@@ -154,9 +154,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
154
154
setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
155
155
code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
156
156
require .NoError (t , err )
157
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
158
+ require .NoError (t , err )
157
159
areq .Form .Add ("device_code" , code )
158
160
159
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
161
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
160
162
},
161
163
expectErr : fosite .ErrAuthorizationPending ,
162
164
},
@@ -192,9 +194,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
192
194
setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
193
195
code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
194
196
require .NoError (t , err )
197
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
198
+ require .NoError (t , err )
195
199
areq .Form .Add ("device_code" , code )
196
200
197
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
201
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
198
202
},
199
203
expectErr : fosite .ErrDeviceExpiredToken ,
200
204
},
@@ -227,9 +231,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
227
231
setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
228
232
token , signature , err := strategy .GenerateDeviceCode (context .TODO ())
229
233
require .NoError (t , err )
234
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
235
+ require .NoError (t , err )
230
236
areq .Form = url.Values {"device_code" : {token }}
231
237
232
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
238
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
233
239
},
234
240
expectErr : fosite .ErrInvalidGrant ,
235
241
},
@@ -263,9 +269,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
263
269
setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
264
270
token , signature , err := strategy .GenerateDeviceCode (context .TODO ())
265
271
require .NoError (t , err )
272
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
273
+ require .NoError (t , err )
266
274
267
275
areq .Form = url.Values {"device_code" : {token }}
268
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
276
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
269
277
},
270
278
},
271
279
}
@@ -342,9 +350,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest_RateLimiting(t *testing.T) {
342
350
343
351
token , signature , err := strategy .GenerateDeviceCode (context .TODO ())
344
352
require .NoError (t , err )
353
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
354
+ require .NoError (t , err )
345
355
346
356
areq .Form = url.Values {"device_code" : {token }}
347
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
357
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
348
358
err = h .HandleTokenEndpointRequest (context .Background (), areq )
349
359
require .NoError (t , err , "%+v" , err )
350
360
err = h .HandleTokenEndpointRequest (context .Background (), areq )
@@ -441,9 +451,11 @@ func TestDeviceUserCode_PopulateTokenEndpointResponse(t *testing.T) {
441
451
setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest , _ * fosite.Config ) {
442
452
code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
443
453
require .NoError (t , err )
454
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
455
+ require .NoError (t , err )
444
456
areq .Form .Add ("device_code" , code )
445
457
446
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
458
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
447
459
},
448
460
check : func (t * testing.T , aresp * fosite.AccessResponse ) {
449
461
assert .NotEmpty (t , aresp .AccessToken )
@@ -483,9 +495,11 @@ func TestDeviceUserCode_PopulateTokenEndpointResponse(t *testing.T) {
483
495
config .RefreshTokenScopes = []string {}
484
496
code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
485
497
require .NoError (t , err )
498
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
499
+ require .NoError (t , err )
486
500
areq .Form .Add ("device_code" , code )
487
501
488
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
502
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
489
503
},
490
504
check : func (t * testing.T , aresp * fosite.AccessResponse ) {
491
505
assert .NotEmpty (t , aresp .AccessToken )
@@ -524,9 +538,11 @@ func TestDeviceUserCode_PopulateTokenEndpointResponse(t *testing.T) {
524
538
setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest , config * fosite.Config ) {
525
539
code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
526
540
require .NoError (t , err )
541
+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
542
+ require .NoError (t , err )
527
543
areq .Form .Add ("device_code" , code )
528
544
529
- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
545
+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
530
546
},
531
547
check : func (t * testing.T , aresp * fosite.AccessResponse ) {
532
548
assert .NotEmpty (t , aresp .AccessToken )
0 commit comments