@@ -490,7 +490,6 @@ func TestOAuthIntrospection(t *testing.T) {
490490func TestOAuth_GrantScopesReadUserFailRepos (t * testing.T ) {
491491 defer tests .PrepareTestEnv (t )()
492492
493- setting .OAuth2 .EnableAdditionalGrantScopes = true
494493 user := unittest .AssertExistsAndLoadBean (t , & user_model.User {ID : 2 })
495494 appBody := api.CreateOAuth2ApplicationOptions {
496495 Name : "oauth-provider-scopes-test" ,
@@ -516,7 +515,7 @@ func TestOAuth_GrantScopesReadUserFailRepos(t *testing.T) {
516515 err := db .Insert (db .DefaultContext , grant )
517516 require .NoError (t , err )
518517
519- assert .Contains (t , grant . Scope , "openid profile email read:user" )
518+ assert .ElementsMatch (t , [] string { "openid" , " profile" , " email" , " read:user"}, strings . Split ( grant . Scope , " " ) )
520519
521520 ctx := loginUserWithPasswordRemember (t , user .Name , "password" , true )
522521
@@ -572,7 +571,6 @@ func TestOAuth_GrantScopesReadUserFailRepos(t *testing.T) {
572571func TestOAuth_GrantScopesReadRepositoryFailOrganization (t * testing.T ) {
573572 defer tests .PrepareTestEnv (t )()
574573
575- setting .OAuth2 .EnableAdditionalGrantScopes = true
576574 user := unittest .AssertExistsAndLoadBean (t , & user_model.User {ID : 2 })
577575 appBody := api.CreateOAuth2ApplicationOptions {
578576 Name : "oauth-provider-scopes-test" ,
@@ -598,7 +596,7 @@ func TestOAuth_GrantScopesReadRepositoryFailOrganization(t *testing.T) {
598596 err := db .Insert (db .DefaultContext , grant )
599597 require .NoError (t , err )
600598
601- assert .Contains (t , grant . Scope , "openid profile email read:user read:repository" )
599+ assert .ElementsMatch (t , [] string { "openid" , " profile" , " email" , " read:user" , " read:repository"}, strings . Split ( grant . Scope , " " ) )
602600
603601 ctx := loginUserWithPasswordRemember (t , user .Name , "password" , true )
604602
@@ -716,7 +714,6 @@ func TestOAuth_GrantScopesReadRepositoryFailOrganization(t *testing.T) {
716714func TestOAuth_GrantScopesReadRepositoriesPublicOnly (t * testing.T ) {
717715 defer tests .PrepareTestEnv (t )()
718716
719- setting .OAuth2 .EnableAdditionalGrantScopes = true
720717 user := unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
721718
722719 appBody := api.CreateOAuth2ApplicationOptions {
@@ -743,7 +740,7 @@ func TestOAuth_GrantScopesReadRepositoriesPublicOnly(t *testing.T) {
743740 err := db .Insert (db .DefaultContext , grant )
744741 require .NoError (t , err )
745742
746- assert .Contains (t , grant . Scope , "openid profile email groups public-only read:user read:repository" )
743+ assert .ElementsMatch (t , [] string { "openid" , " profile" , " email" , " groups" , " public-only" , " read:user" , " read:repository"}, strings . Split ( grant . Scope , " " ) )
747744
748745 ctx := loginUserWithPasswordRemember (t , user .Name , "password" , true )
749746
@@ -815,10 +812,9 @@ func TestOAuth_GrantScopesReadRepositoriesPublicOnly(t *testing.T) {
815812 assert .Equal (t , reposExpected , reposCaptured )
816813}
817814
818- func TestOAuth_GrantScopesNotEnabledClaimGroups (t * testing.T ) {
815+ func TestOAuth_GrantScopesClaimGroupsAll (t * testing.T ) {
819816 defer tests .PrepareTestEnv (t )()
820817
821- setting .OAuth2 .EnableAdditionalGrantScopes = false
822818 user := unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
823819
824820 appBody := api.CreateOAuth2ApplicationOptions {
@@ -895,10 +891,9 @@ func TestOAuth_GrantScopesNotEnabledClaimGroups(t *testing.T) {
895891 }
896892}
897893
898- func TestOAuth_GrantScopesEnabledClaimGroups (t * testing.T ) {
894+ func TestOAuth_GrantScopesClaimGroupsPublicOnly (t * testing.T ) {
899895 defer tests .PrepareTestEnv (t )()
900896
901- setting .OAuth2 .EnableAdditionalGrantScopes = true
902897 user := unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
903898
904899 appBody := api.CreateOAuth2ApplicationOptions {
@@ -925,7 +920,7 @@ func TestOAuth_GrantScopesEnabledClaimGroups(t *testing.T) {
925920 err := db .Insert (db .DefaultContext , grant )
926921 require .NoError (t , err )
927922
928- assert .Contains (t , grant . Scope , "openid profile email groups" )
923+ assert .ElementsMatch (t , [] string { "openid" , " profile" , " email" , " groups"}, strings . Split ( grant . Scope , " " ) )
929924
930925 ctx := loginUserWithPasswordRemember (t , user .Name , "password" , true )
931926
0 commit comments