@@ -344,17 +344,96 @@ func TestAuthenticateFailure(t *testing.T) {
344
344
CreateToken : & ssooidc.CreateTokenOutput {},
345
345
Error : fmt .Errorf ("some error" ),
346
346
},
347
+ // fourth test
348
+ {
349
+ RegisterClient : & ssooidc.RegisterClientOutput {
350
+ AuthorizationEndpoint : nil ,
351
+ ClientId : aws .String ("this-is-my-client-id" ),
352
+ ClientSecret : aws .String ("this-is-my-client-secret" ),
353
+ ClientIdIssuedAt : time .Now ().Unix (),
354
+ ClientSecretExpiresAt : int64 (expires ),
355
+ TokenEndpoint : nil ,
356
+ },
357
+ Error : nil ,
358
+ },
359
+ {
360
+ StartDeviceAuthorization : & ssooidc.StartDeviceAuthorizationOutput {
361
+ DeviceCode : aws .String ("device-code" ),
362
+ UserCode : aws .String ("user-code" ),
363
+ VerificationUri : aws .String ("" ),
364
+ VerificationUriComplete : aws .String ("verification-uri-complete" ),
365
+ ExpiresIn : int32 (expires ),
366
+ Interval : 5 ,
367
+ },
368
+ Error : nil ,
369
+ },
370
+ // fifth test
371
+ {
372
+ RegisterClient : & ssooidc.RegisterClientOutput {
373
+ AuthorizationEndpoint : nil ,
374
+ ClientId : aws .String ("this-is-my-client-id" ),
375
+ ClientSecret : aws .String ("this-is-my-client-secret" ),
376
+ ClientIdIssuedAt : time .Now ().Unix (),
377
+ ClientSecretExpiresAt : int64 (expires ),
378
+ TokenEndpoint : nil ,
379
+ },
380
+ Error : nil ,
381
+ },
382
+ {
383
+ StartDeviceAuthorization : & ssooidc.StartDeviceAuthorizationOutput {
384
+ DeviceCode : aws .String ("device-code" ),
385
+ UserCode : aws .String ("user-code" ),
386
+ VerificationUri : aws .String ("verification-uri" ),
387
+ VerificationUriComplete : aws .String ("verification-uri-complete" ),
388
+ ExpiresIn : int32 (expires ),
389
+ Interval : 5 ,
390
+ },
391
+ Error : nil ,
392
+ },
393
+ // sixth test
394
+ {
395
+ RegisterClient : & ssooidc.RegisterClientOutput {
396
+ AuthorizationEndpoint : nil ,
397
+ ClientId : aws .String ("this-is-my-client-id" ),
398
+ ClientSecret : aws .String ("this-is-my-client-secret" ),
399
+ ClientIdIssuedAt : time .Now ().Unix (),
400
+ ClientSecretExpiresAt : int64 (expires ),
401
+ TokenEndpoint : nil ,
402
+ },
403
+ Error : nil ,
404
+ },
405
+ {
406
+ StartDeviceAuthorization : & ssooidc.StartDeviceAuthorizationOutput {
407
+ DeviceCode : aws .String ("device-code" ),
408
+ UserCode : aws .String ("user-code" ),
409
+ VerificationUri : aws .String ("verification-uri" ),
410
+ VerificationUriComplete : aws .String ("verification-uri-complete" ),
411
+ ExpiresIn : int32 (expires ),
412
+ Interval : 5 ,
413
+ },
414
+ Error : nil ,
415
+ },
347
416
},
348
417
}
349
418
350
419
err = as .Authenticate ("print" , "fake-browser" )
351
- assert .Contains (t , err .Error (), "some error" )
420
+ assert .Contains (t , err .Error (), "Unable to register client with AWS SSO" )
421
+
422
+ err = as .Authenticate ("print" , "fake-browser" )
423
+ assert .Contains (t , err .Error (), "Unable to start device authorization" )
424
+
425
+ err = as .Authenticate ("print" , "fake-browser" )
426
+ assert .Contains (t , err .Error (), "createToken:" )
352
427
353
428
err = as .Authenticate ("print" , "fake-browser" )
354
- assert .Contains (t , err .Error (), "some error" )
429
+ assert .Contains (t , err .Error (), "No valid verification url" )
430
+
431
+ err = as .Authenticate ("invalid" , "fake-browser" )
432
+ assert .Contains (t , err .Error (), "Unsupported Open action" )
355
433
434
+ as .SSOConfig .AuthUrlAction = "invalid"
356
435
err = as .Authenticate ("print" , "fake-browser" )
357
- assert .Contains (t , err .Error (), "some error " )
436
+ assert .Contains (t , err .Error (), "Unsupported Open action " )
358
437
}
359
438
360
439
func TestReauthenticate (t * testing.T ) {
0 commit comments