summaryrefslogtreecommitdiff
path: root/internal/handlers/handler_sign_duo_test.go
diff options
context:
space:
mode:
authorJames Elliott <james-d-elliott@users.noreply.github.com>2022-10-20 13:16:36 +1100
committerGitHub <noreply@github.com>2022-10-20 13:16:36 +1100
commit3aaca0604f2ed479d7f00fb5087ffed059f87a71 (patch)
treedfa3a2622b3368fac30d5eee2956b4d5fcc5fa17 /internal/handlers/handler_sign_duo_test.go
parentb1a6dae99ac5b34f065391e266ac1cd87bac5b14 (diff)
feat(oidc): implicit consent (#4080)
This adds multiple consent modes to OpenID Connect clients. Specifically it allows configuration of a new consent mode called implicit which never asks for user consent.
Diffstat (limited to 'internal/handlers/handler_sign_duo_test.go')
-rw-r--r--internal/handlers/handler_sign_duo_test.go44
1 files changed, 22 insertions, 22 deletions
diff --git a/internal/handlers/handler_sign_duo_test.go b/internal/handlers/handler_sign_duo_test.go
index 771fc49bf..c08c8f1ee 100644
--- a/internal/handlers/handler_sign_duo_test.go
+++ b/internal/handlers/handler_sign_duo_test.go
@@ -54,7 +54,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldEnroll() {
duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&preAuthResponse, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -113,7 +113,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldAutoSelect() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&authResponse, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -142,7 +142,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldDenyAutoSelect() {
values.Set("factor", "push")
values.Set("device", "12345ABCDEFGHIJ67890")
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -162,7 +162,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldFailAutoSelect() {
duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Any()).Return(nil, fmt.Errorf("Connnection error"))
- bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -191,7 +191,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldDeleteOldDeviceAndEnroll() {
s.mock.StorageMock.EXPECT().DeletePreferredDuoDevice(s.mock.Ctx, "john").Return(nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -225,7 +225,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldDeleteOldDeviceAndCallPreauthAPIWit
s.mock.StorageMock.EXPECT().DeletePreferredDuoDevice(s.mock.Ctx, "john").Return(nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -263,7 +263,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldUseOldDeviceAndSelect() {
duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&preAuthResponse, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -319,7 +319,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldUseInvalidMethodAndAutoSelect() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&authResponse, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -342,7 +342,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoPreauthAPIAndAllowAccess() {
duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&preAuthResponse, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -372,7 +372,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoPreauthAPIAndDenyAccess() {
values.Set("factor", "push")
values.Set("device", "12345ABCDEFGHIJ67890")
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -390,7 +390,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoPreauthAPIAndFail() {
duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Any()).Return(nil, fmt.Errorf("Connnection error"))
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -442,7 +442,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoAPIAndDenyAccess() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&response, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -473,7 +473,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoAPIAndFail() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(nil, fmt.Errorf("Connnection error"))
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -521,7 +521,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldRedirectUserToDefaultURL() {
s.mock.Ctx.Configuration.DefaultRedirectionURL = testRedirectionURL
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -568,7 +568,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldNotReturnRedirectURL() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{})
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -613,15 +613,15 @@ func (s *SecondFactorDuoPostSuite) TestShouldRedirectUserToSafeTargetURL() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{
- TargetURL: "https://mydomain.example.com",
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{
+ TargetURL: "https://example.com",
})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
DuoPOST(duoMock)(s.mock.Ctx)
s.mock.Assert200OK(s.T(), redirectResponse{
- Redirect: "https://mydomain.example.com",
+ Redirect: "https://example.com",
})
}
@@ -662,8 +662,8 @@ func (s *SecondFactorDuoPostSuite) TestShouldNotRedirectToUnsafeURL() {
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{
- TargetURL: "http://mydomain.example.com",
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{
+ TargetURL: "http://example.com",
})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)
@@ -709,8 +709,8 @@ func (s *SecondFactorDuoPostSuite) TestShouldRegenerateSessionForPreventingSessi
duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil)
- bodyBytes, err := json.Marshal(signDuoRequestBody{
- TargetURL: "http://mydomain.example.com",
+ bodyBytes, err := json.Marshal(bodySignDuoRequest{
+ TargetURL: "http://example.com",
})
s.Require().NoError(err)
s.mock.Ctx.Request.SetBody(bodyBytes)