Merge branch 'master' into ap-gh-pagination-with-lastpage
This commit is contained in:
commit
535f6b8e63
|
|
@ -5,6 +5,8 @@
|
||||||
- [#227](https://github.com/pusher/oauth2_proxy/pull/227) Add Keycloak provider (@Ofinka)
|
- [#227](https://github.com/pusher/oauth2_proxy/pull/227) Add Keycloak provider (@Ofinka)
|
||||||
- [#273](https://github.com/pusher/oauth2_proxy/pull/273) Support Go 1.13 (@dio)
|
- [#273](https://github.com/pusher/oauth2_proxy/pull/273) Support Go 1.13 (@dio)
|
||||||
- [#275](https://github.com/pusher/oauth2_proxy/pull/275) docker: build from debian buster (@syscll)
|
- [#275](https://github.com/pusher/oauth2_proxy/pull/275) docker: build from debian buster (@syscll)
|
||||||
|
- [#258](https://github.com/pusher/oauth2_proxy/pull/258) Add IDToken for Azure provider
|
||||||
|
- This PR adds the IDToken into the session for the Azure provider allowing requests to a backend to be identified as a specific user. As a consequence, if you are using a cookie to store the session the cookie will now exceed the 4kb size limit and be split into multiple cookies. This can cause problems when using nginx as a proxy, resulting in no cookie being passed at all. Either increase the proxy_buffer_size in nginx or implement the redis session storage (see https://pusher.github.io/oauth2_proxy/configuration#redis-storage)
|
||||||
- [#274](https://github.com/pusher/oauth2_proxy/pull/274) Supports many github teams with api pagination support (@toshi-miura, @apratina)
|
- [#274](https://github.com/pusher/oauth2_proxy/pull/274) Supports many github teams with api pagination support (@toshi-miura, @apratina)
|
||||||
|
|
||||||
# v4.0.0
|
# v4.0.0
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,10 @@
|
||||||
# oauth2_proxy
|
# oauth2_proxy
|
||||||
|
|
||||||
|
[](http://travis-ci.org/pusher/oauth2_proxy)
|
||||||
|
[](https://goreportcard.com/report/github.com/pusher/oauth2_proxy)
|
||||||
|
[](https://godoc.org/github.com/pusher/oauth2_proxy)
|
||||||
|
[](./LICENSE)
|
||||||
|
|
||||||
A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others)
|
A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others)
|
||||||
to validate accounts by email, domain or group.
|
to validate accounts by email, domain or group.
|
||||||
|
|
||||||
|
|
@ -7,8 +12,6 @@ to validate accounts by email, domain or group.
|
||||||
Versions v3.0.0 and up are from this fork and will have diverged from any changes in the original fork.
|
Versions v3.0.0 and up are from this fork and will have diverged from any changes in the original fork.
|
||||||
A list of changes can be seen in the [CHANGELOG](CHANGELOG.md).
|
A list of changes can be seen in the [CHANGELOG](CHANGELOG.md).
|
||||||
|
|
||||||
[](http://travis-ci.org/pusher/oauth2_proxy)
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
|
||||||
|
|
@ -81,6 +81,8 @@ Note: The user is checked against the group members list on initial authenticati
|
||||||
--client-secret=<value from step 6>
|
--client-secret=<value from step 6>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](configuration#redis-storage) should resolve this.
|
||||||
|
|
||||||
### Facebook Auth Provider
|
### Facebook Auth Provider
|
||||||
|
|
||||||
1. Create a new FB App from <https://developers.facebook.com/>
|
1. Create a new FB App from <https://developers.facebook.com/>
|
||||||
|
|
|
||||||
|
|
@ -1,10 +1,14 @@
|
||||||
package providers
|
package providers
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/bitly/go-simplejson"
|
"github.com/bitly/go-simplejson"
|
||||||
"github.com/pusher/oauth2_proxy/pkg/apis/sessions"
|
"github.com/pusher/oauth2_proxy/pkg/apis/sessions"
|
||||||
|
|
@ -65,6 +69,67 @@ func (p *AzureProvider) Configure(tenant string) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *AzureProvider) Redeem(redirectURL, code string) (s *sessions.SessionState, err error) {
|
||||||
|
if code == "" {
|
||||||
|
err = errors.New("missing code")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
params := url.Values{}
|
||||||
|
params.Add("redirect_uri", redirectURL)
|
||||||
|
params.Add("client_id", p.ClientID)
|
||||||
|
params.Add("client_secret", p.ClientSecret)
|
||||||
|
params.Add("code", code)
|
||||||
|
params.Add("grant_type", "authorization_code")
|
||||||
|
if p.ProtectedResource != nil && p.ProtectedResource.String() != "" {
|
||||||
|
params.Add("resource", p.ProtectedResource.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var req *http.Request
|
||||||
|
req, err = http.NewRequest("POST", p.RedeemURL.String(), bytes.NewBufferString(params.Encode()))
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
|
||||||
|
var resp *http.Response
|
||||||
|
resp, err = http.DefaultClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
var body []byte
|
||||||
|
body, err = ioutil.ReadAll(resp.Body)
|
||||||
|
resp.Body.Close()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if resp.StatusCode != 200 {
|
||||||
|
err = fmt.Errorf("got %d from %q %s", resp.StatusCode, p.RedeemURL.String(), body)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var jsonResponse struct {
|
||||||
|
AccessToken string `json:"access_token"`
|
||||||
|
RefreshToken string `json:"refresh_token"`
|
||||||
|
ExpiresOn int64 `json:"expires_on,string"`
|
||||||
|
IDToken string `json:"id_token"`
|
||||||
|
}
|
||||||
|
err = json.Unmarshal(body, &jsonResponse)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s = &sessions.SessionState{
|
||||||
|
AccessToken: jsonResponse.AccessToken,
|
||||||
|
IDToken: jsonResponse.IDToken,
|
||||||
|
CreatedAt: time.Now(),
|
||||||
|
ExpiresOn: time.Unix(jsonResponse.ExpiresOn, 0),
|
||||||
|
RefreshToken: jsonResponse.RefreshToken,
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
func getAzureHeader(accessToken string) http.Header {
|
func getAzureHeader(accessToken string) http.Header {
|
||||||
header := make(http.Header)
|
header := make(http.Header)
|
||||||
header.Set("Authorization", fmt.Sprintf("Bearer %s", accessToken))
|
header.Set("Authorization", fmt.Sprintf("Bearer %s", accessToken))
|
||||||
|
|
|
||||||
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"net/url"
|
"net/url"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/pusher/oauth2_proxy/pkg/apis/sessions"
|
"github.com/pusher/oauth2_proxy/pkg/apis/sessions"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
@ -20,6 +21,7 @@ func testAzureProvider(hostname string) *AzureProvider {
|
||||||
ValidateURL: &url.URL{},
|
ValidateURL: &url.URL{},
|
||||||
ProtectedResource: &url.URL{},
|
ProtectedResource: &url.URL{},
|
||||||
Scope: ""})
|
Scope: ""})
|
||||||
|
|
||||||
if hostname != "" {
|
if hostname != "" {
|
||||||
updateURL(p.Data().LoginURL, hostname)
|
updateURL(p.Data().LoginURL, hostname)
|
||||||
updateURL(p.Data().RedeemURL, hostname)
|
updateURL(p.Data().RedeemURL, hostname)
|
||||||
|
|
@ -111,8 +113,11 @@ func testAzureBackend(payload string) *httptest.Server {
|
||||||
|
|
||||||
return httptest.NewServer(http.HandlerFunc(
|
return httptest.NewServer(http.HandlerFunc(
|
||||||
func(w http.ResponseWriter, r *http.Request) {
|
func(w http.ResponseWriter, r *http.Request) {
|
||||||
if r.URL.Path != path || r.URL.RawQuery != query {
|
if (r.URL.Path != path || r.URL.RawQuery != query) && r.Method != "POST" {
|
||||||
w.WriteHeader(404)
|
w.WriteHeader(404)
|
||||||
|
} else if r.Method == "POST" && r.Body != nil {
|
||||||
|
w.WriteHeader(200)
|
||||||
|
w.Write([]byte(payload))
|
||||||
} else if r.Header.Get("Authorization") != "Bearer imaginary_access_token" {
|
} else if r.Header.Get("Authorization") != "Bearer imaginary_access_token" {
|
||||||
w.WriteHeader(403)
|
w.WriteHeader(403)
|
||||||
} else {
|
} else {
|
||||||
|
|
@ -199,3 +204,19 @@ func TestAzureProviderGetEmailAddressIncorrectOtherMails(t *testing.T) {
|
||||||
assert.Equal(t, "type assertion to string failed", err.Error())
|
assert.Equal(t, "type assertion to string failed", err.Error())
|
||||||
assert.Equal(t, "", email)
|
assert.Equal(t, "", email)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestAzureProviderRedeemReturnsIdToken(t *testing.T) {
|
||||||
|
b := testAzureBackend(`{ "id_token": "testtoken1234", "expires_on": "1136239445", "refresh_token": "refresh1234" }`)
|
||||||
|
defer b.Close()
|
||||||
|
timestamp, err := time.Parse(time.RFC3339, "2006-01-02T22:04:05Z")
|
||||||
|
assert.Equal(t, nil, err)
|
||||||
|
|
||||||
|
bURL, _ := url.Parse(b.URL)
|
||||||
|
p := testAzureProvider(bURL.Host)
|
||||||
|
p.Data().RedeemURL.Path = "/common/oauth2/token"
|
||||||
|
s, err := p.Redeem("https://localhost", "1234")
|
||||||
|
assert.Equal(t, nil, err)
|
||||||
|
assert.Equal(t, "testtoken1234", s.IDToken)
|
||||||
|
assert.Equal(t, timestamp, s.ExpiresOn.UTC())
|
||||||
|
assert.Equal(t, "refresh1234", s.RefreshToken)
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -8,7 +8,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
type ValidatorTest struct {
|
type ValidatorTest struct {
|
||||||
authEmailFile *os.File
|
authEmailFileName string
|
||||||
done chan bool
|
done chan bool
|
||||||
updateSeen bool
|
updateSeen bool
|
||||||
}
|
}
|
||||||
|
|
@ -16,22 +16,26 @@ type ValidatorTest struct {
|
||||||
func NewValidatorTest(t *testing.T) *ValidatorTest {
|
func NewValidatorTest(t *testing.T) *ValidatorTest {
|
||||||
vt := &ValidatorTest{}
|
vt := &ValidatorTest{}
|
||||||
var err error
|
var err error
|
||||||
vt.authEmailFile, err = ioutil.TempFile("", "test_auth_emails_")
|
f, err := ioutil.TempFile("", "test_auth_emails_")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("failed to create temp file: " + err.Error())
|
t.Fatalf("failed to create temp file: %v", err)
|
||||||
}
|
}
|
||||||
|
if err := f.Close(); err != nil {
|
||||||
|
t.Fatalf("failed to close temp file: %v", err)
|
||||||
|
}
|
||||||
|
vt.authEmailFileName = f.Name()
|
||||||
vt.done = make(chan bool, 1)
|
vt.done = make(chan bool, 1)
|
||||||
return vt
|
return vt
|
||||||
}
|
}
|
||||||
|
|
||||||
func (vt *ValidatorTest) TearDown() {
|
func (vt *ValidatorTest) TearDown() {
|
||||||
vt.done <- true
|
vt.done <- true
|
||||||
os.Remove(vt.authEmailFile.Name())
|
os.Remove(vt.authEmailFileName)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (vt *ValidatorTest) NewValidator(domains []string,
|
func (vt *ValidatorTest) NewValidator(domains []string,
|
||||||
updated chan<- bool) func(string) bool {
|
updated chan<- bool) func(string) bool {
|
||||||
return newValidatorImpl(domains, vt.authEmailFile.Name(),
|
return newValidatorImpl(domains, vt.authEmailFileName,
|
||||||
vt.done, func() {
|
vt.done, func() {
|
||||||
if vt.updateSeen == false {
|
if vt.updateSeen == false {
|
||||||
updated <- true
|
updated <- true
|
||||||
|
|
@ -40,13 +44,18 @@ func (vt *ValidatorTest) NewValidator(domains []string,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
// This will close vt.authEmailFile.
|
|
||||||
func (vt *ValidatorTest) WriteEmails(t *testing.T, emails []string) {
|
func (vt *ValidatorTest) WriteEmails(t *testing.T, emails []string) {
|
||||||
defer vt.authEmailFile.Close()
|
f, err := os.OpenFile(vt.authEmailFileName, os.O_WRONLY, 0600)
|
||||||
vt.authEmailFile.WriteString(strings.Join(emails, "\n"))
|
if err != nil {
|
||||||
if err := vt.authEmailFile.Close(); err != nil {
|
t.Fatalf("failed to open auth email file: %v", err)
|
||||||
t.Fatal("failed to close temp file " +
|
}
|
||||||
vt.authEmailFile.Name() + ": " + err.Error())
|
|
||||||
|
if _, err := f.WriteString(strings.Join(emails, "\n")); err != nil {
|
||||||
|
t.Fatalf("failed to write emails to auth email file: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := f.Close(); err != nil {
|
||||||
|
t.Fatalf("failed to close auth email file: %v", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -160,3 +169,43 @@ func TestValidatorIgnoreSpacesInAuthEmails(t *testing.T) {
|
||||||
t.Error("email should validate")
|
t.Error("email should validate")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestValidatorOverwriteEmailListDirectly(t *testing.T) {
|
||||||
|
vt := NewValidatorTest(t)
|
||||||
|
defer vt.TearDown()
|
||||||
|
|
||||||
|
vt.WriteEmails(t, []string{
|
||||||
|
"xyzzy@example.com",
|
||||||
|
"plugh@example.com",
|
||||||
|
})
|
||||||
|
domains := []string(nil)
|
||||||
|
updated := make(chan bool)
|
||||||
|
validator := vt.NewValidator(domains, updated)
|
||||||
|
|
||||||
|
if !validator("xyzzy@example.com") {
|
||||||
|
t.Error("first email in list should validate")
|
||||||
|
}
|
||||||
|
if !validator("plugh@example.com") {
|
||||||
|
t.Error("second email in list should validate")
|
||||||
|
}
|
||||||
|
if validator("xyzzy.plugh@example.com") {
|
||||||
|
t.Error("email not in list that matches no domains " +
|
||||||
|
"should not validate")
|
||||||
|
}
|
||||||
|
|
||||||
|
vt.WriteEmails(t, []string{
|
||||||
|
"xyzzy.plugh@example.com",
|
||||||
|
"plugh@example.com",
|
||||||
|
})
|
||||||
|
<-updated
|
||||||
|
|
||||||
|
if validator("xyzzy@example.com") {
|
||||||
|
t.Error("email removed from list should not validate")
|
||||||
|
}
|
||||||
|
if !validator("plugh@example.com") {
|
||||||
|
t.Error("email retained in list should validate")
|
||||||
|
}
|
||||||
|
if !validator("xyzzy.plugh@example.com") {
|
||||||
|
t.Error("email added to list should validate")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,48 +0,0 @@
|
||||||
// +build go1.3,!plan9,!solaris,!windows
|
|
||||||
|
|
||||||
// Turns out you can't copy over an existing file on Windows.
|
|
||||||
|
|
||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"io/ioutil"
|
|
||||||
"os"
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (vt *ValidatorTest) UpdateEmailFileViaCopyingOver(
|
|
||||||
t *testing.T, emails []string) {
|
|
||||||
origFile := vt.authEmailFile
|
|
||||||
var err error
|
|
||||||
vt.authEmailFile, err = ioutil.TempFile("", "test_auth_emails_")
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal("failed to create temp file for copy: " + err.Error())
|
|
||||||
}
|
|
||||||
vt.WriteEmails(t, emails)
|
|
||||||
err = os.Rename(vt.authEmailFile.Name(), origFile.Name())
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal("failed to copy over temp file: " + err.Error())
|
|
||||||
}
|
|
||||||
vt.authEmailFile = origFile
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestValidatorOverwriteEmailListViaCopyingOver(t *testing.T) {
|
|
||||||
vt := NewValidatorTest(t)
|
|
||||||
defer vt.TearDown()
|
|
||||||
|
|
||||||
vt.WriteEmails(t, []string{"xyzzy@example.com"})
|
|
||||||
domains := []string(nil)
|
|
||||||
updated := make(chan bool)
|
|
||||||
validator := vt.NewValidator(domains, updated)
|
|
||||||
|
|
||||||
if !validator("xyzzy@example.com") {
|
|
||||||
t.Error("email in list should validate")
|
|
||||||
}
|
|
||||||
|
|
||||||
vt.UpdateEmailFileViaCopyingOver(t, []string{"plugh@example.com"})
|
|
||||||
<-updated
|
|
||||||
|
|
||||||
if validator("xyzzy@example.com") {
|
|
||||||
t.Error("email removed from list should not validate")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
@ -1,102 +0,0 @@
|
||||||
// +build go1.3,!plan9,!solaris
|
|
||||||
|
|
||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"io/ioutil"
|
|
||||||
"os"
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (vt *ValidatorTest) UpdateEmailFile(t *testing.T, emails []string) {
|
|
||||||
var err error
|
|
||||||
vt.authEmailFile, err = os.OpenFile(
|
|
||||||
vt.authEmailFile.Name(), os.O_WRONLY|os.O_CREATE, 0600)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal("failed to re-open temp file for updates")
|
|
||||||
}
|
|
||||||
vt.WriteEmails(t, emails)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (vt *ValidatorTest) UpdateEmailFileViaRenameAndReplace(
|
|
||||||
t *testing.T, emails []string) {
|
|
||||||
origFile := vt.authEmailFile
|
|
||||||
var err error
|
|
||||||
vt.authEmailFile, err = ioutil.TempFile("", "test_auth_emails_")
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal("failed to create temp file for rename and replace: " +
|
|
||||||
err.Error())
|
|
||||||
}
|
|
||||||
vt.WriteEmails(t, emails)
|
|
||||||
|
|
||||||
movedName := origFile.Name() + "-moved"
|
|
||||||
err = os.Rename(origFile.Name(), movedName)
|
|
||||||
err = os.Rename(vt.authEmailFile.Name(), origFile.Name())
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal("failed to rename and replace temp file: " +
|
|
||||||
err.Error())
|
|
||||||
}
|
|
||||||
vt.authEmailFile = origFile
|
|
||||||
os.Remove(movedName)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestValidatorOverwriteEmailListDirectly(t *testing.T) {
|
|
||||||
vt := NewValidatorTest(t)
|
|
||||||
defer vt.TearDown()
|
|
||||||
|
|
||||||
vt.WriteEmails(t, []string{
|
|
||||||
"xyzzy@example.com",
|
|
||||||
"plugh@example.com",
|
|
||||||
})
|
|
||||||
domains := []string(nil)
|
|
||||||
updated := make(chan bool)
|
|
||||||
validator := vt.NewValidator(domains, updated)
|
|
||||||
|
|
||||||
if !validator("xyzzy@example.com") {
|
|
||||||
t.Error("first email in list should validate")
|
|
||||||
}
|
|
||||||
if !validator("plugh@example.com") {
|
|
||||||
t.Error("second email in list should validate")
|
|
||||||
}
|
|
||||||
if validator("xyzzy.plugh@example.com") {
|
|
||||||
t.Error("email not in list that matches no domains " +
|
|
||||||
"should not validate")
|
|
||||||
}
|
|
||||||
|
|
||||||
vt.UpdateEmailFile(t, []string{
|
|
||||||
"xyzzy.plugh@example.com",
|
|
||||||
"plugh@example.com",
|
|
||||||
})
|
|
||||||
<-updated
|
|
||||||
|
|
||||||
if validator("xyzzy@example.com") {
|
|
||||||
t.Error("email removed from list should not validate")
|
|
||||||
}
|
|
||||||
if !validator("plugh@example.com") {
|
|
||||||
t.Error("email retained in list should validate")
|
|
||||||
}
|
|
||||||
if !validator("xyzzy.plugh@example.com") {
|
|
||||||
t.Error("email added to list should validate")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestValidatorOverwriteEmailListViaRenameAndReplace(t *testing.T) {
|
|
||||||
vt := NewValidatorTest(t)
|
|
||||||
defer vt.TearDown()
|
|
||||||
|
|
||||||
vt.WriteEmails(t, []string{"xyzzy@example.com"})
|
|
||||||
domains := []string(nil)
|
|
||||||
updated := make(chan bool, 1)
|
|
||||||
validator := vt.NewValidator(domains, updated)
|
|
||||||
|
|
||||||
if !validator("xyzzy@example.com") {
|
|
||||||
t.Error("email in list should validate")
|
|
||||||
}
|
|
||||||
|
|
||||||
vt.UpdateEmailFileViaRenameAndReplace(t, []string{"plugh@example.com"})
|
|
||||||
<-updated
|
|
||||||
|
|
||||||
if validator("xyzzy@example.com") {
|
|
||||||
t.Error("email removed from list should not validate")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Loading…
Reference in New Issue