1..)
.named("versions with expired token")
.mount()
.await;
server
.mock_versions()
.expect_missing_access_token()
.ok_with_unstable_features()
.expect(1..)
.named("unauthenticated versions")
.mount()
.await;
oauth_server.mock_server_metadata().ok().expect(1..).named("server_metadata").mount().await;
let client = server
.client_builder()
.unlogged()
.no_server_versions()
.on_builder(|builder| builder.handle_refresh_tokens())
.build()
.await;
let oauth = client.oauth();
oauth
.restore_session(
mock_session(mock_prev_session_tokens_with_refresh()),
RoomLoadSettings::default(),
)
.await
.unwrap();
client.reset_supported_versions().await.unwrap();
assert_eq!(client.session_tokens(), Some(mock_prev_session_tokens_with_refresh()));
oauth_server.mock_token().ok().mock_once().named("refresh_token").mount().await;
oauth.refresh_access_token().await.unwrap();
assert_eq!(
client.session_tokens(),
Some(mock_session_tokens_with_refresh()),
"The session tokens should have been updated with the new values"
);
}
#[async_test]
async fn test_supported_versions_handle_refresh_token() {
let server = MatrixMockServer::new().await;
server
.mock_versions()
.expect_access_token("prev-access-token")
.error_unknown_token(true)
.named("versions with expired access token")
.expect(1)
.mount()
.await;
server
.mock_versions()
.expect_default_access_token()
.ok_with_unstable_features()
.named("versions with new access token")
.expect(1)
.mount()
.await;
server
.mock_versions()
.expect_missing_access_token()
.ok_with_unstable_features()
.named("unauthenticated versions")
.expect(1)
.mount()
.await;
let oauth_server = server.oauth();
oauth_server.mock_server_metadata().ok().expect(1..).named("server_metadata").mount().await;
oauth_server.mock_token().ok().mock_once().named("refresh_token").mount().await;
let client = server
.client_builder()
.unlogged()
.no_server_versions()
.on_builder(|builder| builder.handle_refresh_tokens())
.build()
.await;
let oauth = client.oauth();
oauth
.restore_session(
mock_session(mock_prev_session_tokens_with_refresh()),
RoomLoadSettings::default(),
)
.await
.unwrap();
assert!(client.server_versions().await.unwrap().contains(&MatrixVersion::V1_0));
assert_matches!(client.supported_versions_cached().await, Ok(Some(_)));
assert_eq!(client.access_token().as_deref(), Some("1234"));
assert!(client.server_versions().await.unwrap().contains(&MatrixVersion::V1_0));
}
#[async_test]
async fn test_refresh_token_not_handled_supported_versions_not_cached() {
let server = MatrixMockServer::new().await;
server
.mock_versions()
.expect_default_access_token()
.error_unknown_token(true)
.named("versions with expired access token")
.expect(1)
.mount()
.await;
server
.mock_versions()
.expect_missing_access_token()
.ok_with_unstable_features()
.named("unauthenticated versions")
.expect(1..)
.mount()
.await;
let client = server.client_builder().no_server_versions().build().await;
let oauth_server = server.oauth();
oauth_server.mock_server_metadata().ok().expect(1).named("server_metadata").mount().await;
client.oauth().server_metadata().await.unwrap();
assert_matches!(client.supported_versions_cached().await, Ok(None));
}