@@ -80,11 +80,11 @@ func TestClientSDK(t *testing.T) {
80
80
c .GetConfig ().Servers = hydra.ServerConfigurations {{URL : server .URL }}
81
81
82
82
t .Run ("case=client default scopes are set" , func (t * testing.T ) {
83
- result , _ , err := c .OAuth2Api .CreateOAuth2Client (ctx ).OAuth2Client (hydra.OAuth2Client {}).Execute ()
83
+ result , _ , err := c .OAuth2API .CreateOAuth2Client (ctx ).OAuth2Client (hydra.OAuth2Client {}).Execute ()
84
84
require .NoError (t , err )
85
85
assert .EqualValues (t , conf .DefaultClientScope (ctx ), strings .Split (* result .Scope , " " ))
86
86
87
- _ , err = c .OAuth2Api .DeleteOAuth2Client (ctx , * result .ClientId ).Execute ()
87
+ _ , err = c .OAuth2API .DeleteOAuth2Client (ctx , * result .ClientId ).Execute ()
88
88
require .NoError (t , err )
89
89
})
90
90
@@ -95,7 +95,7 @@ func TestClientSDK(t *testing.T) {
95
95
// createClient.SecretExpiresAt = 10
96
96
97
97
// returned client is correct on Create
98
- result , _ , err := c .OAuth2Api .CreateOAuth2Client (ctx ).OAuth2Client (createClient ).Execute ()
98
+ result , _ , err := c .OAuth2API .CreateOAuth2Client (ctx ).OAuth2Client (createClient ).Execute ()
99
99
require .NoError (t , err )
100
100
assert .NotEmpty (t , result .UpdatedAt )
101
101
assert .NotEmpty (t , result .CreatedAt )
@@ -109,31 +109,31 @@ func TestClientSDK(t *testing.T) {
109
109
110
110
// secret is not returned on GetOAuth2Client
111
111
compareClient .ClientSecret = pointerx .Ptr ("" )
112
- gresult , _ , err := c .OAuth2Api .GetOAuth2Client (context .Background (), * createClient .ClientId ).Execute ()
112
+ gresult , _ , err := c .OAuth2API .GetOAuth2Client (context .Background (), * createClient .ClientId ).Execute ()
113
113
require .NoError (t , err )
114
114
assertx .EqualAsJSONExcept (t , compareClient , gresult , append (defaultIgnoreFields , "client_secret" ))
115
115
116
116
// get client will return The request could not be authorized
117
- gresult , _ , err = c .OAuth2Api .GetOAuth2Client (context .Background (), "unknown" ).Execute ()
117
+ gresult , _ , err = c .OAuth2API .GetOAuth2Client (context .Background (), "unknown" ).Execute ()
118
118
require .Error (t , err )
119
119
assert .Empty (t , gresult )
120
120
assert .True (t , strings .Contains (err .Error (), "404" ), err .Error ())
121
121
122
122
// listing clients returns the only added one
123
- results , _ , err := c .OAuth2Api .ListOAuth2Clients (context .Background ()).PageSize (100 ).Execute ()
123
+ results , _ , err := c .OAuth2API .ListOAuth2Clients (context .Background ()).PageSize (100 ).Execute ()
124
124
require .NoError (t , err )
125
125
assert .Len (t , results , 1 )
126
126
assertx .EqualAsJSONExcept (t , compareClient , results [0 ], append (defaultIgnoreFields , "client_secret" ))
127
127
128
128
// SecretExpiresAt gets overwritten with 0 on Update
129
129
compareClient .ClientSecret = createClient .ClientSecret
130
- uresult , _ , err := c .OAuth2Api .SetOAuth2Client (context .Background (), * createClient .ClientId ).OAuth2Client (createClient ).Execute ()
130
+ uresult , _ , err := c .OAuth2API .SetOAuth2Client (context .Background (), * createClient .ClientId ).OAuth2Client (createClient ).Execute ()
131
131
require .NoError (t , err )
132
132
assertx .EqualAsJSONExcept (t , compareClient , uresult , append (defaultIgnoreFields , "client_secret" ))
133
133
134
134
// create another client
135
135
updateClient := createTestClient ("foo" )
136
- uresult , _ , err = c .OAuth2Api .SetOAuth2Client (context .Background (), * createClient .ClientId ).OAuth2Client (updateClient ).Execute ()
136
+ uresult , _ , err = c .OAuth2API .SetOAuth2Client (context .Background (), * createClient .ClientId ).OAuth2Client (updateClient ).Execute ()
137
137
require .NoError (t , err )
138
138
assert .NotEqual (t , updateClient .ClientId , uresult .ClientId )
139
139
updateClient .ClientId = uresult .ClientId
@@ -142,35 +142,35 @@ func TestClientSDK(t *testing.T) {
142
142
// again, test if secret is not returned on Get
143
143
compareClient = updateClient
144
144
compareClient .ClientSecret = pointerx .Ptr ("" )
145
- gresult , _ , err = c .OAuth2Api .GetOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
145
+ gresult , _ , err = c .OAuth2API .GetOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
146
146
require .NoError (t , err )
147
147
assertx .EqualAsJSONExcept (t , compareClient , gresult , append (defaultIgnoreFields , "client_secret" ))
148
148
149
149
// client can not be found after being deleted
150
- _ , err = c .OAuth2Api .DeleteOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
150
+ _ , err = c .OAuth2API .DeleteOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
151
151
require .NoError (t , err )
152
152
153
- _ , _ , err = c .OAuth2Api .GetOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
153
+ _ , _ , err = c .OAuth2API .GetOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
154
154
require .Error (t , err )
155
155
})
156
156
157
157
t .Run ("case=public client is transmitted without secret" , func (t * testing.T ) {
158
- result , _ , err := c .OAuth2Api .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {
158
+ result , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {
159
159
TokenEndpointAuthMethod : pointerx .Ptr ("none" ),
160
160
}).Execute ()
161
161
require .NoError (t , err )
162
162
163
163
assert .Equal (t , "" , pointerx .Deref (result .ClientSecret ))
164
164
165
- result , _ , err = c .OAuth2Api .CreateOAuth2Client (context .Background ()).OAuth2Client (createTestClient ("" )).Execute ()
165
+ result , _ , err = c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (createTestClient ("" )).Execute ()
166
166
require .NoError (t , err )
167
167
168
168
assert .Equal (t , "secret" , pointerx .Deref (result .ClientSecret ))
169
169
})
170
170
171
171
t .Run ("case=id can be set" , func (t * testing.T ) {
172
172
id := uuidx .NewV4 ().String ()
173
- result , _ , err := c .OAuth2Api .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {ClientId : pointerx .Ptr (id )}).Execute ()
173
+ result , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {ClientId : pointerx .Ptr (id )}).Execute ()
174
174
require .NoError (t , err )
175
175
176
176
assert .Equal (t , id , pointerx .Deref (result .ClientId ))
@@ -182,14 +182,14 @@ func TestClientSDK(t *testing.T) {
182
182
value := "http://foo.bar"
183
183
184
184
cl := createTestClient ("" )
185
- created , _ , err := c .OAuth2Api .CreateOAuth2Client (context .Background ()).OAuth2Client (cl ).Execute ()
185
+ created , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (cl ).Execute ()
186
186
require .NoError (t , err )
187
187
cl .ClientId = created .ClientId
188
188
189
189
expected := deepcopy .Copy (cl ).(hydra.OAuth2Client )
190
190
expected .RedirectUris = append (expected .RedirectUris , value )
191
191
192
- result , _ , err := c .OAuth2Api .PatchOAuth2Client (context .Background (), * cl .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
192
+ result , _ , err := c .OAuth2API .PatchOAuth2Client (context .Background (), * cl .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
193
193
require .NoError (t , err )
194
194
expected .CreatedAt = result .CreatedAt
195
195
expected .UpdatedAt = result .UpdatedAt
@@ -204,11 +204,11 @@ func TestClientSDK(t *testing.T) {
204
204
value := "foo"
205
205
206
206
client := createTestClient ("" )
207
- created , res , err := c .OAuth2Api .CreateOAuth2Client (context .Background ()).OAuth2Client (client ).Execute ()
207
+ created , res , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (client ).Execute ()
208
208
require .NoError (t , err , "%s" , ioutilx .MustReadAll (res .Body ))
209
209
client .ClientId = created .ClientId
210
210
211
- _ , _ , err = c .OAuth2Api .PatchOAuth2Client (context .Background (), * client .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
211
+ _ , _ , err = c .OAuth2API .PatchOAuth2Client (context .Background (), * client .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
212
212
require .Error (t , err )
213
213
})
214
214
@@ -218,13 +218,13 @@ func TestClientSDK(t *testing.T) {
218
218
value := "http://foo.bar"
219
219
220
220
client := createTestClient ("" )
221
- created , _ , err := c .OAuth2Api .CreateOAuth2Client (context .Background ()).OAuth2Client (client ).Execute ()
221
+ created , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (client ).Execute ()
222
222
require .NoError (t , err )
223
223
client .ClientId = created .ClientId
224
224
225
- result1 , _ , err := c .OAuth2Api .PatchOAuth2Client (context .Background (), * client .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
225
+ result1 , _ , err := c .OAuth2API .PatchOAuth2Client (context .Background (), * client .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
226
226
require .NoError (t , err )
227
- result2 , _ , err := c .OAuth2Api .PatchOAuth2Client (context .Background (), * client .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
227
+ result2 , _ , err := c .OAuth2API .PatchOAuth2Client (context .Background (), * client .ClientId ).JsonPatch ([]hydra.JsonPatch {{Op : op , Path : path , Value : value }}).Execute ()
228
228
require .NoError (t , err )
229
229
230
230
// secret hashes shouldn't change between these PUT calls
0 commit comments