diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2022-10-20 13:16:36 +1100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-10-20 13:16:36 +1100 |
| commit | 3aaca0604f2ed479d7f00fb5087ffed059f87a71 (patch) | |
| tree | dfa3a2622b3368fac30d5eee2956b4d5fcc5fa17 /internal/handlers/handler_sign_duo_test.go | |
| parent | b1a6dae99ac5b34f065391e266ac1cd87bac5b14 (diff) | |
feat(oidc): implicit consent (#4080)
This adds multiple consent modes to OpenID Connect clients. Specifically it allows configuration of a new consent mode called implicit which never asks for user consent.
Diffstat (limited to 'internal/handlers/handler_sign_duo_test.go')
| -rw-r--r-- | internal/handlers/handler_sign_duo_test.go | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/internal/handlers/handler_sign_duo_test.go b/internal/handlers/handler_sign_duo_test.go index 771fc49bf..c08c8f1ee 100644 --- a/internal/handlers/handler_sign_duo_test.go +++ b/internal/handlers/handler_sign_duo_test.go @@ -54,7 +54,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldEnroll() { duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&preAuthResponse, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -113,7 +113,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldAutoSelect() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&authResponse, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -142,7 +142,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldDenyAutoSelect() { values.Set("factor", "push") values.Set("device", "12345ABCDEFGHIJ67890") - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -162,7 +162,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldFailAutoSelect() { duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Any()).Return(nil, fmt.Errorf("Connnection error")) - bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -191,7 +191,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldDeleteOldDeviceAndEnroll() { s.mock.StorageMock.EXPECT().DeletePreferredDuoDevice(s.mock.Ctx, "john").Return(nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -225,7 +225,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldDeleteOldDeviceAndCallPreauthAPIWit s.mock.StorageMock.EXPECT().DeletePreferredDuoDevice(s.mock.Ctx, "john").Return(nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -263,7 +263,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldUseOldDeviceAndSelect() { duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&preAuthResponse, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -319,7 +319,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldUseInvalidMethodAndAutoSelect() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&authResponse, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -342,7 +342,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoPreauthAPIAndAllowAccess() { duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&preAuthResponse, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{TargetURL: "https://target.example.com"}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{TargetURL: "https://target.example.com"}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -372,7 +372,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoPreauthAPIAndDenyAccess() { values.Set("factor", "push") values.Set("device", "12345ABCDEFGHIJ67890") - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -390,7 +390,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoPreauthAPIAndFail() { duoMock.EXPECT().PreAuthCall(s.mock.Ctx, gomock.Any()).Return(nil, fmt.Errorf("Connnection error")) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -442,7 +442,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoAPIAndDenyAccess() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Eq(values)).Return(&response, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -473,7 +473,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldCallDuoAPIAndFail() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(nil, fmt.Errorf("Connnection error")) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -521,7 +521,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldRedirectUserToDefaultURL() { s.mock.Ctx.Configuration.DefaultRedirectionURL = testRedirectionURL - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -568,7 +568,7 @@ func (s *SecondFactorDuoPostSuite) TestShouldNotReturnRedirectURL() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{}) + bodyBytes, err := json.Marshal(bodySignDuoRequest{}) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -613,15 +613,15 @@ func (s *SecondFactorDuoPostSuite) TestShouldRedirectUserToSafeTargetURL() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{ - TargetURL: "https://mydomain.example.com", + bodyBytes, err := json.Marshal(bodySignDuoRequest{ + TargetURL: "https://example.com", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) DuoPOST(duoMock)(s.mock.Ctx) s.mock.Assert200OK(s.T(), redirectResponse{ - Redirect: "https://mydomain.example.com", + Redirect: "https://example.com", }) } @@ -662,8 +662,8 @@ func (s *SecondFactorDuoPostSuite) TestShouldNotRedirectToUnsafeURL() { duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{ - TargetURL: "http://mydomain.example.com", + bodyBytes, err := json.Marshal(bodySignDuoRequest{ + TargetURL: "http://example.com", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) @@ -709,8 +709,8 @@ func (s *SecondFactorDuoPostSuite) TestShouldRegenerateSessionForPreventingSessi duoMock.EXPECT().AuthCall(s.mock.Ctx, gomock.Any()).Return(&response, nil) - bodyBytes, err := json.Marshal(signDuoRequestBody{ - TargetURL: "http://mydomain.example.com", + bodyBytes, err := json.Marshal(bodySignDuoRequest{ + TargetURL: "http://example.com", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) |
