Skip to content

Commit 9f09419

Browse files
committed
Remove unnecessary tokio async handling in FakeOidcProvider
1 parent 16c0897 commit 9f09419

1 file changed

Lines changed: 1 addition & 37 deletions

File tree

tests/oidc/mod.rs

Lines changed: 1 addition & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ use serde_json::json;
1212
use sqlpage::webserver::http::create_app;
1313
use std::collections::HashMap;
1414
use std::sync::{Arc, Mutex};
15-
use tokio::sync::oneshot;
16-
use tokio::task::JoinHandle;
1715

1816
fn base64url_encode(data: &[u8]) -> String {
1917
base64::engine::general_purpose::URL_SAFE_NO_PAD.encode(data)
@@ -158,8 +156,6 @@ pub struct FakeOidcProvider {
158156
pub client_id: String,
159157
pub client_secret: String,
160158
state: SharedProviderState,
161-
_server_handle: JoinHandle<()>,
162-
_shutdown_tx: oneshot::Sender<()>,
163159
}
164160

165161
fn extract_set_cookies(headers: &header::HeaderMap) -> Vec<Cookie<'static>> {
@@ -187,8 +183,6 @@ impl FakeOidcProvider {
187183
jwt_customizer: None,
188184
}));
189185

190-
let (shutdown_tx, shutdown_rx) = oneshot::channel();
191-
192186
let state_for_server = Arc::clone(&state);
193187
let server = HttpServer::new(move || {
194188
let state = Data::new(Arc::clone(&state_for_server));
@@ -207,12 +201,7 @@ impl FakeOidcProvider {
207201
.shutdown_timeout(1)
208202
.run();
209203

210-
let server_handle = tokio::spawn(async move {
211-
tokio::select! {
212-
_ = server => {},
213-
_ = shutdown_rx => {},
214-
}
215-
});
204+
tokio::spawn(server);
216205

217206
let client = awc::Client::default();
218207
let start = std::time::Instant::now();
@@ -232,8 +221,6 @@ impl FakeOidcProvider {
232221
client_id,
233222
client_secret,
234223
state,
235-
_server_handle: server_handle,
236-
_shutdown_tx: shutdown_tx,
237224
}
238225
}
239226

@@ -318,29 +305,6 @@ async fn setup_oidc_test(
318305
(app, provider)
319306
}
320307

321-
#[actix_web::test]
322-
async fn test_fake_provider_discovery() {
323-
let provider = FakeOidcProvider::new().await;
324-
let client = awc::Client::default();
325-
326-
let discovery_url = format!("{}/.well-known/openid-configuration", provider.issuer_url);
327-
let resp = client
328-
.get(&discovery_url)
329-
.send()
330-
.await
331-
.expect("Failed to connect to fake provider");
332-
333-
assert_eq!(resp.status(), StatusCode::OK);
334-
let mut resp = resp;
335-
let discovery: DiscoveryResponse = resp.json().await.expect("Failed to parse discovery");
336-
assert_eq!(discovery.issuer, provider.issuer_url);
337-
assert_eq!(
338-
discovery.token_endpoint,
339-
format!("{}/token", provider.issuer_url)
340-
);
341-
assert_eq!(discovery.jwks_uri, format!("{}/jwks", provider.issuer_url));
342-
}
343-
344308
#[actix_web::test]
345309
async fn test_oidc_happy_path() {
346310
let (app, provider) = setup_oidc_test(|_| {}).await;

0 commit comments

Comments
 (0)