@@ -142,7 +142,6 @@ func (s *AuthSuite) SetupTest() {
142142 auth , err := NewAuthenticator (AuthNConfig {
143143 Issuer : s .server .URL ,
144144 Audience : "test" ,
145- Clients : []string {"client1" , "client2" , "client3" },
146145 }, nil )
147146
148147 s .Require ().NoError (err )
@@ -254,69 +253,6 @@ func (s *AuthSuite) Test_CheckToken_When_Audience_Invalid_Expect_Error() {
254253 s .Equal ("\" aud\" not satisfied" , err .Error ())
255254}
256255
257- func (s * AuthSuite ) Test_CheckToken_When_ClientID_Missing_Expect_Error () {
258- tok := jwt .New ()
259- s .Require ().NoError (tok .Set (jwt .ExpirationKey , time .Now ().Add (time .Hour )))
260- s .Require ().NoError (tok .Set ("iss" , s .server .URL ))
261- s .Require ().NoError (tok .Set ("aud" , "test" ))
262- signedTok , err := jwt .Sign (tok , jwt .WithKey (jwa .RS256 , s .key ))
263-
264- s .NotNil (signedTok )
265- s .Require ().NoError (err )
266-
267- _ , _ , err = s .auth .checkToken (context .Background (), []string {fmt .Sprintf ("Bearer %s" , string (signedTok ))}, dpopInfo {})
268- s .Require ().Error (err )
269- s .Equal ("client id required" , err .Error ())
270- }
271-
272- func (s * AuthSuite ) Test_CheckToken_When_ClientID_Invalid_Expect_Error () {
273- tok := jwt .New ()
274- s .Require ().NoError (tok .Set (jwt .ExpirationKey , time .Now ().Add (time .Hour )))
275- s .Require ().NoError (tok .Set ("iss" , s .server .URL ))
276- s .Require ().NoError (tok .Set ("aud" , "test" ))
277- s .Require ().NoError (tok .Set ("client_id" , "invalid" ))
278- signedTok , err := jwt .Sign (tok , jwt .WithKey (jwa .RS256 , s .key ))
279-
280- s .NotNil (signedTok )
281- s .Require ().NoError (err )
282-
283- _ , _ , err = s .auth .checkToken (context .Background (), []string {fmt .Sprintf ("Bearer %s" , string (signedTok ))}, dpopInfo {})
284- s .Require ().Error (err )
285- s .Equal ("invalid client id" , err .Error ())
286- }
287-
288- func (s * AuthSuite ) Test_CheckToken_When_CID_Invalid_Expect_Error () {
289- tok := jwt .New ()
290- s .Require ().NoError (tok .Set (jwt .ExpirationKey , time .Now ().Add (time .Hour )))
291- s .Require ().NoError (tok .Set ("iss" , s .server .URL ))
292- s .Require ().NoError (tok .Set ("aud" , "test" ))
293- s .Require ().NoError (tok .Set ("cid" , "invalid" ))
294- signedTok , err := jwt .Sign (tok , jwt .WithKey (jwa .RS256 , s .key ))
295-
296- s .NotNil (signedTok )
297- s .Require ().NoError (err )
298-
299- _ , _ , err = s .auth .checkToken (context .Background (), []string {fmt .Sprintf ("Bearer %s" , string (signedTok ))}, dpopInfo {})
300- s .Require ().Error (err )
301- s .Equal ("invalid client id" , err .Error ())
302- }
303-
304- func (s * AuthSuite ) Test_CheckToken_When_CID_Invalid_INT_Expect_Error () {
305- tok := jwt .New ()
306- s .Require ().NoError (tok .Set (jwt .ExpirationKey , time .Now ().Add (time .Hour )))
307- s .Require ().NoError (tok .Set ("iss" , s .server .URL ))
308- s .Require ().NoError (tok .Set ("aud" , "test" ))
309- s .Require ().NoError (tok .Set ("cid" , 1 ))
310- signedTok , err := jwt .Sign (tok , jwt .WithKey (jwa .RS256 , s .key ))
311-
312- s .NotNil (signedTok )
313- s .Require ().NoError (err )
314-
315- _ , _ , err = s .auth .checkToken (context .Background (), []string {fmt .Sprintf ("Bearer %s" , string (signedTok ))}, dpopInfo {})
316- s .Require ().Error (err )
317- s .Equal ("invalid client id" , err .Error ())
318- }
319-
320256func (s * AuthSuite ) Test_CheckToken_When_Valid_No_DPoP_Expect_Error () {
321257 tok := jwt .New ()
322258 s .Require ().NoError (tok .Set (jwt .ExpirationKey , time .Now ().Add (time .Hour )))
0 commit comments