@@ -1032,20 +1032,23 @@ introspect_opaque_token_returns_401_from_auth_server(Config) ->
1032
1032
1033
1033
oauth_bootstrap_with_jwt_token_in_header (Config ) ->
1034
1034
URI = rabbit_mgmt_test_util :uri_base_from (Config , 0 , " " ) ++ " js/oidc-oauth/bootstrap.js" ,
1035
- Result = httpc :request (get , {URI , [{" Authorization" , " bearer active " }]}, [], []),
1035
+ Result = httpc :request (get , {URI , [{" Authorization" , " bearer abc.dee.fff " }]}, [], []),
1036
1036
{ok , {{_HTTP , 200 , _ }, _Headers , ResBody }} = Result ,
1037
1037
ct :log (" resbody: ~p " , [ResBody ]),
1038
- case string :find (ResBody ," set_token_auth(" ) of
1038
+ case string :find (ResBody ," set_token_auth('abc.dee.fff') " ) of
1039
1039
nomatch -> ct :fail (" expected setting token" );
1040
- Reminder ->
1041
- {match , [Token | _ ]} = re :run (Reminder , " '([^']*)'" , [{capture , [1 ], list }]),
1042
- ? assertEqual (true , oauth2_client :is_jwt_token (Token ))
1040
+ _ -> ok
1043
1041
end .
1044
1042
1045
1043
oauth_bootstrap_with_jwt_token_in_cookie (Config ) ->
1046
1044
URI = rabbit_mgmt_test_util :uri_base_from (Config , 0 , " " ) ++ " js/oidc-oauth/bootstrap.js" ,
1047
- Result = httpc :request (get , {URI , [{" Authorization" , " bearer active" }]}, [], []),
1048
- ct :log (" response idp: ~p ~p " , [URI , Result ]).
1045
+ Result = httpc :request (get , {URI , [{" cookie" , " access_token=abc.dee.fff" }]}, [], []),
1046
+ {ok , {{_HTTP , 200 , _ }, _Headers , ResBody }} = Result ,
1047
+ ct :log (" resbody: ~p " , [ResBody ]),
1048
+ case string :find (ResBody ," set_token_auth('abc.dee.fff')" ) of
1049
+ nomatch -> ct :fail (" expected setting token" );
1050
+ _ -> ok
1051
+ end .
1049
1052
1050
1053
oauth_bootstrap_with_opaque_token_in_cookie (Config ) ->
1051
1054
URI = rabbit_mgmt_test_util :uri_base_from (Config , 0 , " " ) ++ " js/oidc-oauth/bootstrap.js" ,
0 commit comments