summaryrefslogtreecommitdiff
path: root/internal/configuration/helpers_test.go
diff options
context:
space:
mode:
authorJames Elliott <james-d-elliott@users.noreply.github.com>2024-03-05 20:11:16 +1100
committerGitHub <noreply@github.com>2024-03-05 19:11:16 +1000
commitfb50f1a70c66d96391a3e9cae5721c9c78c75d8d (patch)
treef49313d4452fbfb8072210c30d93602b81739a75 /internal/configuration/helpers_test.go
parentc70c83f74593c1ed75c2195e2dba74a5dfcd30cc (diff)
feat: oauth2 authorization bearer (#6774)
This implements user authorization utilizing the OAuth 2.0 bearer scheme (i.e. RFC6750) for both the authorize code grant and client credentials grant. This effectively allows application "passwords" when used with the client credentials grant. Closes #2023, Closes #188. Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Diffstat (limited to 'internal/configuration/helpers_test.go')
-rw-r--r--internal/configuration/helpers_test.go11
1 files changed, 6 insertions, 5 deletions
diff --git a/internal/configuration/helpers_test.go b/internal/configuration/helpers_test.go
index fcb7e343d..678b8535c 100644
--- a/internal/configuration/helpers_test.go
+++ b/internal/configuration/helpers_test.go
@@ -48,11 +48,12 @@ func TestGetEnvConfigMaps(t *testing.T) {
assert.True(t, ok)
assert.Equal(t, "mysecret.password", key)
- assert.Len(t, ignoredKeys, 4)
- assert.Contains(t, ignoredKeys, DefaultEnvPrefix+"MYOTHER_CONFIGKEY_FILE")
- assert.Contains(t, ignoredKeys, DefaultEnvPrefix+"MYSECRET_PASSWORD_FILE")
- assert.Contains(t, ignoredKeys, DefaultEnvPrefix+"MYSECRET_USER_PASSWORD_FILE")
- assert.Contains(t, ignoredKeys, DefaultEnvPrefix+"JWT_SECRET_FILE")
+ assert.Len(t, ignoredKeys, 6)
+ assert.Contains(t, ignoredKeys, DefaultEnvPrefix+MYOTHER_CONFIGKEY_FILE)
+ assert.Contains(t, ignoredKeys, DefaultEnvPrefix+MYSECRET_PASSWORD_FILE)
+ assert.Contains(t, ignoredKeys, DefaultEnvPrefix+MYSECRET_USER_PASSWORD_FILE)
+ assert.Contains(t, ignoredKeys, DefaultEnvPrefix+"IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY_FILE")
+ assert.Contains(t, ignoredKeys, DefaultEnvPrefix+"IDENTITY_PROVIDERS_OIDC_ISSUER_CERTIFICATE_CHAIN_FILE")
}
func TestGetSecretConfigMapMockInput(t *testing.T) {