@@ -668,8 +668,7 @@ func TestServer(t *testing.T) {
668
668
if c .tlsListener {
669
669
accessURLParsed , err := url .Parse (c .requestURL )
670
670
require .NoError (t , err )
671
- client := codersdk .New (accessURLParsed )
672
- client .HTTPClient = & http.Client {
671
+ client := & http.Client {
673
672
CheckRedirect : func (req * http.Request , via []* http.Request ) error {
674
673
return http .ErrUseLastResponse
675
674
},
@@ -682,11 +681,15 @@ func TestServer(t *testing.T) {
682
681
},
683
682
},
684
683
}
685
- defer client .HTTPClient .CloseIdleConnections ()
686
- _ , err = client .HasFirstUser (ctx )
687
- if err != nil {
688
- require .ErrorContains (t , err , "Invalid application URL" )
689
- }
684
+ defer client .CloseIdleConnections ()
685
+
686
+ req , err := http .NewRequestWithContext (ctx , http .MethodGet , accessURLParsed .String (), nil )
687
+ require .NoError (t , err )
688
+ resp , err := client .Do (req )
689
+ // We don't care much about the response, just that TLS
690
+ // worked.
691
+ require .NoError (t , err )
692
+ defer resp .Body .Close ()
690
693
}
691
694
})
692
695
}
@@ -1086,6 +1089,7 @@ func TestServer(t *testing.T) {
1086
1089
require .Equal (t , "preferred_username" , deploymentConfig .Values .OIDC .UsernameField .Value ())
1087
1090
require .Equal (t , "email" , deploymentConfig .Values .OIDC .EmailField .Value ())
1088
1091
require .Equal (t , map [string ]string {"access_type" : "offline" }, deploymentConfig .Values .OIDC .AuthURLParams .Value )
1092
+ require .False (t , deploymentConfig .Values .OIDC .IgnoreUserInfo .Value ())
1089
1093
require .Empty (t , deploymentConfig .Values .OIDC .GroupField .Value ())
1090
1094
require .Empty (t , deploymentConfig .Values .OIDC .GroupMapping .Value )
1091
1095
require .Equal (t , "OpenID Connect" , deploymentConfig .Values .OIDC .SignInText .Value ())
@@ -1125,6 +1129,7 @@ func TestServer(t *testing.T) {
1125
1129
"--oidc-username-field" , "not_preferred_username" ,
1126
1130
"--oidc-email-field" , "not_email" ,
1127
1131
"--oidc-auth-url-params" , `{"prompt":"consent"}` ,
1132
+ "--oidc-ignore-userinfo" ,
1128
1133
"--oidc-group-field" , "serious_business_unit" ,
1129
1134
"--oidc-group-mapping" , `{"serious_business_unit": "serious_business_unit"}` ,
1130
1135
"--oidc-sign-in-text" , "Sign In With Coder" ,
@@ -1169,6 +1174,7 @@ func TestServer(t *testing.T) {
1169
1174
require .True (t , deploymentConfig .Values .OIDC .IgnoreEmailVerified .Value ())
1170
1175
require .Equal (t , "not_preferred_username" , deploymentConfig .Values .OIDC .UsernameField .Value ())
1171
1176
require .Equal (t , "not_email" , deploymentConfig .Values .OIDC .EmailField .Value ())
1177
+ require .True (t , deploymentConfig .Values .OIDC .IgnoreUserInfo .Value ())
1172
1178
require .Equal (t , map [string ]string {"prompt" : "consent" }, deploymentConfig .Values .OIDC .AuthURLParams .Value )
1173
1179
require .Equal (t , "serious_business_unit" , deploymentConfig .Values .OIDC .GroupField .Value ())
1174
1180
require .Equal (t , map [string ]string {"serious_business_unit" : "serious_business_unit" }, deploymentConfig .Values .OIDC .GroupMapping .Value )
0 commit comments