@@ -3503,12 +3503,20 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
3503
3503
enabled : true ,
3504
3504
clientId : 'CLIENT_ID' ,
3505
3505
issuer : 'https://oidc.com/issuer' ,
3506
+ clientSecret : 'CLIENT_SECRET' ,
3507
+ responseType : {
3508
+ code : true ,
3509
+ } ,
3506
3510
} ;
3507
3511
const expectedRequest = {
3508
3512
displayName : 'OIDC_DISPLAY_NAME' ,
3509
3513
enabled : true ,
3510
3514
clientId : 'CLIENT_ID' ,
3511
3515
issuer : 'https://oidc.com/issuer' ,
3516
+ clientSecret : 'CLIENT_SECRET' ,
3517
+ responseType : {
3518
+ code : true ,
3519
+ } ,
3512
3520
} ;
3513
3521
const expectedResult = utils . responseFrom ( deepExtend ( {
3514
3522
name : `projects/project1/oauthIdpConfigs/${ providerId } ` ,
@@ -3594,12 +3602,20 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
3594
3602
enabled : true ,
3595
3603
clientId : 'CLIENT_ID' ,
3596
3604
issuer : 'https://oidc.com/issuer' ,
3605
+ clientSecret : 'CLIENT_SECRET' ,
3606
+ responseType : {
3607
+ code : true ,
3608
+ } ,
3597
3609
} ;
3598
3610
const expectedRequest = {
3599
3611
displayName : 'OIDC_DISPLAY_NAME' ,
3600
3612
enabled : true ,
3601
3613
clientId : 'CLIENT_ID' ,
3602
3614
issuer : 'https://oidc.com/issuer' ,
3615
+ clientSecret : 'CLIENT_SECRET' ,
3616
+ responseType : {
3617
+ code : true ,
3618
+ } ,
3603
3619
} ;
3604
3620
const expectedResult = utils . responseFrom ( deepExtend ( {
3605
3621
name : `projects/project_id/oauthIdpConfigs/${ providerId } ` ,
@@ -3611,10 +3627,14 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
3611
3627
enabled : false ,
3612
3628
clientId : 'NEW_CLIENT_ID' ,
3613
3629
issuer : 'https://oidc.com/issuer2' ,
3630
+ clientSecret : 'CLIENT_SECRET' ,
3631
+ responseType : {
3632
+ code : true ,
3633
+ } ,
3614
3634
} ) ) ;
3615
3635
3616
3636
it ( 'should be fulfilled given full parameters' , ( ) => {
3617
- const expectedPath = path + '?updateMask=enabled,displayName,issuer,clientId' ;
3637
+ const expectedPath = path + '?updateMask=enabled,displayName,issuer,clientId,clientSecret,responseType.code ' ;
3618
3638
const stub = sinon . stub ( HttpClient . prototype , 'send' ) . resolves ( expectedResult ) ;
3619
3639
stubs . push ( stub ) ;
3620
3640
@@ -3708,7 +3728,7 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
3708
3728
} ) ;
3709
3729
3710
3730
it ( 'should be rejected when the backend returns a response missing name' , ( ) => {
3711
- const expectedPath = path + '?updateMask=enabled,displayName,issuer,clientId' ;
3731
+ const expectedPath = path + '?updateMask=enabled,displayName,issuer,clientId,clientSecret,responseType.code ' ;
3712
3732
const expectedError = new FirebaseAuthError (
3713
3733
AuthClientErrorCode . INTERNAL_ERROR ,
3714
3734
'INTERNAL ASSERT FAILED: Unable to update OIDC configuration' ,
@@ -3728,7 +3748,7 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
3728
3748
} ) ;
3729
3749
3730
3750
it ( 'should be rejected when the backend returns an error' , ( ) => {
3731
- const expectedPath = path + '?updateMask=enabled,displayName,issuer,clientId' ;
3751
+ const expectedPath = path + '?updateMask=enabled,displayName,issuer,clientId,clientSecret,responseType.code ' ;
3732
3752
const expectedServerError = utils . errorFrom ( {
3733
3753
error : {
3734
3754
message : 'INVALID_CONFIG' ,
0 commit comments