mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-12 05:07:31 +00:00
fix(app): move queries to query package (#2612)
* fix: move queries to query package * fix(auth): switch project role requests to query pkg * refactor: delete unused project role code * remove repo * implement sql queries * fix(database): oidc config change type to int2 * fix(queries): implement app queries * refactor: simplify code * fix: correct app query * Update app.go * fix token check * fix mock * test: app prepares * test: oidc compliance * test: OIDCOriginAllowList * fix: converter * resolve unsupported oidc version Co-authored-by: Livio Amstutz <livio.a@gmail.com>
This commit is contained in:
@@ -181,16 +181,38 @@ func GetOIDCCompliance(version OIDCVersion, appType OIDCApplicationType, grantTy
|
||||
case OIDCVersionV1:
|
||||
return GetOIDCV1Compliance(appType, grantTypes, authMethod, redirectUris)
|
||||
}
|
||||
return nil
|
||||
return &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.UnsupportedVersion"},
|
||||
}
|
||||
}
|
||||
|
||||
func GetOIDCV1Compliance(appType OIDCApplicationType, grantTypes []OIDCGrantType, authMethod OIDCAuthMethodType, redirectUris []string) *Compliance {
|
||||
compliance := &Compliance{NoneCompliant: false}
|
||||
if redirectUris == nil || len(redirectUris) == 0 {
|
||||
|
||||
checkGrantTypesCombination(compliance, grantTypes)
|
||||
checkRedirectURIs(compliance, grantTypes, appType, redirectUris)
|
||||
checkApplicaitonType(compliance, appType, authMethod)
|
||||
|
||||
if compliance.NoneCompliant {
|
||||
compliance.Problems = append([]string{"Application.OIDC.V1.NotCompliant"}, compliance.Problems...)
|
||||
}
|
||||
return compliance
|
||||
}
|
||||
|
||||
func checkGrantTypesCombination(compliance *Compliance, grantTypes []OIDCGrantType) {
|
||||
if containsOIDCGrantType(grantTypes, OIDCGrantTypeRefreshToken) && !containsOIDCGrantType(grantTypes, OIDCGrantTypeAuthorizationCode) {
|
||||
compliance.NoneCompliant = true
|
||||
compliance.Problems = append(compliance.Problems, "Application.OIDC.V1.GrantType.Refresh.NoAuthCode")
|
||||
}
|
||||
}
|
||||
|
||||
func checkRedirectURIs(compliance *Compliance, grantTypes []OIDCGrantType, appType OIDCApplicationType, redirectUris []string) {
|
||||
if len(redirectUris) == 0 {
|
||||
compliance.NoneCompliant = true
|
||||
compliance.Problems = append([]string{"Application.OIDC.V1.NoRedirectUris"}, compliance.Problems...)
|
||||
}
|
||||
CheckGrantTypes(compliance, grantTypes)
|
||||
|
||||
if containsOIDCGrantType(grantTypes, OIDCGrantTypeImplicit) && containsOIDCGrantType(grantTypes, OIDCGrantTypeAuthorizationCode) {
|
||||
CheckRedirectUrisImplicitAndCode(compliance, appType, redirectUris)
|
||||
} else {
|
||||
@@ -201,7 +223,9 @@ func GetOIDCV1Compliance(appType OIDCApplicationType, grantTypes []OIDCGrantType
|
||||
CheckRedirectUrisCode(compliance, appType, redirectUris)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func checkApplicaitonType(compliance *Compliance, appType OIDCApplicationType, authMethod OIDCAuthMethodType) {
|
||||
switch appType {
|
||||
case OIDCApplicationTypeNative:
|
||||
GetOIDCV1NativeApplicationCompliance(compliance, authMethod)
|
||||
@@ -211,14 +235,6 @@ func GetOIDCV1Compliance(appType OIDCApplicationType, grantTypes []OIDCGrantType
|
||||
if compliance.NoneCompliant {
|
||||
compliance.Problems = append([]string{"Application.OIDC.V1.NotCompliant"}, compliance.Problems...)
|
||||
}
|
||||
return compliance
|
||||
}
|
||||
|
||||
func CheckGrantTypes(compliance *Compliance, grantTypes []OIDCGrantType) {
|
||||
if containsOIDCGrantType(grantTypes, OIDCGrantTypeRefreshToken) && !containsOIDCGrantType(grantTypes, OIDCGrantTypeAuthorizationCode) {
|
||||
compliance.NoneCompliant = true
|
||||
compliance.Problems = append(compliance.Problems, "Application.OIDC.V1.GrantType.Refresh.NoAuthCode")
|
||||
}
|
||||
}
|
||||
|
||||
func GetOIDCV1NativeApplicationCompliance(compliance *Compliance, authMethod OIDCAuthMethodType) {
|
||||
@@ -345,3 +361,22 @@ func isHTTPLoopbackLocalhost(uri string) bool {
|
||||
strings.HasPrefix(uri, httpLoopbackV6LongWithoutPort) ||
|
||||
strings.HasPrefix(uri, httpLoopbackV6LongWithPort)
|
||||
}
|
||||
|
||||
func OIDCOriginAllowList(redirectURIs, additionalOrigins []string) ([]string, error) {
|
||||
allowList := make([]string, 0)
|
||||
for _, redirect := range redirectURIs {
|
||||
origin, err := http_util.GetOriginFromURLString(redirect)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if !http_util.IsOriginAllowed(allowList, origin) {
|
||||
allowList = append(allowList, origin)
|
||||
}
|
||||
}
|
||||
for _, origin := range additionalOrigins {
|
||||
if !http_util.IsOriginAllowed(allowList, origin) {
|
||||
allowList = append(allowList, origin)
|
||||
}
|
||||
}
|
||||
return allowList, nil
|
||||
}
|
||||
|
@@ -1,6 +1,8 @@
|
||||
package domain
|
||||
|
||||
import (
|
||||
"reflect"
|
||||
"strings"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
@@ -185,3 +187,489 @@ func TestApplicationValid(t *testing.T) {
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestGetOIDCV1Compliance(t *testing.T) {
|
||||
type args struct {
|
||||
appType OIDCApplicationType
|
||||
grantTypes []OIDCGrantType
|
||||
authMethod OIDCAuthMethodType
|
||||
redirectUris []string
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
}{
|
||||
{
|
||||
name: "none compliant",
|
||||
args: args{},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
got := GetOIDCV1Compliance(tt.args.appType, tt.args.grantTypes, tt.args.authMethod, tt.args.redirectUris)
|
||||
if !got.NoneCompliant {
|
||||
t.Error("compliance should be none compliant")
|
||||
}
|
||||
if len(got.Problems) == 0 || got.Problems[0] != "Application.OIDC.V1.NotCompliant" {
|
||||
t.Errorf("first entry of problems should be \"Application.OIDC.V1.NotCompliant\" but got %v", got.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func Test_checkGrantTypesCombination(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
want *Compliance
|
||||
grantTypes []OIDCGrantType
|
||||
}{
|
||||
{
|
||||
name: "implicit",
|
||||
want: new(Compliance),
|
||||
grantTypes: []OIDCGrantType{OIDCGrantTypeImplicit},
|
||||
},
|
||||
{
|
||||
name: "refresh token and implicit",
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.GrantType.Refresh.NoAuthCode"},
|
||||
},
|
||||
grantTypes: []OIDCGrantType{OIDCGrantTypeImplicit, OIDCGrantTypeRefreshToken},
|
||||
},
|
||||
{
|
||||
name: "refresh token and authorization code",
|
||||
want: &Compliance{},
|
||||
grantTypes: []OIDCGrantType{OIDCGrantTypeAuthorizationCode, OIDCGrantTypeRefreshToken},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
compliance := new(Compliance)
|
||||
|
||||
checkGrantTypesCombination(compliance, tt.grantTypes)
|
||||
|
||||
if tt.want.NoneCompliant != compliance.NoneCompliant {
|
||||
t.Errorf("NoneCompliant: expected: %v, got %v", tt.want.NoneCompliant, compliance.NoneCompliant)
|
||||
}
|
||||
if !reflect.DeepEqual(tt.want.Problems, compliance.Problems) {
|
||||
t.Errorf("Problems: expected: %v, got %v", tt.want.Problems, compliance.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func Test_checkRedirectURIs(t *testing.T) {
|
||||
type args struct {
|
||||
grantTypes []OIDCGrantType
|
||||
appType OIDCApplicationType
|
||||
redirectUris []string
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
want *Compliance
|
||||
args args
|
||||
}{
|
||||
{
|
||||
name: "no redirect uris",
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{
|
||||
"Application.OIDC.V1.NoRedirectUris",
|
||||
},
|
||||
},
|
||||
args: args{},
|
||||
},
|
||||
{
|
||||
name: "implicit and authorization code",
|
||||
want: &Compliance{
|
||||
NoneCompliant: false,
|
||||
Problems: []string{"Application.OIDC.V1.NotAllCombinationsAreAllowed"},
|
||||
},
|
||||
args: args{
|
||||
redirectUris: []string{"http://redirect.to/me"},
|
||||
grantTypes: []OIDCGrantType{OIDCGrantTypeImplicit, OIDCGrantTypeAuthorizationCode},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only implicit",
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Implicit.RedirectUris.HttpNotAllowed"},
|
||||
},
|
||||
args: args{
|
||||
redirectUris: []string{"http://redirect.to/me"},
|
||||
grantTypes: []OIDCGrantType{OIDCGrantTypeImplicit},
|
||||
appType: OIDCApplicationTypeUserAgent,
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only authorization code",
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Code.RedirectUris.HttpOnlyForWeb"},
|
||||
},
|
||||
args: args{
|
||||
redirectUris: []string{"http://redirect.to/me"},
|
||||
grantTypes: []OIDCGrantType{OIDCGrantTypeAuthorizationCode},
|
||||
appType: OIDCApplicationTypeUserAgent,
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
compliance := new(Compliance)
|
||||
|
||||
checkRedirectURIs(compliance, tt.args.grantTypes, tt.args.appType, tt.args.redirectUris)
|
||||
|
||||
if tt.want.NoneCompliant != compliance.NoneCompliant {
|
||||
t.Errorf("NoneCompliant: expected: %v, got %v", tt.want.NoneCompliant, compliance.NoneCompliant)
|
||||
}
|
||||
if !reflect.DeepEqual(tt.want.Problems, compliance.Problems) {
|
||||
t.Errorf("Problems: expected: %v, got %v", tt.want.Problems, compliance.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func Test_CheckRedirectUrisImplicitAndCode(t *testing.T) {
|
||||
type args struct {
|
||||
appType OIDCApplicationType
|
||||
redirectUris []string
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
want *Compliance
|
||||
args args
|
||||
}{
|
||||
{
|
||||
name: "implicit and code https",
|
||||
want: &Compliance{
|
||||
NoneCompliant: false,
|
||||
Problems: nil,
|
||||
},
|
||||
args: args{
|
||||
redirectUris: []string{"https://redirect.to/me"},
|
||||
},
|
||||
},
|
||||
// {
|
||||
// name: "custom protocol, not native",
|
||||
// want: &Compliance{
|
||||
// NoneCompliant: true,
|
||||
// Problems: []string{"Application.OIDC.V1.Implicit.RedirectUris.CustomNotAllowed"},
|
||||
// },
|
||||
// args: args{
|
||||
// redirectUris: []string{"protocol://redirect.to/me"},
|
||||
// appType: OIDCApplicationTypeWeb,
|
||||
// },
|
||||
// },
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
compliance := new(Compliance)
|
||||
|
||||
CheckRedirectUrisImplicitAndCode(compliance, tt.args.appType, tt.args.redirectUris)
|
||||
|
||||
if tt.want.NoneCompliant != compliance.NoneCompliant {
|
||||
t.Errorf("NoneCompliant: expected: %v, got %v", tt.want.NoneCompliant, compliance.NoneCompliant)
|
||||
}
|
||||
if !reflect.DeepEqual(tt.want.Problems, compliance.Problems) {
|
||||
t.Errorf("Problems: expected: %v, got %v", tt.want.Problems, compliance.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestCheckRedirectUrisImplicitAndCode(t *testing.T) {
|
||||
type args struct {
|
||||
appType OIDCApplicationType
|
||||
redirectUris []string
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
want *Compliance
|
||||
}{
|
||||
{
|
||||
name: "only https",
|
||||
args: args{},
|
||||
want: &Compliance{},
|
||||
},
|
||||
{
|
||||
name: "custom protocol not native app",
|
||||
args: args{
|
||||
appType: OIDCApplicationTypeWeb,
|
||||
redirectUris: []string{"custom://nirvana.com"},
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Implicit.RedirectUris.CustomNotAllowed"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "http localhost user agent app",
|
||||
args: args{
|
||||
appType: OIDCApplicationTypeUserAgent,
|
||||
redirectUris: []string{"http://localhost:9009"},
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Code.RedirectUris.HttpOnlyForWeb"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "http, not only localhost native app",
|
||||
args: args{
|
||||
appType: OIDCApplicationTypeNative,
|
||||
redirectUris: []string{"http://nirvana.com", "http://localhost:9009"},
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Native.RedirectUris.MustBeHttpLocalhost"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "not allowed combination",
|
||||
args: args{
|
||||
appType: OIDCApplicationTypeNative,
|
||||
redirectUris: []string{"https://nirvana.com", "cutom://nirvana.com"},
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: false,
|
||||
Problems: []string{"Application.OIDC.V1.NotAllCombinationsAreAllowed"},
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
got := new(Compliance)
|
||||
CheckRedirectUrisImplicitAndCode(got, tt.args.appType, tt.args.redirectUris)
|
||||
|
||||
if tt.want.NoneCompliant != got.NoneCompliant {
|
||||
t.Errorf("NoneCompliant: expected: %v, got %v", tt.want.NoneCompliant, got.NoneCompliant)
|
||||
}
|
||||
if !reflect.DeepEqual(tt.want.Problems, got.Problems) {
|
||||
t.Errorf("Problems: expected: %v, got %v", tt.want.Problems, got.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestCheckRedirectUrisImplicit(t *testing.T) {
|
||||
type args struct {
|
||||
appType OIDCApplicationType
|
||||
redirectUris []string
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
want *Compliance
|
||||
}{
|
||||
{
|
||||
name: "only https",
|
||||
args: args{},
|
||||
want: &Compliance{},
|
||||
},
|
||||
{
|
||||
name: "custom protocol",
|
||||
args: args{
|
||||
redirectUris: []string{"custom://nirvana.com"},
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Implicit.RedirectUris.CustomNotAllowed"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only http protocol, app type native, not only localhost",
|
||||
args: args{
|
||||
redirectUris: []string{"http://nirvana.com"},
|
||||
appType: OIDCApplicationTypeNative,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Native.RedirectUris.MustBeHttpLocalhost"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only http protocol, app type native, only localhost",
|
||||
args: args{
|
||||
redirectUris: []string{"http://localhost:8080"},
|
||||
appType: OIDCApplicationTypeNative,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: false,
|
||||
Problems: nil,
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only http protocol, app type web",
|
||||
args: args{
|
||||
redirectUris: []string{"http://nirvana.com"},
|
||||
appType: OIDCApplicationTypeWeb,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Implicit.RedirectUris.HttpNotAllowed"},
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
got := new(Compliance)
|
||||
CheckRedirectUrisImplicit(got, tt.args.appType, tt.args.redirectUris)
|
||||
|
||||
if tt.want.NoneCompliant != got.NoneCompliant {
|
||||
t.Errorf("NoneCompliant: expected: %v, got %v", tt.want.NoneCompliant, got.NoneCompliant)
|
||||
}
|
||||
if !reflect.DeepEqual(tt.want.Problems, got.Problems) {
|
||||
t.Errorf("Problems: expected: %v, got %v", tt.want.Problems, got.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestCheckRedirectUrisCode(t *testing.T) {
|
||||
type args struct {
|
||||
appType OIDCApplicationType
|
||||
redirectUris []string
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
want *Compliance
|
||||
}{
|
||||
{
|
||||
name: "only https",
|
||||
args: args{},
|
||||
want: &Compliance{},
|
||||
},
|
||||
{
|
||||
name: "custom prefix, app type web",
|
||||
args: args{
|
||||
redirectUris: []string{"custom://nirvana.com"},
|
||||
appType: OIDCApplicationTypeWeb,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Code.RedirectUris.CustomOnlyForNative"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only http protocol, app type user agent",
|
||||
args: args{
|
||||
redirectUris: []string{"http://nirvana.com"},
|
||||
appType: OIDCApplicationTypeUserAgent,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Code.RedirectUris.HttpOnlyForWeb"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "only http protocol, app type native, only localhost",
|
||||
args: args{
|
||||
redirectUris: []string{"http://localhost:8080", "http://nirvana.com:8080"},
|
||||
appType: OIDCApplicationTypeNative,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Native.RedirectUris.MustBeHttpLocalhost"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "custom protocol, not native",
|
||||
args: args{
|
||||
redirectUris: []string{"custom://nirvana.com"},
|
||||
appType: OIDCApplicationTypeWeb,
|
||||
},
|
||||
want: &Compliance{
|
||||
NoneCompliant: true,
|
||||
Problems: []string{"Application.OIDC.V1.Code.RedirectUris.CustomOnlyForNative"},
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
got := new(Compliance)
|
||||
CheckRedirectUrisCode(got, tt.args.appType, tt.args.redirectUris)
|
||||
|
||||
if tt.want.NoneCompliant != got.NoneCompliant {
|
||||
t.Errorf("NoneCompliant: expected: %v, got %v", tt.want.NoneCompliant, got.NoneCompliant)
|
||||
}
|
||||
if !reflect.DeepEqual(tt.want.Problems, got.Problems) {
|
||||
t.Errorf("Problems: expected: %v, got %v", tt.want.Problems, got.Problems)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestOIDCOriginAllowList(t *testing.T) {
|
||||
type args struct {
|
||||
redirectUris []string
|
||||
additionalOrigins []string
|
||||
}
|
||||
type want struct {
|
||||
allowed []string
|
||||
err func(error) bool
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
want want
|
||||
}{
|
||||
{
|
||||
name: "no uris, no origins",
|
||||
args: args{},
|
||||
want: want{
|
||||
allowed: []string{},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "redirects invalid schema",
|
||||
args: args{
|
||||
redirectUris: []string{"https:// localhost:8080"},
|
||||
},
|
||||
want: want{
|
||||
allowed: nil,
|
||||
err: func(e error) bool {
|
||||
return strings.HasPrefix(e.Error(), "invalid chavalid character")
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "redirects additional",
|
||||
args: args{
|
||||
redirectUris: []string{"https://localhost:8080"},
|
||||
},
|
||||
want: want{
|
||||
allowed: []string{"https://localhost:8080"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "additional origin",
|
||||
args: args{
|
||||
additionalOrigins: []string{"https://localhost:8080"},
|
||||
},
|
||||
want: want{
|
||||
allowed: []string{"https://localhost:8080"},
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
allowed, err := OIDCOriginAllowList(tt.args.redirectUris, tt.args.additionalOrigins)
|
||||
|
||||
if tt.want.err == nil && err != nil {
|
||||
t.Errorf("unexpected error: %v", err)
|
||||
} else if tt.want.err == nil && err == nil {
|
||||
//ok
|
||||
} else if tt.want.err(err) {
|
||||
t.Errorf("unexpected err got %v", err)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(allowed, tt.want.allowed) {
|
||||
t.Errorf("expected list: %v, got: %v", tt.want.allowed, allowed)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user