@@ -179,12 +179,12 @@ func TestOIDC_authorizeToken(t *testing.T) {
179
179
assert .FatalError (t , err )
180
180
t4 , err := generateToken ("subject" , issuer , p3 .ClientID , "foo@smallstep.com" , []string {}, time .Now (), & keys .Keys [2 ])
181
181
assert .FatalError (t , err )
182
- // Invalid email
183
- failEmail , err := generateToken ("subject" , issuer , p3 .ClientID , "" , []string {}, time .Now (), & keys .Keys [2 ])
182
+ t5 , err := generateToken ("subject" , issuer , p3 .ClientID , "" , []string {}, time .Now (), & keys .Keys [2 ])
184
183
assert .FatalError (t , err )
184
+
185
+ // Invalid email
185
186
failDomain , err := generateToken ("subject" , issuer , p3 .ClientID , "name@example.com" , []string {}, time .Now (), & keys .Keys [2 ])
186
187
assert .FatalError (t , err )
187
-
188
188
// Invalid tokens
189
189
parts := strings .Split (t1 , "." )
190
190
key , err := generateJSONWebKey ()
@@ -226,7 +226,7 @@ func TestOIDC_authorizeToken(t *testing.T) {
226
226
{"ok tenantid" , p2 , args {t2 }, http .StatusOK , tenantIssuer , false },
227
227
{"ok admin" , p3 , args {t3 }, http .StatusOK , issuer , false },
228
228
{"ok domain" , p3 , args {t4 }, http .StatusOK , issuer , false },
229
- {"fail- email" , p3 , args {failEmail }, http .StatusUnauthorized , "" , true },
229
+ {"ok no email" , p3 , args {t5 }, http .StatusOK , issuer , false },
230
230
{"fail-domain" , p3 , args {failDomain }, http .StatusUnauthorized , "" , true },
231
231
{"fail-key" , p1 , args {failKey }, http .StatusUnauthorized , "" , true },
232
232
{"fail-token" , p1 , args {failTok }, http .StatusUnauthorized , "" , true },
@@ -290,8 +290,8 @@ func TestOIDC_AuthorizeSign(t *testing.T) {
290
290
// Admin email not in domains
291
291
okAdmin , err := generateToken ("subject" , "the-issuer" , p3 .ClientID , "root@example.com" , []string {"test.smallstep.com" }, time .Now (), & keys .Keys [0 ])
292
292
assert .FatalError (t , err )
293
- // Invalid email
294
- failEmail , err := generateToken ("subject" , "the-issuer" , p3 .ClientID , "" , []string {}, time .Now (), & keys .Keys [0 ])
293
+ // No email
294
+ noEmail , err := generateToken ("subject" , "the-issuer" , p3 .ClientID , "" , []string {}, time .Now (), & keys .Keys [0 ])
295
295
assert .FatalError (t , err )
296
296
297
297
type args struct {
@@ -306,7 +306,8 @@ func TestOIDC_AuthorizeSign(t *testing.T) {
306
306
}{
307
307
{"ok1" , p1 , args {t1 }, http .StatusOK , false },
308
308
{"admin" , p3 , args {okAdmin }, http .StatusOK , false },
309
- {"fail-email" , p3 , args {failEmail }, http .StatusUnauthorized , true },
309
+ {"no-email" , p3 , args {noEmail }, http .StatusOK , false },
310
+ {"bad-token" , p3 , args {"foobar" }, http .StatusUnauthorized , true },
310
311
}
311
312
for _ , tt := range tests {
312
313
t .Run (tt .name , func (t * testing.T ) {
@@ -323,12 +324,13 @@ func TestOIDC_AuthorizeSign(t *testing.T) {
323
324
} else {
324
325
if assert .NotNil (t , got ) {
325
326
if tt .name == "admin" {
326
- assert .Len (t , 4 , got )
327
+ assert .Len (t , 5 , got )
327
328
} else {
328
329
assert .Len (t , 5 , got )
329
330
}
330
331
for _ , o := range got {
331
332
switch v := o .(type ) {
333
+ case certificateOptionsFunc :
332
334
case * provisionerExtensionOption :
333
335
assert .Equals (t , v .Type , int (TypeOIDC ))
334
336
assert .Equals (t , v .Name , tt .prov .GetName ())
@@ -514,7 +516,7 @@ func TestOIDC_AuthorizeSSHSign(t *testing.T) {
514
516
// Admin email not in domains
515
517
okAdmin , err := generateToken ("subject" , "the-issuer" , p3 .ClientID , "root@example.com" , []string {}, time .Now (), & keys .Keys [0 ])
516
518
assert .FatalError (t , err )
517
- // Invalid email
519
+ // Empty email
518
520
failEmail , err := generateToken ("subject" , "the-issuer" , p3 .ClientID , "" , []string {}, time .Now (), & keys .Keys [0 ])
519
521
assert .FatalError (t , err )
520
522
0 commit comments