@@ -154,9 +154,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
154154 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
155155 code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
156156 require .NoError (t , err )
157+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
158+ require .NoError (t , err )
157159 areq .Form .Add ("device_code" , code )
158160
159- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
161+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
160162 },
161163 expectErr : fosite .ErrAuthorizationPending ,
162164 },
@@ -192,9 +194,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
192194 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
193195 code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
194196 require .NoError (t , err )
197+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
198+ require .NoError (t , err )
195199 areq .Form .Add ("device_code" , code )
196200
197- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
201+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
198202 },
199203 expectErr : fosite .ErrDeviceExpiredToken ,
200204 },
@@ -227,9 +231,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
227231 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
228232 token , signature , err := strategy .GenerateDeviceCode (context .TODO ())
229233 require .NoError (t , err )
234+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
235+ require .NoError (t , err )
230236 areq .Form = url.Values {"device_code" : {token }}
231237
232- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
238+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
233239 },
234240 expectErr : fosite .ErrInvalidGrant ,
235241 },
@@ -263,9 +269,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest(t *testing.T) {
263269 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest ) {
264270 token , signature , err := strategy .GenerateDeviceCode (context .TODO ())
265271 require .NoError (t , err )
272+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
273+ require .NoError (t , err )
266274
267275 areq .Form = url.Values {"device_code" : {token }}
268- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
276+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
269277 },
270278 },
271279 }
@@ -342,9 +350,11 @@ func TestDeviceUserCode_HandleTokenEndpointRequest_RateLimiting(t *testing.T) {
342350
343351 token , signature , err := strategy .GenerateDeviceCode (context .TODO ())
344352 require .NoError (t , err )
353+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
354+ require .NoError (t , err )
345355
346356 areq .Form = url.Values {"device_code" : {token }}
347- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
357+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
348358 err = h .HandleTokenEndpointRequest (context .Background (), areq )
349359 require .NoError (t , err , "%+v" , err )
350360 err = h .HandleTokenEndpointRequest (context .Background (), areq )
@@ -441,9 +451,11 @@ func TestDeviceUserCode_PopulateTokenEndpointResponse(t *testing.T) {
441451 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest , _ * fosite.Config ) {
442452 code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
443453 require .NoError (t , err )
454+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
455+ require .NoError (t , err )
444456 areq .Form .Add ("device_code" , code )
445457
446- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
458+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
447459 },
448460 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
449461 assert .NotEmpty (t , aresp .AccessToken )
@@ -483,9 +495,11 @@ func TestDeviceUserCode_PopulateTokenEndpointResponse(t *testing.T) {
483495 config .RefreshTokenScopes = []string {}
484496 code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
485497 require .NoError (t , err )
498+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
499+ require .NoError (t , err )
486500 areq .Form .Add ("device_code" , code )
487501
488- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
502+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
489503 },
490504 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
491505 assert .NotEmpty (t , aresp .AccessToken )
@@ -524,9 +538,11 @@ func TestDeviceUserCode_PopulateTokenEndpointResponse(t *testing.T) {
524538 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.DeviceRequest , config * fosite.Config ) {
525539 code , signature , err := strategy .GenerateDeviceCode (context .TODO ())
526540 require .NoError (t , err )
541+ _ , userCodeSignature , err := strategy .GenerateUserCode (context .TODO ())
542+ require .NoError (t , err )
527543 areq .Form .Add ("device_code" , code )
528544
529- require .NoError (t , store .CreateDeviceCodeSession (context .TODO (), signature , authreq ))
545+ require .NoError (t , store .CreateDeviceAuthSession (context .TODO (), signature , userCodeSignature , authreq ))
530546 },
531547 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
532548 assert .NotEmpty (t , aresp .AccessToken )
0 commit comments