@@ -233,6 +233,7 @@ func TestGetIdentityProvider(t *testing.T) {
233233 Name : created .Name ,
234234 }
235235
236+ // Test unauthenticated, should not contain client secret
236237 resp , err := ts .Service .GetIdentityProvider (ctx , getReq )
237238 require .NoError (t , err )
238239 require .NotNil (t , resp )
@@ -241,7 +242,18 @@ func TestGetIdentityProvider(t *testing.T) {
241242 require .Equal (t , v1pb .IdentityProvider_OAUTH2 , resp .Type )
242243 require .NotNil (t , resp .Config .GetOauth2Config ())
243244 require .Equal (t , "test-client" , resp .Config .GetOauth2Config ().ClientId )
244- require .Equal (t , "test-secret" , resp .Config .GetOauth2Config ().ClientSecret )
245+ require .Equal (t , "" , resp .Config .GetOauth2Config ().ClientSecret )
246+
247+ // Test as host user, should contain client secret
248+ respHostUser , err := ts .Service .GetIdentityProvider (userCtx , getReq )
249+ require .NoError (t , err )
250+ require .NotNil (t , respHostUser )
251+ require .Equal (t , created .Name , respHostUser .Name )
252+ require .Equal (t , "Test Provider" , respHostUser .Title )
253+ require .Equal (t , v1pb .IdentityProvider_OAUTH2 , respHostUser .Type )
254+ require .NotNil (t , respHostUser .Config .GetOauth2Config ())
255+ require .Equal (t , "test-client" , respHostUser .Config .GetOauth2Config ().ClientId )
256+ require .Equal (t , "test-secret" , respHostUser .Config .GetOauth2Config ().ClientSecret )
245257 })
246258
247259 t .Run ("GetIdentityProvider not found" , func (t * testing.T ) {
@@ -353,14 +365,21 @@ func TestUpdateIdentityProvider(t *testing.T) {
353365 ts := NewTestService (t )
354366 defer ts .Cleanup ()
355367
368+ // Create host user
369+ hostUser , err := ts .CreateHostUser (ctx , "admin" )
370+ require .NoError (t , err )
371+
372+ // Set user context
373+ userCtx := ts .CreateUserContext (ctx , hostUser .ID )
374+
356375 req := & v1pb.UpdateIdentityProviderRequest {
357376 IdentityProvider : & v1pb.IdentityProvider {
358377 Name : "identity-providers/1" ,
359378 Title : "Updated Provider" ,
360379 },
361380 }
362381
363- _ , err : = ts .Service .UpdateIdentityProvider (ctx , req )
382+ _ , err = ts .Service .UpdateIdentityProvider (userCtx , req )
364383 require .Error (t , err )
365384 require .Contains (t , err .Error (), "update_mask is required" )
366385 })
@@ -369,6 +388,13 @@ func TestUpdateIdentityProvider(t *testing.T) {
369388 ts := NewTestService (t )
370389 defer ts .Cleanup ()
371390
391+ // Create host user
392+ hostUser , err := ts .CreateHostUser (ctx , "admin" )
393+ require .NoError (t , err )
394+
395+ // Set user context
396+ userCtx := ts .CreateUserContext (ctx , hostUser .ID )
397+
372398 req := & v1pb.UpdateIdentityProviderRequest {
373399 IdentityProvider : & v1pb.IdentityProvider {
374400 Name : "invalid-name" ,
@@ -379,7 +405,7 @@ func TestUpdateIdentityProvider(t *testing.T) {
379405 },
380406 }
381407
382- _ , err : = ts .Service .UpdateIdentityProvider (ctx , req )
408+ _ , err = ts .Service .UpdateIdentityProvider (userCtx , req )
383409 require .Error (t , err )
384410 require .Contains (t , err .Error (), "invalid identity provider name" )
385411 })
@@ -445,11 +471,18 @@ func TestDeleteIdentityProvider(t *testing.T) {
445471 ts := NewTestService (t )
446472 defer ts .Cleanup ()
447473
474+ // Create host user
475+ hostUser , err := ts .CreateHostUser (ctx , "admin" )
476+ require .NoError (t , err )
477+
478+ // Set user context
479+ userCtx := ts .CreateUserContext (ctx , hostUser .ID )
480+
448481 req := & v1pb.DeleteIdentityProviderRequest {
449482 Name : "invalid-name" ,
450483 }
451484
452- _ , err : = ts .Service .DeleteIdentityProvider (ctx , req )
485+ _ , err = ts .Service .DeleteIdentityProvider (userCtx , req )
453486 require .Error (t , err )
454487 require .Contains (t , err .Error (), "invalid identity provider name" )
455488 })
0 commit comments