@@ -490,7 +490,6 @@ func TestOAuthIntrospection(t *testing.T) {
490490func  TestOAuth_GrantScopesReadUserFailRepos (t  * testing.T ) {
491491	defer  tests .PrepareTestEnv (t )()
492492
493- 	setting .OAuth2 .EnableAdditionalGrantScopes  =  true 
494493	user  :=  unittest .AssertExistsAndLoadBean (t , & user_model.User {ID : 2 })
495494	appBody  :=  api.CreateOAuth2ApplicationOptions {
496495		Name : "oauth-provider-scopes-test" ,
@@ -516,7 +515,7 @@ func TestOAuth_GrantScopesReadUserFailRepos(t *testing.T) {
516515	err  :=  db .Insert (db .DefaultContext , grant )
517516	require .NoError (t , err )
518517
519- 	assert .Contains (t , grant . Scope ,  "openid  profile  email  read:user" )
518+ 	assert .ElementsMatch (t , [] string { "openid"  ,  " profile" ,  " email" ,  " read:user"},  strings . Split ( grant . Scope ,  " " ) )
520519
521520	ctx  :=  loginUserWithPasswordRemember (t , user .Name , "password" , true )
522521
@@ -572,7 +571,6 @@ func TestOAuth_GrantScopesReadUserFailRepos(t *testing.T) {
572571func  TestOAuth_GrantScopesReadRepositoryFailOrganization (t  * testing.T ) {
573572	defer  tests .PrepareTestEnv (t )()
574573
575- 	setting .OAuth2 .EnableAdditionalGrantScopes  =  true 
576574	user  :=  unittest .AssertExistsAndLoadBean (t , & user_model.User {ID : 2 })
577575	appBody  :=  api.CreateOAuth2ApplicationOptions {
578576		Name : "oauth-provider-scopes-test" ,
@@ -598,7 +596,7 @@ func TestOAuth_GrantScopesReadRepositoryFailOrganization(t *testing.T) {
598596	err  :=  db .Insert (db .DefaultContext , grant )
599597	require .NoError (t , err )
600598
601- 	assert .Contains (t , grant . Scope ,  "openid  profile  email  read:user  read:repository" )
599+ 	assert .ElementsMatch (t , [] string { "openid"  ,  " profile" ,  " email" ,  " read:user" ,  " read:repository"},  strings . Split ( grant . Scope ,  " " ) )
602600
603601	ctx  :=  loginUserWithPasswordRemember (t , user .Name , "password" , true )
604602
@@ -716,7 +714,6 @@ func TestOAuth_GrantScopesReadRepositoryFailOrganization(t *testing.T) {
716714func  TestOAuth_GrantScopesReadRepositoriesPublicOnly (t  * testing.T ) {
717715	defer  tests .PrepareTestEnv (t )()
718716
719- 	setting .OAuth2 .EnableAdditionalGrantScopes  =  true 
720717	user  :=  unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
721718
722719	appBody  :=  api.CreateOAuth2ApplicationOptions {
@@ -743,7 +740,7 @@ func TestOAuth_GrantScopesReadRepositoriesPublicOnly(t *testing.T) {
743740	err  :=  db .Insert (db .DefaultContext , grant )
744741	require .NoError (t , err )
745742
746- 	assert .Contains (t , grant . Scope ,  "openid  profile  email  groups  public-only  read:user  read:repository" )
743+ 	assert .ElementsMatch (t , [] string { "openid"  ,  " profile" ,  " email" ,  " groups" ,  " public-only" ,  " read:user" ,  " read:repository"},  strings . Split ( grant . Scope ,  " " ) )
747744
748745	ctx  :=  loginUserWithPasswordRemember (t , user .Name , "password" , true )
749746
@@ -815,10 +812,9 @@ func TestOAuth_GrantScopesReadRepositoriesPublicOnly(t *testing.T) {
815812	assert .Equal (t , reposExpected , reposCaptured )
816813}
817814
818- func  TestOAuth_GrantScopesNotEnabledClaimGroups (t  * testing.T ) {
815+ func  TestOAuth_GrantScopesClaimGroupsAll (t  * testing.T ) {
819816	defer  tests .PrepareTestEnv (t )()
820817
821- 	setting .OAuth2 .EnableAdditionalGrantScopes  =  false 
822818	user  :=  unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
823819
824820	appBody  :=  api.CreateOAuth2ApplicationOptions {
@@ -839,13 +835,13 @@ func TestOAuth_GrantScopesNotEnabledClaimGroups(t *testing.T) {
839835	grant  :=  & auth_model.OAuth2Grant {
840836		ApplicationID : app .ID ,
841837		UserID :        user .ID ,
842- 		Scope :         "openid profile email groups" ,
838+ 		Scope :         "openid profile email groups all " ,
843839	}
844840
845841	err  :=  db .Insert (db .DefaultContext , grant )
846842	require .NoError (t , err )
847843
848- 	assert .Contains (t , grant . Scope ,  "openid  profile  email  groups" )
844+ 	assert .ElementsMatch (t , [] string { "openid"  ,  " profile" ,  " email" ,  " groups",  "all" },  strings . Split ( grant . Scope ,  " " ) )
849845
850846	ctx  :=  loginUserWithPasswordRemember (t , user .Name , "password" , true )
851847
@@ -895,10 +891,9 @@ func TestOAuth_GrantScopesNotEnabledClaimGroups(t *testing.T) {
895891	}
896892}
897893
898- func  TestOAuth_GrantScopesEnabledClaimGroups (t  * testing.T ) {
894+ func  TestOAuth_GrantScopesClaimGroupsPublicOnly (t  * testing.T ) {
899895	defer  tests .PrepareTestEnv (t )()
900896
901- 	setting .OAuth2 .EnableAdditionalGrantScopes  =  true 
902897	user  :=  unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
903898
904899	appBody  :=  api.CreateOAuth2ApplicationOptions {
@@ -925,7 +920,7 @@ func TestOAuth_GrantScopesEnabledClaimGroups(t *testing.T) {
925920	err  :=  db .Insert (db .DefaultContext , grant )
926921	require .NoError (t , err )
927922
928- 	assert .Contains (t , grant . Scope ,  "openid  profile  email  groups" )
923+ 	assert .ElementsMatch (t , [] string { "openid"  ,  " profile" ,  " email" ,  " groups"},  strings . Split ( grant . Scope ,  " " ) )
929924
930925	ctx  :=  loginUserWithPasswordRemember (t , user .Name , "password" , true )
931926
0 commit comments