revert: secrets as []byte instead of string
Signed-off-by: Jan Larwig <jan@larwig.com>
This commit is contained in:
		
							parent
							
								
									a646d9dea2
								
							
						
					
					
						commit
						1d73f140bf
					
				|  | @ -265,7 +265,7 @@ make up the header value | ||||||
| 
 | 
 | ||||||
| | Field | Type | Description | | | Field | Type | Description | | ||||||
| | ----- | ---- | ----------- | | | ----- | ---- | ----------- | | ||||||
| | `value` | _string_ | Value expects a base64 encoded string value. | | | `value` | _[]byte_ | Value expects a base64 encoded []byte | | ||||||
| | `fromEnv` | _string_ | FromEnv expects the name of an environment variable. | | | `fromEnv` | _string_ | FromEnv expects the name of an environment variable. | | ||||||
| | `fromFile` | _string_ | FromFile expects a path to a file containing the secret value. | | | `fromFile` | _string_ | FromFile expects a path to a file containing the secret value. | | ||||||
| | `claim` | _string_ | Claim is the name of the claim in the session that the value should be<br/>loaded from. Available claims: `access_token` `id_token` `created_at`<br/>`expires_on` `refresh_token` `email` `user` `groups` `preferred_username`. | | | `claim` | _string_ | Claim is the name of the claim in the session that the value should be<br/>loaded from. Available claims: `access_token` `id_token` `created_at`<br/>`expires_on` `refresh_token` `email` `user` `groups` `preferred_username`. | | ||||||
|  | @ -477,7 +477,7 @@ Only one source within the struct should be defined at any time. | ||||||
| 
 | 
 | ||||||
| | Field | Type | Description | | | Field | Type | Description | | ||||||
| | ----- | ---- | ----------- | | | ----- | ---- | ----------- | | ||||||
| | `value` | _string_ | Value expects a base64 encoded string value. | | | `value` | _[]byte_ | Value expects a base64 encoded []byte | | ||||||
| | `fromEnv` | _string_ | FromEnv expects the name of an environment variable. | | | `fromEnv` | _string_ | FromEnv expects the name of an environment variable. | | ||||||
| | `fromFile` | _string_ | FromFile expects a path to a file containing the secret value. | | | `fromFile` | _string_ | FromFile expects a path to a file containing the secret value. | | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -139,7 +139,7 @@ redirect_url="http://localhost:4180/oauth2/callback" | ||||||
| 						Claim:  "user", | 						Claim:  "user", | ||||||
| 						Prefix: "Basic ", | 						Prefix: "Basic ", | ||||||
| 						BasicAuthPassword: &options.SecretSource{ | 						BasicAuthPassword: &options.SecretSource{ | ||||||
| 							Value: "super-secret-password", | 							Value: []byte("super-secret-password"), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  |  | ||||||
|  | @ -215,7 +215,7 @@ func TestBasicAuthPassword(t *testing.T) { | ||||||
| 					ClaimSource: &options.ClaimSource{ | 					ClaimSource: &options.ClaimSource{ | ||||||
| 						Claim: "email", | 						Claim: "email", | ||||||
| 						BasicAuthPassword: &options.SecretSource{ | 						BasicAuthPassword: &options.SecretSource{ | ||||||
| 							Value: basicAuthPassword, | 							Value: []byte(basicAuthPassword), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  | @ -1282,7 +1282,7 @@ func TestAuthOnlyEndpointSetBasicAuthTrueRequestHeaders(t *testing.T) { | ||||||
| 					ClaimSource: &options.ClaimSource{ | 					ClaimSource: &options.ClaimSource{ | ||||||
| 						Claim: "user", | 						Claim: "user", | ||||||
| 						BasicAuthPassword: &options.SecretSource{ | 						BasicAuthPassword: &options.SecretSource{ | ||||||
| 							Value: "This is a secure password", | 							Value: []byte("This is a secure password"), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  | @ -2044,7 +2044,7 @@ func baseTestOptions() *options.Options { | ||||||
| 					ClaimSource: &options.ClaimSource{ | 					ClaimSource: &options.ClaimSource{ | ||||||
| 						Claim: "user", | 						Claim: "user", | ||||||
| 						BasicAuthPassword: &options.SecretSource{ | 						BasicAuthPassword: &options.SecretSource{ | ||||||
| 							Value: base64.StdEncoding.EncodeToString([]byte("This is a secure password")), | 							Value: []byte(base64.StdEncoding.EncodeToString([]byte("This is a secure password"))), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  |  | ||||||
|  | @ -294,7 +294,7 @@ func getBasicAuthHeader(preferEmailToUser bool, basicAuthPassword string) Header | ||||||
| 					Claim:  claim, | 					Claim:  claim, | ||||||
| 					Prefix: "Basic ", | 					Prefix: "Basic ", | ||||||
| 					BasicAuthPassword: &SecretSource{ | 					BasicAuthPassword: &SecretSource{ | ||||||
| 						Value: basicAuthPassword, | 						Value: []byte(basicAuthPassword), | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}, | ||||||
|  |  | ||||||
|  | @ -369,7 +369,7 @@ var _ = Describe("Legacy Options", func() { | ||||||
| 						Claim:  "user", | 						Claim:  "user", | ||||||
| 						Prefix: "Basic ", | 						Prefix: "Basic ", | ||||||
| 						BasicAuthPassword: &SecretSource{ | 						BasicAuthPassword: &SecretSource{ | ||||||
| 							Value: basicAuthSecret, | 							Value: []byte(basicAuthSecret), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  | @ -409,7 +409,7 @@ var _ = Describe("Legacy Options", func() { | ||||||
| 						Claim:  "email", | 						Claim:  "email", | ||||||
| 						Prefix: "Basic ", | 						Prefix: "Basic ", | ||||||
| 						BasicAuthPassword: &SecretSource{ | 						BasicAuthPassword: &SecretSource{ | ||||||
| 							Value: basicAuthSecret, | 							Value: []byte(basicAuthSecret), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  |  | ||||||
|  | @ -581,7 +581,7 @@ injectResponseHeaders: | ||||||
| 					Values: []HeaderValue{ | 					Values: []HeaderValue{ | ||||||
| 						{ | 						{ | ||||||
| 							SecretSource: &SecretSource{ | 							SecretSource: &SecretSource{ | ||||||
| 								Value: "secret", | 								Value: []byte("secret"), | ||||||
| 							}, | 							}, | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
|  |  | ||||||
|  | @ -3,8 +3,8 @@ package options | ||||||
| // SecretSource references an individual secret value.
 | // SecretSource references an individual secret value.
 | ||||||
| // Only one source within the struct should be defined at any time.
 | // Only one source within the struct should be defined at any time.
 | ||||||
| type SecretSource struct { | type SecretSource struct { | ||||||
| 	// Value expects a base64 encoded string value.
 | 	// Value expects a base64 encoded []byte
 | ||||||
| 	Value string `yaml:"value,omitempty"` | 	Value []byte `yaml:"value,omitempty"` | ||||||
| 
 | 
 | ||||||
| 	// FromEnv expects the name of an environment variable.
 | 	// FromEnv expects the name of an environment variable.
 | ||||||
| 	FromEnv string `yaml:"fromEnv,omitempty"` | 	FromEnv string `yaml:"fromEnv,omitempty"` | ||||||
|  |  | ||||||
|  | @ -11,7 +11,7 @@ import ( | ||||||
| func GetSecretValue(source *options.SecretSource) ([]byte, error) { | func GetSecretValue(source *options.SecretSource) ([]byte, error) { | ||||||
| 	switch { | 	switch { | ||||||
| 	case len(source.Value) > 0 && source.FromEnv == "" && source.FromFile == "": | 	case len(source.Value) > 0 && source.FromEnv == "" && source.FromFile == "": | ||||||
| 		return []byte(source.Value), nil | 		return source.Value, nil | ||||||
| 	case len(source.Value) == 0 && source.FromEnv != "" && source.FromFile == "": | 	case len(source.Value) == 0 && source.FromEnv != "" && source.FromFile == "": | ||||||
| 		return []byte(os.Getenv(source.FromEnv)), nil | 		return []byte(os.Getenv(source.FromEnv)), nil | ||||||
| 	case len(source.Value) == 0 && source.FromEnv == "" && source.FromFile != "": | 	case len(source.Value) == 0 && source.FromEnv == "" && source.FromFile != "": | ||||||
|  |  | ||||||
|  | @ -31,7 +31,7 @@ var _ = Describe("GetSecretValue", func() { | ||||||
| 
 | 
 | ||||||
| 	It("returns the correct value from the string value", func() { | 	It("returns the correct value from the string value", func() { | ||||||
| 		value, err := GetSecretValue(&options.SecretSource{ | 		value, err := GetSecretValue(&options.SecretSource{ | ||||||
| 			Value: "secret-value-1", | 			Value: []byte("secret-value-1"), | ||||||
| 		}) | 		}) | ||||||
| 		Expect(err).ToNot(HaveOccurred()) | 		Expect(err).ToNot(HaveOccurred()) | ||||||
| 		Expect(string(value)).To(Equal("secret-value-1")) | 		Expect(string(value)).To(Equal("secret-value-1")) | ||||||
|  |  | ||||||
|  | @ -55,7 +55,7 @@ var _ = Describe("Injector Suite", func() { | ||||||
| 						Values: []options.HeaderValue{ | 						Values: []options.HeaderValue{ | ||||||
| 							{ | 							{ | ||||||
| 								SecretSource: &options.SecretSource{ | 								SecretSource: &options.SecretSource{ | ||||||
| 									Value: "super-secret", | 									Value: []byte("super-secret"), | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
| 						}, | 						}, | ||||||
|  | @ -199,7 +199,7 @@ var _ = Describe("Injector Suite", func() { | ||||||
| 								ClaimSource: &options.ClaimSource{ | 								ClaimSource: &options.ClaimSource{ | ||||||
| 									Claim: "user", | 									Claim: "user", | ||||||
| 									BasicAuthPassword: &options.SecretSource{ | 									BasicAuthPassword: &options.SecretSource{ | ||||||
| 										Value: "basic-password", | 										Value: []byte("basic-password"), | ||||||
| 									}, | 									}, | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
|  | @ -227,7 +227,7 @@ var _ = Describe("Injector Suite", func() { | ||||||
| 								ClaimSource: &options.ClaimSource{ | 								ClaimSource: &options.ClaimSource{ | ||||||
| 									Claim: "user", | 									Claim: "user", | ||||||
| 									BasicAuthPassword: &options.SecretSource{ | 									BasicAuthPassword: &options.SecretSource{ | ||||||
| 										Value: base64.StdEncoding.EncodeToString([]byte("basic-password")), | 										Value: []byte(base64.StdEncoding.EncodeToString([]byte("basic-password"))), | ||||||
| 									}, | 									}, | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
|  | @ -322,7 +322,7 @@ var _ = Describe("Injector Suite", func() { | ||||||
| 								ClaimSource: &options.ClaimSource{ | 								ClaimSource: &options.ClaimSource{ | ||||||
| 									Claim: "user", | 									Claim: "user", | ||||||
| 									BasicAuthPassword: &options.SecretSource{ | 									BasicAuthPassword: &options.SecretSource{ | ||||||
| 										Value:   base64.StdEncoding.EncodeToString([]byte("basic-password")), | 										Value:   []byte(base64.StdEncoding.EncodeToString([]byte("basic-password"))), | ||||||
| 										FromEnv: "SECRET_ENV", | 										FromEnv: "SECRET_ENV", | ||||||
| 									}, | 									}, | ||||||
| 								}, | 								}, | ||||||
|  | @ -348,7 +348,7 @@ var _ = Describe("Injector Suite", func() { | ||||||
| 								ClaimSource: &options.ClaimSource{ | 								ClaimSource: &options.ClaimSource{ | ||||||
| 									Claim: "user", | 									Claim: "user", | ||||||
| 									BasicAuthPassword: &options.SecretSource{ | 									BasicAuthPassword: &options.SecretSource{ | ||||||
| 										Value: "basic-password", | 										Value: []byte("basic-password"), | ||||||
| 									}, | 									}, | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
|  | @ -379,17 +379,17 @@ var _ = Describe("Injector Suite", func() { | ||||||
| 						Values: []options.HeaderValue{ | 						Values: []options.HeaderValue{ | ||||||
| 							{ | 							{ | ||||||
| 								SecretSource: &options.SecretSource{ | 								SecretSource: &options.SecretSource{ | ||||||
| 									Value: "major=1", | 									Value: []byte("major=1"), | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
| 							{ | 							{ | ||||||
| 								SecretSource: &options.SecretSource{ | 								SecretSource: &options.SecretSource{ | ||||||
| 									Value: "minor=2", | 									Value: []byte("minor=2"), | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
| 							{ | 							{ | ||||||
| 								SecretSource: &options.SecretSource{ | 								SecretSource: &options.SecretSource{ | ||||||
| 									Value: "patch=3", | 									Value: []byte("patch=3"), | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
| 						}, | 						}, | ||||||
|  |  | ||||||
|  | @ -48,10 +48,10 @@ var _ = BeforeSuite(func() { | ||||||
| 
 | 
 | ||||||
| 		certOut := new(bytes.Buffer) | 		certOut := new(bytes.Buffer) | ||||||
| 		Expect(pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: certBytes})).To(Succeed()) | 		Expect(pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: certBytes})).To(Succeed()) | ||||||
| 		ipv4CertDataSource.Value = certOut.String() | 		ipv4CertDataSource.Value = certOut.Bytes() | ||||||
| 		keyOut := new(bytes.Buffer) | 		keyOut := new(bytes.Buffer) | ||||||
| 		Expect(pem.Encode(keyOut, &pem.Block{Type: "PRIVATE KEY", Bytes: keyBytes})).To(Succeed()) | 		Expect(pem.Encode(keyOut, &pem.Block{Type: "PRIVATE KEY", Bytes: keyBytes})).To(Succeed()) | ||||||
| 		ipv4KeyDataSource.Value = keyOut.String() | 		ipv4KeyDataSource.Value = keyOut.Bytes() | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	By("Generating a ipv6 self-signed cert for TLS tests", func() { | 	By("Generating a ipv6 self-signed cert for TLS tests", func() { | ||||||
|  | @ -61,16 +61,16 @@ var _ = BeforeSuite(func() { | ||||||
| 
 | 
 | ||||||
| 		certOut := new(bytes.Buffer) | 		certOut := new(bytes.Buffer) | ||||||
| 		Expect(pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: certBytes})).To(Succeed()) | 		Expect(pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: certBytes})).To(Succeed()) | ||||||
| 		ipv6CertDataSource.Value = certOut.String() | 		ipv6CertDataSource.Value = certOut.Bytes() | ||||||
| 		keyOut := new(bytes.Buffer) | 		keyOut := new(bytes.Buffer) | ||||||
| 		Expect(pem.Encode(keyOut, &pem.Block{Type: "PRIVATE KEY", Bytes: keyBytes})).To(Succeed()) | 		Expect(pem.Encode(keyOut, &pem.Block{Type: "PRIVATE KEY", Bytes: keyBytes})).To(Succeed()) | ||||||
| 		ipv6KeyDataSource.Value = keyOut.String() | 		ipv6KeyDataSource.Value = keyOut.Bytes() | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	By("Setting up a http client", func() { | 	By("Setting up a http client", func() { | ||||||
| 		ipv4cert, err := tls.X509KeyPair([]byte(ipv4CertDataSource.Value), []byte(ipv4KeyDataSource.Value)) | 		ipv4cert, err := tls.X509KeyPair(ipv4CertDataSource.Value, ipv4KeyDataSource.Value) | ||||||
| 		Expect(err).ToNot(HaveOccurred()) | 		Expect(err).ToNot(HaveOccurred()) | ||||||
| 		ipv6cert, err := tls.X509KeyPair([]byte(ipv6CertDataSource.Value), []byte(ipv6KeyDataSource.Value)) | 		ipv6cert, err := tls.X509KeyPair(ipv6CertDataSource.Value, ipv6KeyDataSource.Value) | ||||||
| 		Expect(err).ToNot(HaveOccurred()) | 		Expect(err).ToNot(HaveOccurred()) | ||||||
| 
 | 
 | ||||||
| 		ipv4certificate, err := x509.ParseCertificate(ipv4cert.Certificate[0]) | 		ipv4certificate, err := x509.ParseCertificate(ipv4cert.Certificate[0]) | ||||||
|  |  | ||||||
|  | @ -234,7 +234,7 @@ var _ = Describe("Server", func() { | ||||||
| 					SecureBindAddress: "127.0.0.1:0", | 					SecureBindAddress: "127.0.0.1:0", | ||||||
| 					TLS: &options.TLS{ | 					TLS: &options.TLS{ | ||||||
| 						Key: &options.SecretSource{ | 						Key: &options.SecretSource{ | ||||||
| 							Value: "invalid", | 							Value: []byte("invalid"), | ||||||
| 						}, | 						}, | ||||||
| 						Cert: &ipv4CertDataSource, | 						Cert: &ipv4CertDataSource, | ||||||
| 					}, | 					}, | ||||||
|  | @ -250,7 +250,7 @@ var _ = Describe("Server", func() { | ||||||
| 					TLS: &options.TLS{ | 					TLS: &options.TLS{ | ||||||
| 						Key: &ipv4KeyDataSource, | 						Key: &ipv4KeyDataSource, | ||||||
| 						Cert: &options.SecretSource{ | 						Cert: &options.SecretSource{ | ||||||
| 							Value: "invalid", | 							Value: []byte("invalid"), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  | @ -506,7 +506,7 @@ var _ = Describe("Server", func() { | ||||||
| 					SecureBindAddress: "[::1]:0", | 					SecureBindAddress: "[::1]:0", | ||||||
| 					TLS: &options.TLS{ | 					TLS: &options.TLS{ | ||||||
| 						Key: &options.SecretSource{ | 						Key: &options.SecretSource{ | ||||||
| 							Value: "invalid", | 							Value: []byte("invalid"), | ||||||
| 						}, | 						}, | ||||||
| 						Cert: &ipv6CertDataSource, | 						Cert: &ipv6CertDataSource, | ||||||
| 					}, | 					}, | ||||||
|  | @ -523,7 +523,7 @@ var _ = Describe("Server", func() { | ||||||
| 					TLS: &options.TLS{ | 					TLS: &options.TLS{ | ||||||
| 						Key: &ipv6KeyDataSource, | 						Key: &ipv6KeyDataSource, | ||||||
| 						Cert: &options.SecretSource{ | 						Cert: &options.SecretSource{ | ||||||
| 							Value: "invalid", | 							Value: []byte("invalid"), | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
|  |  | ||||||
|  | @ -188,7 +188,7 @@ var _ = Describe("Headers Suite", func() { | ||||||
| 							ClaimSource: &options.ClaimSource{ | 							ClaimSource: &options.ClaimSource{ | ||||||
| 								Claim: "user", | 								Claim: "user", | ||||||
| 								BasicAuthPassword: &options.SecretSource{ | 								BasicAuthPassword: &options.SecretSource{ | ||||||
| 									Value:   base64.StdEncoding.EncodeToString([]byte("basic-password")), | 									Value:   []byte(base64.StdEncoding.EncodeToString([]byte("basic-password"))), | ||||||
| 									FromEnv: "SECRET_ENV", | 									FromEnv: "SECRET_ENV", | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
|  | @ -260,7 +260,7 @@ var _ = Describe("Headers Suite", func() { | ||||||
| 					Values: []options.HeaderValue{ | 					Values: []options.HeaderValue{ | ||||||
| 						{ | 						{ | ||||||
| 							SecretSource: &options.SecretSource{ | 							SecretSource: &options.SecretSource{ | ||||||
| 								Value: "_oauth2_proxy=ey123123123", | 								Value: []byte("_oauth2_proxy=ey123123123"), | ||||||
| 							}, | 							}, | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
|  | @ -270,7 +270,7 @@ var _ = Describe("Headers Suite", func() { | ||||||
| 					Values: []options.HeaderValue{ | 					Values: []options.HeaderValue{ | ||||||
| 						{ | 						{ | ||||||
| 							SecretSource: &options.SecretSource{ | 							SecretSource: &options.SecretSource{ | ||||||
| 								Value: "oauth_user", | 								Value: []byte("oauth_user"), | ||||||
| 							}, | 							}, | ||||||
| 						}, | 						}, | ||||||
| 					}, | 					}, | ||||||
|  | @ -416,7 +416,7 @@ var _ = Describe("Headers Suite", func() { | ||||||
| 							ClaimSource: &options.ClaimSource{ | 							ClaimSource: &options.ClaimSource{ | ||||||
| 								Claim: "user", | 								Claim: "user", | ||||||
| 								BasicAuthPassword: &options.SecretSource{ | 								BasicAuthPassword: &options.SecretSource{ | ||||||
| 									Value:   base64.StdEncoding.EncodeToString([]byte("basic-password")), | 									Value:   []byte(base64.StdEncoding.EncodeToString([]byte("basic-password"))), | ||||||
| 									FromEnv: "SECRET_ENV", | 									FromEnv: "SECRET_ENV", | ||||||
| 								}, | 								}, | ||||||
| 							}, | 							}, | ||||||
|  |  | ||||||
|  | @ -9,12 +9,12 @@ import ( | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| var _ = Describe("Common", func() { | var _ = Describe("Common", func() { | ||||||
| 	var validSecretSourceValue string | 	var validSecretSourceValue []byte | ||||||
| 	const validSecretSourceEnv = "OAUTH2_PROXY_TEST_SECRET_SOURCE_ENV" | 	const validSecretSourceEnv = "OAUTH2_PROXY_TEST_SECRET_SOURCE_ENV" | ||||||
| 	var validSecretSourceFile string | 	var validSecretSourceFile string | ||||||
| 
 | 
 | ||||||
| 	BeforeEach(func() { | 	BeforeEach(func() { | ||||||
| 		validSecretSourceValue = "This is a secret source value" | 		validSecretSourceValue = []byte("This is a secret source value") | ||||||
| 		Expect(os.Setenv(validSecretSourceEnv, "This is a secret source env")).To(Succeed()) | 		Expect(os.Setenv(validSecretSourceEnv, "This is a secret source env")).To(Succeed()) | ||||||
| 		tmp, err := os.CreateTemp("", "oauth2-proxy-secret-source-test") | 		tmp, err := os.CreateTemp("", "oauth2-proxy-secret-source-test") | ||||||
| 		Expect(err).ToNot(HaveOccurred()) | 		Expect(err).ToNot(HaveOccurred()) | ||||||
|  |  | ||||||
|  | @ -51,9 +51,11 @@ func validateHeaderValue(_ string, value options.HeaderValue) []string { | ||||||
| 
 | 
 | ||||||
| func validateHeaderValueClaimSource(claim options.ClaimSource) []string { | func validateHeaderValueClaimSource(claim options.ClaimSource) []string { | ||||||
| 	msgs := []string{} | 	msgs := []string{} | ||||||
|  | 
 | ||||||
| 	if claim.Claim == "" { | 	if claim.Claim == "" { | ||||||
| 		msgs = append(msgs, "claim should not be empty") | 		msgs = append(msgs, "claim should not be empty") | ||||||
| 	} | 	} | ||||||
|  | 
 | ||||||
| 	if claim.BasicAuthPassword != nil { | 	if claim.BasicAuthPassword != nil { | ||||||
| 		msgs = append(msgs, prefixValues("invalid basicAuthPassword: ", validateSecretSource(*claim.BasicAuthPassword))...) | 		msgs = append(msgs, prefixValues("invalid basicAuthPassword: ", validateSecretSource(*claim.BasicAuthPassword))...) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | @ -30,7 +30,7 @@ var _ = Describe("Headers", func() { | ||||||
| 		Values: []options.HeaderValue{ | 		Values: []options.HeaderValue{ | ||||||
| 			{ | 			{ | ||||||
| 				SecretSource: &options.SecretSource{ | 				SecretSource: &options.SecretSource{ | ||||||
| 					Value: base64.StdEncoding.EncodeToString([]byte("secret")), | 					Value: []byte(base64.StdEncoding.EncodeToString([]byte("secret"))), | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}, | ||||||
| 		}, | 		}, | ||||||
|  | @ -43,7 +43,7 @@ var _ = Describe("Headers", func() { | ||||||
| 				ClaimSource: &options.ClaimSource{ | 				ClaimSource: &options.ClaimSource{ | ||||||
| 					Claim: "email", | 					Claim: "email", | ||||||
| 					BasicAuthPassword: &options.SecretSource{ | 					BasicAuthPassword: &options.SecretSource{ | ||||||
| 						Value: base64.StdEncoding.EncodeToString([]byte("secret")), | 						Value: []byte(base64.StdEncoding.EncodeToString([]byte("secret"))), | ||||||
| 					}, | 					}, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}, | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue