From 4f96e3e86a246ec8840e00c558dc5119ad31201f Mon Sep 17 00:00:00 2001 From: Sn0rt Date: Fri, 4 Aug 2023 14:32:53 +0800 Subject: [PATCH] fix: reindex: t/plugin/openid-connect.t Signed-off-by: Sn0rt --- apisix/plugins/openid-connect.lua | 1 - t/plugin/openid-connect.t | 4 +++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/apisix/plugins/openid-connect.lua b/apisix/plugins/openid-connect.lua index 667003af7394..6dca8c103d5a 100644 --- a/apisix/plugins/openid-connect.lua +++ b/apisix/plugins/openid-connect.lua @@ -152,7 +152,6 @@ local schema = { description = "Basic [base64 username:password]", }, }, - default = {} } }, encrypt_fields = {"client_secret"}, diff --git a/t/plugin/openid-connect.t b/t/plugin/openid-connect.t index 1e46f82f05f8..515319248c9b 100644 --- a/t/plugin/openid-connect.t +++ b/t/plugin/openid-connect.t @@ -876,7 +876,9 @@ OIDC introspection failed: invalid token } } --- response_body -{"access_token_in_authorization_header":false,"bearer_only":false,"client_id":"kbyuFDidLLm280LIwVFiazOqjO3ty8KH","client_secret":"60Op4HFM0I8ajz0WdiStAbziZ-VFQttXuxixHHs2R7r7-CW8GR79l-mmLqMhc-Sa","discovery":"http://127.0.0.1:1980/.well-known/openid-configuration","introspection_endpoint_auth_method":"client_secret_basic","logout_path":"/logout","proxy_opts":[],"realm":"apisix","scope":"openid","set_access_token_header":true,"set_id_token_header":true,"set_refresh_token_header":false,"set_userinfo_header":true,"ssl_verify":false,"timeout":3,"unauth_action":"auth","use_pkce":false} +{"access_token_in_authorization_header":false,"bearer_only":false,"client_id":"kbyuFDidLLm280LIwVFiazOqjO3ty8KH","client_secret":"60Op4HFM0I8ajz0WdiStAbziZ-VFQttXuxixHHs2R7r7-CW8GR79l-mmLqMhc-Sa","discovery":"http://127.0.0.1:1980/.well-known/openid-configuration","introspection_endpoint_auth_method":"client_secret_basic","logout_path":"/logout","realm":"apisix","scope":"openid","set_access_token_header":true,"set_id_token_header":true,"set_refresh_token_header":false,"set_userinfo_header":true,"ssl_verify":false,"timeout":3,"unauth_action":"auth","use_pkce":false} + + === TEST 25: Update plugin with ID provider jwks endpoint for token verification. --- config