From b2907d5e09e98305bd91fbfb9339b97959371747 Mon Sep 17 00:00:00 2001 From: Henning Perl Date: Wed, 26 Feb 2025 13:48:31 +0100 Subject: [PATCH] improve test coverage --- identity/identity_test.go | 23 +++++++++++++++++++++-- 1 file changed, 21 insertions(+), 2 deletions(-) diff --git a/identity/identity_test.go b/identity/identity_test.go index 6dfe23aea6a3..c1a65a2e69e9 100644 --- a/identity/identity_test.go +++ b/identity/identity_test.go @@ -489,7 +489,7 @@ func TestMergeOIDCCredentials(t *testing.T) { }, newCredentials: Credentials{ Type: CredentialsTypeOIDC, - Identifiers: []string{"replace:new-subject"}, + Identifiers: []string{}, Config: sqlxx.JSONRawMessage(`{"providers": [{"provider": "replace", "subject": "new-subject"}]}`), }, @@ -548,7 +548,26 @@ func TestMergeOIDCCredentials(t *testing.T) { newCredentials: Credentials{ Type: CredentialsTypeOIDC, Identifiers: []string{"oidc:1234"}, - Config: sqlxx.JSONRawMessage(`{"providers": []`), + Config: sqlxx.JSONRawMessage(`{"providers": []}`), + }, + + assertErr: assert.Error, + }, + { + name: "errs if identity credentials are invalid", + identity: &Identity{ + Credentials: map[CredentialsType]Credentials{ + CredentialsTypeOIDC: { + Type: CredentialsTypeOIDC, + Identifiers: []string{"oidc:1234"}, + Config: sqlxx.JSONRawMessage("invalid"), + }, + }, + }, + newCredentials: Credentials{ + Type: CredentialsTypeOIDC, + Identifiers: []string{"oidc:1234"}, + Config: sqlxx.JSONRawMessage(`{"providers": [{"provider": "replace", "subject": "new-subject"}]}`), }, assertErr: assert.Error,