forked from hashicorp/go-azure-sdk
-
Notifications
You must be signed in to change notification settings - Fork 0
/
oidc_authorizer_test.go
81 lines (64 loc) · 1.84 KB
/
oidc_authorizer_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package auth_test
import (
"context"
"testing"
"github.com/hashicorp/go-azure-sdk/sdk/auth"
"github.com/hashicorp/go-azure-sdk/sdk/environments"
"github.com/hashicorp/go-azure-sdk/sdk/internal/test"
)
func TestOIDCAuthorizer(t *testing.T) {
ctx := context.Background()
env := environments.AzurePublic()
auth.Client = &test.AzureADAccessTokenMockClient{
Authorization: *env.Authorization,
}
opts := auth.OIDCAuthorizerOptions{
Environment: *env,
Api: env.MicrosoftGraph,
TenantId: "00000000-1111-0000-0000-000000000000",
AuxiliaryTenantIds: test.AuxiliaryTenantIds,
ClientId: "11111111-0000-0000-0000-000000000000",
FederatedAssertion: test.DummyIDToken,
}
authorizer, err := auth.NewOIDCAuthorizer(ctx, opts)
if err != nil {
t.Fatalf("NewOIDCAuthorizer(): %v", err)
}
if authorizer == nil {
t.Fatal("authorizer is nil, expected Authorizer")
}
if _, err = testObtainAccessToken(ctx, authorizer); err != nil {
t.Fatal(err)
}
}
func TestAccOIDCAuthorizer(t *testing.T) {
test.AccTest(t)
if test.IdToken == "" {
t.Skip("test.IdToken was empty")
}
ctx := context.Background()
env, err := environments.FromName(test.Environment)
if err != nil {
t.Fatal(err)
}
opts := auth.OIDCAuthorizerOptions{
Environment: *env,
Api: env.MicrosoftGraph,
TenantId: test.TenantId,
AuxiliaryTenantIds: test.AuxiliaryTenantIds,
ClientId: test.ClientId,
FederatedAssertion: test.IdToken,
}
authorizer, err := auth.NewOIDCAuthorizer(ctx, opts)
if err != nil {
t.Fatalf("NewOIDCAuthorizer(): %v", err)
}
if authorizer == nil {
t.Fatal("authorizer is nil, expected Authorizer")
}
if _, err = testObtainAccessToken(ctx, authorizer); err != nil {
t.Fatal(err)
}
}