feat(oidc): client_secret_jwt authentication
This adds the authentication machinery for the client_secret_jwt Default Client Authentication Strategy. Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>fix-pkce-flow
parent
7cf907b23d
commit
a34b1412ed
|
@ -1884,11 +1884,11 @@ func TestValidateOIDCClients(t *testing.T) {
|
||||||
"ShouldRaiseErrorOnInvalidTokenAuthAlgClientTypeConfidential",
|
"ShouldRaiseErrorOnInvalidTokenAuthAlgClientTypeConfidential",
|
||||||
func(have *schema.OpenIDConnectConfiguration) {
|
func(have *schema.OpenIDConnectConfiguration) {
|
||||||
have.Clients[0].TokenEndpointAuthMethod = oidc.ClientAuthMethodClientSecretJWT
|
have.Clients[0].TokenEndpointAuthMethod = oidc.ClientAuthMethodClientSecretJWT
|
||||||
have.Clients[0].TokenEndpointAuthSigningAlg = "abcinvalid"
|
have.Clients[0].TokenEndpointAuthSigningAlg = "abc"
|
||||||
have.Clients[0].Secret = MustDecodeSecret("$plaintext$abc123")
|
have.Clients[0].Secret = MustDecodeSecret("$plaintext$abc123")
|
||||||
},
|
},
|
||||||
func(t *testing.T, have *schema.OpenIDConnectConfiguration) {
|
func(t *testing.T, have *schema.OpenIDConnectConfiguration) {
|
||||||
assert.Equal(t, "abcinvalid", have.Clients[0].TokenEndpointAuthSigningAlg)
|
assert.Equal(t, "abc", have.Clients[0].TokenEndpointAuthSigningAlg)
|
||||||
},
|
},
|
||||||
tcv{
|
tcv{
|
||||||
nil,
|
nil,
|
||||||
|
|
Loading…
Reference in New Issue