k8s-merge-robot
ade299c18f
Merge pull request #27146 from mikedanese/nil-ptr
...
Automatic merge from submit-queue
oidc: fix test nil pointer
```
2016-06-09 13:12:37.262983 I | http: TLS handshake error from 127.0.0.1:32814: remote error: bad certificate
PASS
--- FAIL: TestNewOIDCAuthProvider (0.87s)
panic: runtime error: invalid memory address or nil pointer dereference [recovered]
panic: runtime error: invalid memory address or nil pointer dereference
[signal 0xb code=0x1 addr=0x0 pc=0x5d91ca]
goroutine 12 [running]:
panic(0x124bd00, 0xc8200101f0)
/usr/local/google/home/mikedanese/.gimme/versions/go1.6.1.linux.amd64/src/runtime/panic.go:464 +0x3e6
testing.tRunner.func1(0xc820023b90)
/usr/local/google/home/mikedanese/.gimme/versions/go1.6.1.linux.amd64/src/testing/testing.go:467 +0x192
panic(0x124bd00, 0xc8200101f0)
/usr/local/google/home/mikedanese/.gimme/versions/go1.6.1.linux.amd64/src/runtime/panic.go:426 +0x4e9
k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/oidc/testing.(*OIDCProvider).AddMinimalProviderConfig(0xc820020580, 0x0)
/usr/local/google/home/mikedanese/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/oidc/testing/provider.go:85 +0x2a
k8s.io/kubernetes/plugin/pkg/client/auth/oidc.TestNewOIDCAuthProvider(0xc820023b90)
/usr/local/google/home/mikedanese/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/plugin/pkg/client/auth/oidc/oidc_test.go:51 +0x367
testing.tRunner(0xc820023b90, 0x1d0a360)
/usr/local/google/home/mikedanese/.gimme/versions/go1.6.1.linux.amd64/src/testing/testing.go:473 +0x98
created by testing.RunTests
/usr/local/google/home/mikedanese/.gimme/versions/go1.6.1.linux.amd64/src/testing/testing.go:582 +0x892
FAIL k8s.io/kubernetes/plugin/pkg/client/auth/oidc 3.081s
```
cc @bobbyrullo @yifan-gu
2016-06-10 00:12:28 -07:00
Mike Danese
c0cda8535e
oidc: fix test nil pointer
2016-06-09 13:15:59 -07:00
Matt Liggett
421950eecb
Avoid pathname collisions in TestNewOICAuthProvider.
...
May fix #26815
2016-06-07 18:01:29 -07:00
Bobby Rullo
f575f89cd7
add tests for the OIDC WrapTransport
...
tests that tokens gets refreshed, passed along as bearers, etc.
2016-05-18 17:03:12 -07:00
Bobby Rullo
94ffa344a8
OIDC authprovider more testable, and add backoff
...
* Use an interface for OIDC Client, so that we're testing the behavior
of the client, not the go-oidc package itself
* add backoff and retry when server rejects token
2016-05-18 17:03:12 -07:00
Bobby Rullo
e85940ed17
add tests for newOIDCAuthProvider
2016-05-18 17:03:11 -07:00
Bobby Rullo
c990462d0f
Refactor test oidc provider into its own package
...
This makes it easier to test other OIDC code.
2016-05-18 17:03:11 -07:00
Bobby Rullo
f2135bdf90
Implement new OIDC client AuthProvider
...
This commit handles:
* Passing ID Token as Bearer token
* Refreshing of tokens using refresh-tokens
* Persisting refreshed tokens
* ability to add arbitrary extra scopes via config
* this is what enables the cross-client/azp stuff
2016-05-18 17:02:48 -07:00
CJ Cullen
13a7d92d0f
Add a ConfigPersister for AuthProvider plugins in kubectl/clients.
2016-05-07 18:15:18 -07:00
CJ Cullen
03f9b5adc0
Add client auth plugin framework for kubectl with GCP auth plugin.
2016-04-14 17:49:16 -07:00