test/e2e: fix the OIDC discovery test with ECDSA service account key

By default oidc library enables only `RS256` signature validation
method.

Signed-off-by: Andrey Smirnov <smirnov.andrey@gmail.com>
This commit is contained in:
Andrey Smirnov 2021-03-30 20:19:57 +03:00
parent 3d48f0d1dd
commit f9aaf71ccb
4 changed files with 7 additions and 4 deletions

View File

@ -18,7 +18,7 @@ dependencies:
# agnhost: bump this one first
- name: "agnhost"
version: "2.30"
version: "2.31"
refPaths:
- path: test/images/agnhost/VERSION
match: \d.\d

View File

@ -1 +1 @@
2.30
2.31

View File

@ -51,7 +51,7 @@ import (
func main() {
rootCmd := &cobra.Command{
Use: "app",
Version: "2.30",
Version: "2.31",
}
rootCmd.AddCommand(auditproxy.CmdAuditProxy)

View File

@ -97,7 +97,10 @@ func main(cmd *cobra.Command, args []string) {
}
log.Printf("OK: Constructed OIDC provider for issuer %v", unsafeClaims.Issuer)
validTok, err := iss.Verifier(&oidc.Config{ClientID: audience}).Verify(ctx, raw)
validTok, err := iss.Verifier(&oidc.Config{
ClientID: audience,
SupportedSigningAlgs: []string{oidc.RS256, oidc.ES256},
}).Verify(ctx, raw)
if err != nil {
log.Fatal(err)
}