@@ -32,28 +32,28 @@ import (
3232
3333func createTestClient (prefix string ) hydra.OAuth2Client {
3434 return hydra.OAuth2Client {
35- ClientName : pointerx . Ptr (prefix + "name" ),
36- ClientSecret : pointerx . Ptr (prefix + "secret" ),
37- ClientUri : pointerx . Ptr ("https://example.org/" + prefix + "uri" ),
35+ ClientName : new (prefix + "name" ),
36+ ClientSecret : new (prefix + "secret" ),
37+ ClientUri : new ("https ://example.org/" + prefix + "uri"),
3838 Contacts : []string {prefix + "peter" , prefix + "pan" },
3939 GrantTypes : []string {prefix + "client_credentials" , prefix + "authorize_code" },
40- LogoUri : pointerx . Ptr ("https://example.org/" + prefix + "logo" ),
41- Owner : pointerx . Ptr (prefix + "an-owner" ),
42- PolicyUri : pointerx . Ptr ("https://example.org/" + prefix + "policy-uri" ),
43- Scope : pointerx . Ptr (prefix + "foo bar baz" ),
44- TosUri : pointerx . Ptr ("https://example.org/" + prefix + "tos" ),
40+ LogoUri : new ("https ://example.org/" + prefix + "logo"),
41+ Owner : new (prefix + "an-owner" ),
42+ PolicyUri : new ("https ://example.org/" + prefix + "policy-uri"),
43+ Scope : new (prefix + "foo bar baz" ),
44+ TosUri : new ("https ://example.org/" + prefix + "tos"),
4545 ResponseTypes : []string {prefix + "id_token" , prefix + "code" },
4646 RedirectUris : []string {"https ://" + prefix + "redirect-url", "https://" + prefix + "redirect-uri"},
47- ClientSecretExpiresAt : pointerx. Ptr [ int64 ]( 0 ),
48- TokenEndpointAuthMethod : pointerx . Ptr ("client_secret_basic" ),
49- UserinfoSignedResponseAlg : pointerx . Ptr ("none" ),
50- SubjectType : pointerx . Ptr ("public" ),
47+ ClientSecretExpiresAt : new ( int64 ( 0 ) ),
48+ TokenEndpointAuthMethod : new ("client_secret_basic "),
49+ UserinfoSignedResponseAlg : new ("none "),
50+ SubjectType : new ("public "),
5151 Metadata: map [string ]interface {}{"foo" : "bar" },
5252 // because these values are not nullable in the SQL schema, we have to set them not nil
5353 AllowedCorsOrigins : []string {},
5454 Audience : []string {},
5555 Jwks : & hydra.JsonWebKeySet {},
56- SkipConsent : pointerx . Ptr (false ),
56+ SkipConsent : new (false ),
5757 }
5858}
5959
@@ -118,7 +118,7 @@ func TestClientSDK(t *testing.T) {
118118 assert .EqualValues (t , "bar" , result .Metadata .(map [string ]interface {})["foo" ])
119119
120120 // secret is not returned on GetOAuth2Client
121- compareClient .ClientSecret = pointerx . Ptr ("" )
121+ compareClient .ClientSecret = new ("")
122122 gresult , _ , err := c .OAuth2API .GetOAuth2Client (context .Background (), * createClient .ClientId ).Execute ()
123123 require .NoError (t , err )
124124 assertx .EqualAsJSONExcept (t , compareClient , gresult , append (defaultIgnoreFields , "client_secret" ))
@@ -151,7 +151,7 @@ func TestClientSDK(t *testing.T) {
151151
152152 // again, test if secret is not returned on Get
153153 compareClient = updateClient
154- compareClient .ClientSecret = pointerx . Ptr ("" )
154+ compareClient .ClientSecret = new ("")
155155 gresult , _ , err = c .OAuth2API .GetOAuth2Client (context .Background (), * updateClient .ClientId ).Execute ()
156156 require .NoError (t , err )
157157 assertx .EqualAsJSONExcept (t , compareClient , gresult , append (defaultIgnoreFields , "client_secret" ))
@@ -166,7 +166,7 @@ func TestClientSDK(t *testing.T) {
166166
167167 t .Run ("case=public client is transmitted without secret" , func (t * testing.T ) {
168168 result , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {
169- TokenEndpointAuthMethod : pointerx . Ptr ("none" ),
169+ TokenEndpointAuthMethod : new ("none "),
170170 }).Execute ()
171171 require .NoError (t , err )
172172
@@ -180,7 +180,7 @@ func TestClientSDK(t *testing.T) {
180180
181181 t .Run ("case=id can be set" , func (t * testing.T ) {
182182 id := uuidx .NewV4 ().String ()
183- result , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {ClientId : pointerx . Ptr (id )}).Execute ()
183+ result , _ , err := c .OAuth2API .CreateOAuth2Client (context .Background ()).OAuth2Client (hydra.OAuth2Client {ClientId : new (id )}).Execute ()
184184 require .NoError (t , err )
185185
186186 assert .Equal (t , id , pointerx .Deref (result .ClientId ))
0 commit comments