@@ -3136,16 +3136,15 @@ func TestGeneratePolicies(t *testing.T) {
3136
3136
},
3137
3137
Spec : conf_v1.PolicySpec {
3138
3138
OIDC : & conf_v1.OIDC {
3139
- AuthEndpoint : "http://example.com/auth" ,
3140
- TokenEndpoint : "http://example.com/token" ,
3141
- JWKSURI : "http://example.com/jwks" ,
3142
- ClientID : "client-id" ,
3143
- ClientSecret : "oidc-secret" ,
3144
- Scope : "scope" ,
3145
- RedirectURI : "/redirect" ,
3146
- ZoneSyncLeeway : createPointerFromInt (20 ),
3147
- AccessTokenEnable : true ,
3148
- InterceptErrorEnable : false ,
3139
+ AuthEndpoint : "http://example.com/auth" ,
3140
+ TokenEndpoint : "http://example.com/token" ,
3141
+ JWKSURI : "http://example.com/jwks" ,
3142
+ ClientID : "client-id" ,
3143
+ ClientSecret : "oidc-secret" ,
3144
+ Scope : "scope" ,
3145
+ RedirectURI : "/redirect" ,
3146
+ ZoneSyncLeeway : createPointerFromInt (20 ),
3147
+ AccessTokenEnable : true ,
3149
3148
},
3150
3149
},
3151
3150
},
@@ -4254,12 +4253,11 @@ func TestGeneratePoliciesFails(t *testing.T) {
4254
4253
},
4255
4254
Spec : conf_v1.PolicySpec {
4256
4255
OIDC : & conf_v1.OIDC {
4257
- ClientSecret : "oidc-secret" ,
4258
- AuthEndpoint : "http://foo.com/bar" ,
4259
- TokenEndpoint : "http://foo.com/bar" ,
4260
- JWKSURI : "http://foo.com/bar" ,
4261
- AccessTokenEnable : true ,
4262
- InterceptErrorEnable : false ,
4256
+ ClientSecret : "oidc-secret" ,
4257
+ AuthEndpoint : "http://foo.com/bar" ,
4258
+ TokenEndpoint : "http://foo.com/bar" ,
4259
+ JWKSURI : "http://foo.com/bar" ,
4260
+ AccessTokenEnable : true ,
4263
4261
},
4264
4262
},
4265
4263
},
@@ -4302,13 +4300,12 @@ func TestGeneratePoliciesFails(t *testing.T) {
4302
4300
},
4303
4301
Spec : conf_v1.PolicySpec {
4304
4302
OIDC : & conf_v1.OIDC {
4305
- ClientID : "foo" ,
4306
- ClientSecret : "oidc-secret" ,
4307
- AuthEndpoint : "https://foo.com/auth" ,
4308
- TokenEndpoint : "https://foo.com/token" ,
4309
- JWKSURI : "https://foo.com/certs" ,
4310
- AccessTokenEnable : true ,
4311
- InterceptErrorEnable : false ,
4303
+ ClientID : "foo" ,
4304
+ ClientSecret : "oidc-secret" ,
4305
+ AuthEndpoint : "https://foo.com/auth" ,
4306
+ TokenEndpoint : "https://foo.com/token" ,
4307
+ JWKSURI : "https://foo.com/certs" ,
4308
+ AccessTokenEnable : true ,
4312
4309
},
4313
4310
},
4314
4311
},
@@ -4319,13 +4316,12 @@ func TestGeneratePoliciesFails(t *testing.T) {
4319
4316
},
4320
4317
Spec : conf_v1.PolicySpec {
4321
4318
OIDC : & conf_v1.OIDC {
4322
- ClientID : "foo" ,
4323
- ClientSecret : "oidc-secret" ,
4324
- AuthEndpoint : "https://bar.com/auth" ,
4325
- TokenEndpoint : "https://bar.com/token" ,
4326
- JWKSURI : "https://bar.com/certs" ,
4327
- AccessTokenEnable : true ,
4328
- InterceptErrorEnable : false ,
4319
+ ClientID : "foo" ,
4320
+ ClientSecret : "oidc-secret" ,
4321
+ AuthEndpoint : "https://bar.com/auth" ,
4322
+ TokenEndpoint : "https://bar.com/token" ,
4323
+ JWKSURI : "https://bar.com/certs" ,
4324
+ AccessTokenEnable : true ,
4329
4325
},
4330
4326
},
4331
4327
},
@@ -4345,16 +4341,15 @@ func TestGeneratePoliciesFails(t *testing.T) {
4345
4341
context : "route" ,
4346
4342
oidcPolCfg : & oidcPolicyCfg {
4347
4343
oidc : & version2.OIDC {
4348
- AuthEndpoint : "https://foo.com/auth" ,
4349
- TokenEndpoint : "https://foo.com/token" ,
4350
- JwksURI : "https://foo.com/certs" ,
4351
- ClientID : "foo" ,
4352
- ClientSecret : "super_secret_123" ,
4353
- RedirectURI : "/_codexch" ,
4354
- Scope : "openid" ,
4355
- ZoneSyncLeeway : 0 ,
4356
- AccessTokenEnable : true ,
4357
- InterceptErrorEnable : false ,
4344
+ AuthEndpoint : "https://foo.com/auth" ,
4345
+ TokenEndpoint : "https://foo.com/token" ,
4346
+ JwksURI : "https://foo.com/certs" ,
4347
+ ClientID : "foo" ,
4348
+ ClientSecret : "super_secret_123" ,
4349
+ RedirectURI : "/_codexch" ,
4350
+ Scope : "openid" ,
4351
+ ZoneSyncLeeway : 0 ,
4352
+ AccessTokenEnable : true ,
4358
4353
},
4359
4354
key : "default/oidc-policy-1" ,
4360
4355
},
@@ -4370,15 +4365,14 @@ func TestGeneratePoliciesFails(t *testing.T) {
4370
4365
},
4371
4366
expectedOidc : & oidcPolicyCfg {
4372
4367
oidc : & version2.OIDC {
4373
- AuthEndpoint : "https://foo.com/auth" ,
4374
- TokenEndpoint : "https://foo.com/token" ,
4375
- JwksURI : "https://foo.com/certs" ,
4376
- ClientID : "foo" ,
4377
- ClientSecret : "super_secret_123" ,
4378
- RedirectURI : "/_codexch" ,
4379
- Scope : "openid" ,
4380
- AccessTokenEnable : true ,
4381
- InterceptErrorEnable : false ,
4368
+ AuthEndpoint : "https://foo.com/auth" ,
4369
+ TokenEndpoint : "https://foo.com/token" ,
4370
+ JwksURI : "https://foo.com/certs" ,
4371
+ ClientID : "foo" ,
4372
+ ClientSecret : "super_secret_123" ,
4373
+ RedirectURI : "/_codexch" ,
4374
+ Scope : "openid" ,
4375
+ AccessTokenEnable : true ,
4382
4376
},
4383
4377
key : "default/oidc-policy-1" ,
4384
4378
},
@@ -4403,13 +4397,12 @@ func TestGeneratePoliciesFails(t *testing.T) {
4403
4397
},
4404
4398
Spec : conf_v1.PolicySpec {
4405
4399
OIDC : & conf_v1.OIDC {
4406
- ClientSecret : "oidc-secret" ,
4407
- AuthEndpoint : "https://foo.com/auth" ,
4408
- TokenEndpoint : "https://foo.com/token" ,
4409
- JWKSURI : "https://foo.com/certs" ,
4410
- ClientID : "foo" ,
4411
- AccessTokenEnable : true ,
4412
- InterceptErrorEnable : false ,
4400
+ ClientSecret : "oidc-secret" ,
4401
+ AuthEndpoint : "https://foo.com/auth" ,
4402
+ TokenEndpoint : "https://foo.com/token" ,
4403
+ JWKSURI : "https://foo.com/certs" ,
4404
+ ClientID : "foo" ,
4405
+ AccessTokenEnable : true ,
4413
4406
},
4414
4407
},
4415
4408
},
@@ -4420,13 +4413,12 @@ func TestGeneratePoliciesFails(t *testing.T) {
4420
4413
},
4421
4414
Spec : conf_v1.PolicySpec {
4422
4415
OIDC : & conf_v1.OIDC {
4423
- ClientSecret : "oidc-secret" ,
4424
- AuthEndpoint : "https://bar.com/auth" ,
4425
- TokenEndpoint : "https://bar.com/token" ,
4426
- JWKSURI : "https://bar.com/certs" ,
4427
- ClientID : "bar" ,
4428
- AccessTokenEnable : true ,
4429
- InterceptErrorEnable : false ,
4416
+ ClientSecret : "oidc-secret" ,
4417
+ AuthEndpoint : "https://bar.com/auth" ,
4418
+ TokenEndpoint : "https://bar.com/token" ,
4419
+ JWKSURI : "https://bar.com/certs" ,
4420
+ ClientID : "bar" ,
4421
+ AccessTokenEnable : true ,
4430
4422
},
4431
4423
},
4432
4424
},
@@ -4454,16 +4446,15 @@ func TestGeneratePoliciesFails(t *testing.T) {
4454
4446
},
4455
4447
expectedOidc : & oidcPolicyCfg {
4456
4448
& version2.OIDC {
4457
- AuthEndpoint : "https://foo.com/auth" ,
4458
- TokenEndpoint : "https://foo.com/token" ,
4459
- JwksURI : "https://foo.com/certs" ,
4460
- ClientID : "foo" ,
4461
- ClientSecret : "super_secret_123" ,
4462
- RedirectURI : "/_codexch" ,
4463
- Scope : "openid" ,
4464
- ZoneSyncLeeway : 200 ,
4465
- AccessTokenEnable : true ,
4466
- InterceptErrorEnable : false ,
4449
+ AuthEndpoint : "https://foo.com/auth" ,
4450
+ TokenEndpoint : "https://foo.com/token" ,
4451
+ JwksURI : "https://foo.com/certs" ,
4452
+ ClientID : "foo" ,
4453
+ ClientSecret : "super_secret_123" ,
4454
+ RedirectURI : "/_codexch" ,
4455
+ Scope : "openid" ,
4456
+ ZoneSyncLeeway : 200 ,
4457
+ AccessTokenEnable : true ,
4467
4458
},
4468
4459
"default/oidc-policy" ,
4469
4460
},
0 commit comments