@@ -3136,15 +3136,16 @@ func TestGeneratePolicies(t *testing.T) {
3136
3136
},
3137
3137
Spec : conf_v1.PolicySpec {
3138
3138
OIDC : & conf_v1.OIDC {
3139
- AuthEndpoint : "http://example.com/auth" ,
3140
- TokenEndpoint : "http://example.com/token" ,
3141
- JWKSURI : "http://example.com/jwks" ,
3142
- ClientID : "client-id" ,
3143
- ClientSecret : "oidc-secret" ,
3144
- Scope : "scope" ,
3145
- RedirectURI : "/redirect" ,
3146
- ZoneSyncLeeway : createPointerFromInt (20 ),
3147
- AccessTokenEnable : true ,
3139
+ AuthEndpoint : "http://example.com/auth" ,
3140
+ TokenEndpoint : "http://example.com/token" ,
3141
+ JWKSURI : "http://example.com/jwks" ,
3142
+ ClientID : "client-id" ,
3143
+ ClientSecret : "oidc-secret" ,
3144
+ Scope : "scope" ,
3145
+ RedirectURI : "/redirect" ,
3146
+ ZoneSyncLeeway : createPointerFromInt (20 ),
3147
+ AccessTokenEnable : true ,
3148
+ InterceptErrorEnable : false ,
3148
3149
},
3149
3150
},
3150
3151
},
@@ -4253,11 +4254,12 @@ func TestGeneratePoliciesFails(t *testing.T) {
4253
4254
},
4254
4255
Spec : conf_v1.PolicySpec {
4255
4256
OIDC : & conf_v1.OIDC {
4256
- ClientSecret : "oidc-secret" ,
4257
- AuthEndpoint : "http://foo.com/bar" ,
4258
- TokenEndpoint : "http://foo.com/bar" ,
4259
- JWKSURI : "http://foo.com/bar" ,
4260
- AccessTokenEnable : true ,
4257
+ ClientSecret : "oidc-secret" ,
4258
+ AuthEndpoint : "http://foo.com/bar" ,
4259
+ TokenEndpoint : "http://foo.com/bar" ,
4260
+ JWKSURI : "http://foo.com/bar" ,
4261
+ AccessTokenEnable : true ,
4262
+ InterceptErrorEnable : false ,
4261
4263
},
4262
4264
},
4263
4265
},
@@ -4300,12 +4302,13 @@ func TestGeneratePoliciesFails(t *testing.T) {
4300
4302
},
4301
4303
Spec : conf_v1.PolicySpec {
4302
4304
OIDC : & conf_v1.OIDC {
4303
- ClientID : "foo" ,
4304
- ClientSecret : "oidc-secret" ,
4305
- AuthEndpoint : "https://foo.com/auth" ,
4306
- TokenEndpoint : "https://foo.com/token" ,
4307
- JWKSURI : "https://foo.com/certs" ,
4308
- AccessTokenEnable : true ,
4305
+ ClientID : "foo" ,
4306
+ ClientSecret : "oidc-secret" ,
4307
+ AuthEndpoint : "https://foo.com/auth" ,
4308
+ TokenEndpoint : "https://foo.com/token" ,
4309
+ JWKSURI : "https://foo.com/certs" ,
4310
+ AccessTokenEnable : true ,
4311
+ InterceptErrorEnable : false ,
4309
4312
},
4310
4313
},
4311
4314
},
@@ -4316,12 +4319,13 @@ func TestGeneratePoliciesFails(t *testing.T) {
4316
4319
},
4317
4320
Spec : conf_v1.PolicySpec {
4318
4321
OIDC : & conf_v1.OIDC {
4319
- ClientID : "foo" ,
4320
- ClientSecret : "oidc-secret" ,
4321
- AuthEndpoint : "https://bar.com/auth" ,
4322
- TokenEndpoint : "https://bar.com/token" ,
4323
- JWKSURI : "https://bar.com/certs" ,
4324
- AccessTokenEnable : true ,
4322
+ ClientID : "foo" ,
4323
+ ClientSecret : "oidc-secret" ,
4324
+ AuthEndpoint : "https://bar.com/auth" ,
4325
+ TokenEndpoint : "https://bar.com/token" ,
4326
+ JWKSURI : "https://bar.com/certs" ,
4327
+ AccessTokenEnable : true ,
4328
+ InterceptErrorEnable : false ,
4325
4329
},
4326
4330
},
4327
4331
},
@@ -4341,15 +4345,16 @@ func TestGeneratePoliciesFails(t *testing.T) {
4341
4345
context : "route" ,
4342
4346
oidcPolCfg : & oidcPolicyCfg {
4343
4347
oidc : & version2.OIDC {
4344
- AuthEndpoint : "https://foo.com/auth" ,
4345
- TokenEndpoint : "https://foo.com/token" ,
4346
- JwksURI : "https://foo.com/certs" ,
4347
- ClientID : "foo" ,
4348
- ClientSecret : "super_secret_123" ,
4349
- RedirectURI : "/_codexch" ,
4350
- Scope : "openid" ,
4351
- ZoneSyncLeeway : 0 ,
4352
- AccessTokenEnable : true ,
4348
+ AuthEndpoint : "https://foo.com/auth" ,
4349
+ TokenEndpoint : "https://foo.com/token" ,
4350
+ JwksURI : "https://foo.com/certs" ,
4351
+ ClientID : "foo" ,
4352
+ ClientSecret : "super_secret_123" ,
4353
+ RedirectURI : "/_codexch" ,
4354
+ Scope : "openid" ,
4355
+ ZoneSyncLeeway : 0 ,
4356
+ AccessTokenEnable : true ,
4357
+ InterceptErrorEnable : false ,
4353
4358
},
4354
4359
key : "default/oidc-policy-1" ,
4355
4360
},
@@ -4365,14 +4370,15 @@ func TestGeneratePoliciesFails(t *testing.T) {
4365
4370
},
4366
4371
expectedOidc : & oidcPolicyCfg {
4367
4372
oidc : & version2.OIDC {
4368
- AuthEndpoint : "https://foo.com/auth" ,
4369
- TokenEndpoint : "https://foo.com/token" ,
4370
- JwksURI : "https://foo.com/certs" ,
4371
- ClientID : "foo" ,
4372
- ClientSecret : "super_secret_123" ,
4373
- RedirectURI : "/_codexch" ,
4374
- Scope : "openid" ,
4375
- AccessTokenEnable : true ,
4373
+ AuthEndpoint : "https://foo.com/auth" ,
4374
+ TokenEndpoint : "https://foo.com/token" ,
4375
+ JwksURI : "https://foo.com/certs" ,
4376
+ ClientID : "foo" ,
4377
+ ClientSecret : "super_secret_123" ,
4378
+ RedirectURI : "/_codexch" ,
4379
+ Scope : "openid" ,
4380
+ AccessTokenEnable : true ,
4381
+ InterceptErrorEnable : false ,
4376
4382
},
4377
4383
key : "default/oidc-policy-1" ,
4378
4384
},
@@ -4397,12 +4403,13 @@ func TestGeneratePoliciesFails(t *testing.T) {
4397
4403
},
4398
4404
Spec : conf_v1.PolicySpec {
4399
4405
OIDC : & conf_v1.OIDC {
4400
- ClientSecret : "oidc-secret" ,
4401
- AuthEndpoint : "https://foo.com/auth" ,
4402
- TokenEndpoint : "https://foo.com/token" ,
4403
- JWKSURI : "https://foo.com/certs" ,
4404
- ClientID : "foo" ,
4405
- AccessTokenEnable : true ,
4406
+ ClientSecret : "oidc-secret" ,
4407
+ AuthEndpoint : "https://foo.com/auth" ,
4408
+ TokenEndpoint : "https://foo.com/token" ,
4409
+ JWKSURI : "https://foo.com/certs" ,
4410
+ ClientID : "foo" ,
4411
+ AccessTokenEnable : true ,
4412
+ InterceptErrorEnable : false ,
4406
4413
},
4407
4414
},
4408
4415
},
@@ -4413,12 +4420,13 @@ func TestGeneratePoliciesFails(t *testing.T) {
4413
4420
},
4414
4421
Spec : conf_v1.PolicySpec {
4415
4422
OIDC : & conf_v1.OIDC {
4416
- ClientSecret : "oidc-secret" ,
4417
- AuthEndpoint : "https://bar.com/auth" ,
4418
- TokenEndpoint : "https://bar.com/token" ,
4419
- JWKSURI : "https://bar.com/certs" ,
4420
- ClientID : "bar" ,
4421
- AccessTokenEnable : true ,
4423
+ ClientSecret : "oidc-secret" ,
4424
+ AuthEndpoint : "https://bar.com/auth" ,
4425
+ TokenEndpoint : "https://bar.com/token" ,
4426
+ JWKSURI : "https://bar.com/certs" ,
4427
+ ClientID : "bar" ,
4428
+ AccessTokenEnable : true ,
4429
+ InterceptErrorEnable : false ,
4422
4430
},
4423
4431
},
4424
4432
},
@@ -4446,15 +4454,16 @@ func TestGeneratePoliciesFails(t *testing.T) {
4446
4454
},
4447
4455
expectedOidc : & oidcPolicyCfg {
4448
4456
& version2.OIDC {
4449
- AuthEndpoint : "https://foo.com/auth" ,
4450
- TokenEndpoint : "https://foo.com/token" ,
4451
- JwksURI : "https://foo.com/certs" ,
4452
- ClientID : "foo" ,
4453
- ClientSecret : "super_secret_123" ,
4454
- RedirectURI : "/_codexch" ,
4455
- Scope : "openid" ,
4456
- ZoneSyncLeeway : 200 ,
4457
- AccessTokenEnable : true ,
4457
+ AuthEndpoint : "https://foo.com/auth" ,
4458
+ TokenEndpoint : "https://foo.com/token" ,
4459
+ JwksURI : "https://foo.com/certs" ,
4460
+ ClientID : "foo" ,
4461
+ ClientSecret : "super_secret_123" ,
4462
+ RedirectURI : "/_codexch" ,
4463
+ Scope : "openid" ,
4464
+ ZoneSyncLeeway : 200 ,
4465
+ AccessTokenEnable : true ,
4466
+ InterceptErrorEnable : false ,
4458
4467
},
4459
4468
"default/oidc-policy" ,
4460
4469
},
0 commit comments