summaryrefslogtreecommitdiffstats
path: root/pkg/oauthflow/pkce_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/oauthflow/pkce_test.go')
-rw-r--r--pkg/oauthflow/pkce_test.go61
1 files changed, 61 insertions, 0 deletions
diff --git a/pkg/oauthflow/pkce_test.go b/pkg/oauthflow/pkce_test.go
new file mode 100644
index 0000000..4872b78
--- /dev/null
+++ b/pkg/oauthflow/pkce_test.go
@@ -0,0 +1,61 @@
+//
+// Copyright 2021 The Sigstore Authors.
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package oauthflow
+
+import (
+ "context"
+ "fmt"
+ "testing"
+
+ "github.com/coreos/go-oidc/v3/oidc"
+)
+
+func TestProviderIsAzureBacked(t *testing.T) {
+ actualAzureProviders := []string{
+ "https://login.microsoftonline.com/6babcaad-604b-40ac-a9d7-9fd97c0b779f/v2.0",
+ }
+
+ notAzureProviders := []string{
+ "https://accounts.google.com",
+ "https://login.salesforce.com",
+ }
+ for _, tc := range actualAzureProviders {
+ t.Run(fmt.Sprintf("testing azure provider %v", tc), func(t *testing.T) {
+ p, err := oidc.NewProvider(context.Background(), tc)
+ if err != nil {
+ t.Error(err)
+ }
+ if !providerIsAzureBacked(p) {
+ t.Errorf("valid azure provider URL %v was not detected as being azure backed", tc)
+ }
+ })
+ }
+ for _, tc := range notAzureProviders {
+ t.Run(fmt.Sprintf("testing invalid azure provider %v", tc), func(t *testing.T) {
+ p, err := oidc.NewProvider(context.Background(), tc)
+ if err != nil {
+ t.Error(err)
+ }
+ if providerIsAzureBacked(p) {
+ t.Errorf("invalid azure provider URL %v was detected as being azure backed", tc)
+ }
+ })
+ }
+
+ if providerIsAzureBacked(nil) != false {
+ t.Errorf("nil provider should not return true for being Azure-backed")
+ }
+}