43
43
"host.docker.internal:9443" : "localhost:9443" , // Keycloak
44
44
"host.docker.internal:8443" : "localhost:8443" , // Target application
45
45
}
46
+
47
+ okPayload = "Request served by http-echo"
46
48
)
47
49
48
50
func TestOIDC (t * testing.T ) {
@@ -69,7 +71,7 @@ func TestOIDC(t *testing.T) {
69
71
body , err := io .ReadAll (res .Body )
70
72
require .NoError (t , err )
71
73
require .Equal (t , http .StatusOK , res .StatusCode )
72
- require .Contains (t , string (body ), "Access allowed" )
74
+ require .Contains (t , string (body ), okPayload )
73
75
}
74
76
75
77
func TestOIDCRefreshTokens (t * testing.T ) {
@@ -96,7 +98,7 @@ func TestOIDCRefreshTokens(t *testing.T) {
96
98
body , err := io .ReadAll (res .Body )
97
99
require .NoError (t , err )
98
100
require .Equal (t , http .StatusOK , res .StatusCode )
99
- require .Contains (t , string (body ), "Access allowed" )
101
+ require .Contains (t , string (body ), okPayload )
100
102
101
103
// Access tokens should expire in 10 seconds (tried with 5, but keycloak setup fails)
102
104
// Let's perform a request now and after 10 seconds to verify that the access token is refreshed
@@ -108,7 +110,7 @@ func TestOIDCRefreshTokens(t *testing.T) {
108
110
body , err = io .ReadAll (res .Body )
109
111
require .NoError (t , err )
110
112
require .Equal (t , http .StatusOK , res .StatusCode )
111
- require .Contains (t , string (body ), "Access allowed" )
113
+ require .Contains (t , string (body ), okPayload )
112
114
})
113
115
114
116
t .Log ("waiting for access token to expire..." )
@@ -121,7 +123,7 @@ func TestOIDCRefreshTokens(t *testing.T) {
121
123
body , err = io .ReadAll (res .Body )
122
124
require .NoError (t , err )
123
125
require .Equal (t , http .StatusOK , res .StatusCode )
124
- require .Contains (t , string (body ), "Access allowed" )
126
+ require .Contains (t , string (body ), okPayload )
125
127
})
126
128
}
127
129
@@ -151,7 +153,7 @@ func TestOIDCLogout(t *testing.T) {
151
153
body , err := io .ReadAll (res .Body )
152
154
require .NoError (t , err )
153
155
require .Equal (t , http .StatusOK , res .StatusCode )
154
- require .Contains (t , string (body ), "Access allowed" )
156
+ require .Contains (t , string (body ), okPayload )
155
157
})
156
158
157
159
t .Run ("second request works without login redirect" , func (t * testing.T ) {
@@ -162,7 +164,7 @@ func TestOIDCLogout(t *testing.T) {
162
164
body , err := io .ReadAll (res .Body )
163
165
require .NoError (t , err )
164
166
require .Equal (t , http .StatusOK , res .StatusCode )
165
- require .Contains (t , string (body ), "Access allowed" )
167
+ require .Contains (t , string (body ), okPayload )
166
168
})
167
169
168
170
t .Run ("logout" , func (t * testing.T ) {
@@ -200,6 +202,6 @@ func TestOIDCLogout(t *testing.T) {
200
202
body , err := io .ReadAll (res .Body )
201
203
require .NoError (t , err )
202
204
require .Equal (t , http .StatusOK , res .StatusCode )
203
- require .Contains (t , string (body ), "Access allowed" )
205
+ require .Contains (t , string (body ), okPayload )
204
206
})
205
207
}
0 commit comments