>>> dex-idp: Building community/dex-idp 2.44.0-r6 (using abuild 3.16.0-r0) started Thu, 05 Feb 2026 09:45:41 +0000 >>> dex-idp: Validating /home/buildozer/aports/community/dex-idp/APKBUILD... >>> dex-idp: Analyzing dependencies... >>> dex-idp: Installing for build: build-base go tzdata (1/3) Installing go (1.25.7-r0) (2/3) Installing tzdata (2025c-r0) (3/3) Installing .makedepends-dex-idp (20260205.094542) Executing busybox-1.37.0-r30.trigger OK: 486.6 MiB in 108 packages >>> dex-idp: Cleaning up srcdir >>> dex-idp: Cleaning up pkgdir >>> dex-idp: Cleaning up tmpdir >>> dex-idp: Fetching https://distfiles.alpinelinux.org/distfiles/v3.23/dex-idp-2.44.0.tar.gz Connecting to distfiles.alpinelinux.org (172.105.82.32:443) saving to '/var/cache/distfiles/v3.23/dex-idp-2.44.0.tar.gz.part' dex-idp-2.44.0.tar.g 43% |************* | 351k 0:00:01 ETA dex-idp-2.44.0.tar.g 100% |********************************| 804k 0:00:00 ETA '/var/cache/distfiles/v3.23/dex-idp-2.44.0.tar.gz.part' saved /var/cache/distfiles/v3.23/dex-idp-2.44.0.tar.gz: OK /home/buildozer/aports/community/dex-idp/dex-idp.initd: OK >>> dex-idp: Fetching https://distfiles.alpinelinux.org/distfiles/v3.23/dex-idp-2.44.0.tar.gz /var/cache/distfiles/v3.23/dex-idp-2.44.0.tar.gz: OK /home/buildozer/aports/community/dex-idp/dex-idp.initd: OK >>> dex-idp: Unpacking /var/cache/distfiles/v3.23/dex-idp-2.44.0.tar.gz... fatal: not a git repository (or any of the parent directories): .git go: downloading github.com/ghodss/yaml v1.0.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 go: downloading github.com/oklog/run v1.2.0 go: downloading github.com/AppsFlyer/go-sundheit v0.6.0 go: downloading github.com/spf13/cobra v1.9.1 go: downloading google.golang.org/grpc v1.75.0 go: downloading google.golang.org/protobuf v1.36.8 go: downloading golang.org/x/crypto v0.41.0 go: downloading go.etcd.io/etcd/client/v3 v3.6.4 go: downloading go.etcd.io/etcd/client/pkg/v3 v3.6.4 go: downloading github.com/go-jose/go-jose/v4 v4.1.2 go: downloading github.com/Masterminds/semver v1.5.0 go: downloading golang.org/x/net v0.43.0 go: downloading github.com/lib/pq v1.10.9 go: downloading github.com/mattn/go-sqlite3 v1.14.32 go: downloading entgo.io/ent v0.14.5 go: downloading github.com/go-sql-driver/mysql v1.9.3 go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/Masterminds/sprig/v3 v3.3.0 go: downloading github.com/coreos/go-oidc/v3 v3.14.1 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/gorilla/handlers v1.5.2 go: downloading github.com/gorilla/mux v1.8.1 go: downloading cloud.google.com/go/compute/metadata v0.8.0 go: downloading golang.org/x/exp v0.0.0-20221004215720-b9f4876ce741 go: downloading google.golang.org/api v0.248.0 go: downloading github.com/russellhaering/goxmldsig v1.5.0 go: downloading github.com/beevik/etree v1.6.0 go: downloading github.com/mattermost/xml-roundtrip-validator v0.1.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/go-ldap/ldap/v3 v3.4.11 go: downloading github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 go: downloading github.com/go-asn1-ber/asn1-ber v1.5.8-0.20250403174932-29230038a667 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/felixge/httpsnoop v1.0.4 go: downloading github.com/spf13/pflag v1.0.6 go: downloading go.uber.org/zap v1.27.0 go: downloading golang.org/x/sys v0.35.0 go: downloading github.com/jonboulle/clockwork v0.5.0 go: downloading ariga.io/atlas v0.32.1-0.20250325101103-175b25e1c1b9 go: downloading go.etcd.io/etcd/api/v3 v3.6.4 go: downloading github.com/coreos/go-semver v0.3.1 go: downloading github.com/coreos/go-systemd/v22 v22.5.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250818200422-3122310a409c go: downloading filippo.io/edwards25519 v1.1.0 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250707201910-8d1bb00bc6a7 go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.3 go: downloading dario.cat/mergo v1.0.1 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/shopspring/decimal v1.4.0 go: downloading github.com/spf13/cast v1.7.0 go: downloading github.com/Masterminds/semver/v3 v3.3.0 go: downloading github.com/huandu/xstrings v1.5.0 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/procfs v0.16.1 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading github.com/zclconf/go-cty v1.14.4 go: downloading github.com/hashicorp/hcl/v2 v2.18.1 go: downloading github.com/bmatcuk/doublestar v1.3.4 go: downloading golang.org/x/mod v0.26.0 go: downloading github.com/go-openapi/inflect v0.19.0 go: downloading github.com/zclconf/go-cty-yaml v1.1.0 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading golang.org/x/text v0.28.0 go: downloading github.com/apparentlymart/go-textseg/v15 v15.0.0 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/agext/levenshtein v1.2.3 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/googleapis/gax-go/v2 v2.15.0 go: downloading cloud.google.com/go/auth v0.16.5 go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 go: downloading github.com/google/s2a-go v0.1.9 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.6 go: downloading go.opentelemetry.io/otel/trace v1.37.0 go: downloading go.opentelemetry.io/otel v1.37.0 go: downloading go.opentelemetry.io/otel/metric v1.37.0 go: downloading github.com/go-logr/logr v1.4.3 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading go.opentelemetry.io/auto/sdk v1.1.0 internal/goarch internal/unsafeheader internal/byteorder internal/godebugs internal/goos internal/profilerecord internal/asan internal/coverage/rtcov internal/msan internal/itoa internal/trace/tracev2 math/bits cmp container/list internal/goexperiment unicode/utf8 crypto/internal/fips140/alias unicode vendor/golang.org/x/crypto/cryptobyte/asn1 internal/nettrace vendor/golang.org/x/crypto/internal/alias unicode/utf16 encoding entgo.io/ent/schema github.com/agext/levenshtein golang.org/x/exp/constraints github.com/google/go-cmp/cmp/internal/flags google.golang.org/grpc/serviceconfig github.com/lib/pq/oid log/internal golang.org/x/crypto/internal/alias golang.org/x/crypto/cryptobyte/asn1 internal/cpu github.com/googleapis/gax-go/v2/internal crypto/internal/boring/sig sync/atomic go.opentelemetry.io/otel/trace/embedded internal/runtime/math log/slog/internal internal/runtime/syscall internal/runtime/gc internal/runtime/sys google.golang.org/protobuf/internal/flags github.com/dexidp/dex/pkg/groups go.opentelemetry.io/otel/metric/embedded golang.org/x/net/html/atom internal/abi crypto/internal/fips140deps/byteorder entgo.io/ent/schema/index internal/runtime/strconv google.golang.org/protobuf/internal/set golang.org/x/exp/slices math internal/bytealg crypto/internal/fips140deps/cpu internal/runtime/atomic internal/chacha8rand internal/stringslite internal/runtime/cgroup internal/runtime/exithook internal/race internal/synctest internal/sync internal/runtime/maps runtime iter crypto/internal/fips140/subtle weak internal/reflectlite runtime/metrics sync maps slices crypto/subtle errors sort internal/oserror path math/rand/v2 vendor/golang.org/x/net/dns/dnsmessage strconv internal/bisect internal/testlog internal/singleflight io syscall crypto/internal/fips140cache google.golang.org/protobuf/internal/pragma google.golang.org/grpc/internal/buffer log/slog/internal/buffer unique ariga.io/atlas/sql/postgres/internal/postgresop go.uber.org/zap/internal/pool runtime/cgo internal/godebug github.com/beorn7/perks/quantile bytes hash crypto/internal/randutil strings internal/saferio encoding/base32 net/netip golang.org/x/crypto/blowfish encoding/base64 reflect github.com/prometheus/client_golang/prometheus/promhttp/internal crypto hash/crc32 hash/adler32 hash/fnv hash/crc64 golang.org/x/crypto/md4 crypto/internal/fips140deps/godebug math/rand github.com/mitchellh/go-wordwrap golang.org/x/text/transform vendor/golang.org/x/text/transform net/http/internal/ascii github.com/munnerz/goautoneg golang.org/x/mod/semver crypto/internal/fips140 bufio regexp/syntax html encoding/pem crypto/internal/impl github.com/huandu/xstrings crypto/internal/fips140/sha256 crypto/internal/fips140/sha512 crypto/internal/fips140/sha3 github.com/apparentlymart/go-textseg/v15/textseg internal/syscall/execenv internal/syscall/unix time crypto/internal/fips140/hmac crypto/sha3 crypto/internal/fips140/check crypto/internal/fips140hash crypto/internal/fips140/tls12 crypto/internal/fips140/edwards25519/field crypto/fips140 crypto/internal/fips140/pbkdf2 crypto/internal/fips140/bigmod crypto/internal/fips140/hkdf crypto/internal/fips140/aes crypto/internal/fips140/nistec/fiat crypto/tls/internal/fips140tls crypto/internal/fips140/tls13 crypto/internal/fips140/edwards25519 regexp google.golang.org/api/internal/third_party/uritemplates google.golang.org/grpc/backoff context io/fs google.golang.org/grpc/balancer/pickfirst/internal internal/poll google.golang.org/grpc/keepalive go.uber.org/zap/buffer github.com/google/go-cmp/cmp/internal/diff go.uber.org/zap/internal/bufferpool go.uber.org/zap/internal/stacktrace google.golang.org/grpc/internal/backoff go.opentelemetry.io/otel/internal/baggage google.golang.org/grpc/internal/grpcsync golang.org/x/net/context embed internal/filepathlite google.golang.org/protobuf/internal/editiondefaults github.com/dexidp/dex/web os internal/fmtsort go.opentelemetry.io/otel/attribute/internal entgo.io/ent/schema/edge encoding/binary github.com/google/go-cmp/cmp/internal/function crypto/internal/fips140/nistec golang.org/x/crypto/internal/poly1305 vendor/golang.org/x/crypto/internal/poly1305 github.com/cespare/xxhash/v2 filippo.io/edwards25519/field golang.org/x/sys/unix filippo.io/edwards25519 crypto/internal/sysrand path/filepath io/ioutil google.golang.org/protobuf/internal/detrand go.uber.org/zap/internal/exit github.com/dexidp/dex/pkg/featureflags fmt github.com/prometheus/procfs/internal/util google.golang.org/grpc/internal/envconfig os/signal net crypto/internal/entropy crypto/internal/fips140/drbg crypto/internal/fips140only crypto/internal/fips140/ed25519 crypto/internal/fips140/aes/gcm crypto/internal/fips140/mlkem crypto/internal/fips140/rsa os/exec crypto/hkdf crypto/rc4 crypto/pbkdf2 crypto/md5 crypto/cipher vendor/golang.org/x/crypto/chacha20 crypto/internal/boring golang.org/x/crypto/chacha20 crypto/des crypto/aes crypto/sha512 crypto/hmac crypto/sha256 crypto/sha1 golang.org/x/crypto/chacha20poly1305 golang.org/x/crypto/pbkdf2 golang.org/x/crypto/hkdf vendor/golang.org/x/crypto/chacha20poly1305 crypto/internal/fips140/ecdh crypto/internal/fips140/ecdsa golang.org/x/crypto/scrypt encoding/hex log net/url net/http/internal mime/quotedprintable mime vendor/golang.org/x/net/http2/hpack google.golang.org/protobuf/internal/errors text/tabwriter compress/flate google.golang.org/grpc/internal/idle encoding/json go/token dario.cat/mergo github.com/pkg/errors golang.org/x/net/http2/hpack google.golang.org/protobuf/internal/version github.com/mitchellh/reflectwalk database/sql/driver os/user github.com/go-jose/go-jose/v4/json github.com/googleapis/gax-go/v2/callctx encoding/gob vendor/golang.org/x/text/unicode/norm golang.org/x/text/unicode/norm text/template/parse github.com/jonboulle/clockwork google.golang.org/grpc/attributes encoding/xml math/big github.com/prometheus/procfs/internal/fs encoding/csv github.com/zclconf/go-cty/cty/set github.com/bmatcuk/doublestar go.etcd.io/etcd/client/pkg/v3/verify github.com/google/go-cmp/cmp/internal/value flag runtime/trace github.com/go-openapi/inflect github.com/coreos/go-semver/semver github.com/oklog/run runtime/debug github.com/go-asn1-ber/asn1-ber go.uber.org/zap/internal/color go.uber.org/multierr gopkg.in/yaml.v2 golang.org/x/net/html google.golang.org/protobuf/encoding/protowire github.com/google/s2a-go/internal/record/internal/aeadcrypter crypto/ecdh go.etcd.io/etcd/api/v3/version github.com/AppsFlyer/go-sundheit google.golang.org/protobuf/reflect/protoreflect golang.org/x/net/internal/timeseries golang.org/x/text/unicode/bidi vendor/golang.org/x/text/unicode/bidi github.com/mitchellh/copystructure github.com/google/go-cmp/cmp database/sql go.opentelemetry.io/otel/baggage compress/gzip compress/zlib internal/profile runtime/pprof golang.org/x/text/secure/bidirule vendor/golang.org/x/text/secure/bidirule text/template google.golang.org/protobuf/internal/encoding/messageset google.golang.org/protobuf/internal/order google.golang.org/protobuf/internal/strs google.golang.org/protobuf/runtime/protoiface google.golang.org/protobuf/internal/descfmt google.golang.org/protobuf/internal/descopts google.golang.org/protobuf/internal/genid github.com/zclconf/go-cty/cty/ctystrings golang.org/x/net/idna google.golang.org/protobuf/internal/protolazy github.com/mattermost/xml-roundtrip-validator github.com/beevik/etree google.golang.org/protobuf/internal/encoding/json google.golang.org/protobuf/internal/encoding/text google.golang.org/protobuf/reflect/protoregistry vendor/golang.org/x/net/idna github.com/fsnotify/fsnotify/internal google.golang.org/grpc/grpclog/internal github.com/Masterminds/semver/v3 log/slog go.opentelemetry.io/otel/attribute go.opentelemetry.io/otel/codes go.opentelemetry.io/auto/sdk/internal/telemetry go.opentelemetry.io/otel/trace/internal/telemetry github.com/dexidp/dex/storage/kubernetes/k8sapi entgo.io/ent/schema/field ariga.io/atlas/sql/schema entgo.io/ent/entql github.com/Masterminds/semver go.uber.org/zap/zapcore github.com/gogo/protobuf/proto google.golang.org/protobuf/proto github.com/fsnotify/fsnotify google.golang.org/protobuf/internal/encoding/defval google.golang.org/grpc/grpclog github.com/mattn/go-sqlite3 github.com/ghodss/yaml google.golang.org/grpc/connectivity google.golang.org/grpc/internal/grpclog github.com/google/s2a-go/retry crypto/internal/boring/bbig crypto/elliptic crypto/dsa crypto/rand encoding/asn1 github.com/shopspring/decimal github.com/zclconf/go-cty/cty html/template github.com/googleapis/enterprise-certificate-proxy/client/util cloud.google.com/go/auth/internal/credsfile archive/tar crypto/ed25519 crypto/internal/hpke golang.org/x/crypto/bcrypt github.com/lib/pq/scram github.com/Masterminds/goutils crypto/rsa go.opentelemetry.io/otel/metric go.opentelemetry.io/otel/semconv/v1.20.0 go.opentelemetry.io/otel/semconv/v1.26.0 go.opentelemetry.io/otel/semconv/v1.34.0 github.com/russellhaering/goxmldsig/types github.com/russellhaering/goxmldsig/etreeutils google.golang.org/protobuf/encoding/prototext google.golang.org/protobuf/encoding/protodelim google.golang.org/protobuf/internal/filedesc github.com/googleapis/gax-go/v2/internallog/internal github.com/go-logr/logr golang.org/x/oauth2/jws cloud.google.com/go/auth/internal/jwt crypto/x509/pkix golang.org/x/crypto/cryptobyte vendor/golang.org/x/crypto/cryptobyte go.opentelemetry.io/otel/metric/noop github.com/go-logr/logr/funcr entgo.io/ent go.uber.org/zap/internal github.com/spf13/cast crypto/ecdsa ariga.io/atlas/sql/migrate github.com/go-logr/stdr go.opentelemetry.io/otel/trace google.golang.org/protobuf/encoding/protojson google.golang.org/protobuf/internal/encoding/tag go.opentelemetry.io/otel/trace/noop ariga.io/atlas/sql/sqltool ariga.io/atlas/sql/internal/sqlx github.com/go-jose/go-jose/v4/cipher go.opentelemetry.io/auto/sdk google.golang.org/protobuf/internal/impl github.com/zclconf/go-cty/cty/function github.com/zclconf/go-cty/cty/convert github.com/zclconf/go-cty/cty/json github.com/zclconf/go-cty/cty/gocty github.com/hashicorp/hcl/v2 github.com/zclconf/go-cty-yaml vendor/golang.org/x/net/http/httpproxy google.golang.org/grpc/internal net/textproto go.etcd.io/etcd/client/pkg/v3/systemd google.golang.org/grpc/internal/resolver/dns/internal google.golang.org/grpc/internal/syscall go.etcd.io/etcd/client/v3/internal/endpoint github.com/coreos/go-systemd/v22/journal go.etcd.io/etcd/client/pkg/v3/types crypto/x509 github.com/google/uuid github.com/spf13/pflag github.com/prometheus/procfs google.golang.org/grpc/metadata google.golang.org/grpc/codes google.golang.org/grpc/mem ariga.io/atlas/sql/mysql/internal/mysqlversion vendor/golang.org/x/net/http/httpguts golang.org/x/net/http/httpguts mime/multipart google.golang.org/grpc/internal/balancerload google.golang.org/grpc/tap google.golang.org/grpc/stats google.golang.org/grpc/internal/grpcutil entgo.io/ent/dialect google.golang.org/grpc/experimental/stats google.golang.org/grpc/encoding github.com/zclconf/go-cty/cty/function/stdlib google.golang.org/grpc/internal/stats entgo.io/ent/dialect/sql github.com/hashicorp/hcl/v2/ext/customdecode github.com/hashicorp/hcl/v2/ext/tryfunc github.com/gogo/protobuf/protoc-gen-gogo/descriptor github.com/spf13/cobra github.com/Masterminds/sprig/v3 github.com/go-jose/go-jose/v4 crypto/tls github.com/hashicorp/hcl/v2/hclsyntax github.com/gogo/protobuf/gogoproto github.com/dexidp/dex/storage github.com/dexidp/dex/storage/ent/db/predicate entgo.io/ent/dialect/entsql entgo.io/ent/dialect/sql/sqljson entgo.io/ent/dialect/sql/sqlgraph github.com/dexidp/dex/storage/memory github.com/dexidp/dex/storage/ent/schema github.com/dexidp/dex/storage/ent/db/authcode github.com/dexidp/dex/storage/ent/db/authrequest github.com/dexidp/dex/storage/ent/db/keys github.com/dexidp/dex/storage/ent/db/oauth2client github.com/dexidp/dex/storage/ent/db/devicetoken github.com/dexidp/dex/storage/ent/db/offlinesession github.com/dexidp/dex/storage/ent/db/password github.com/dexidp/dex/storage/ent/db/devicerequest github.com/dexidp/dex/storage/ent/db/refreshtoken github.com/dexidp/dex/storage/ent/db/connector google.golang.org/protobuf/internal/filetype google.golang.org/protobuf/runtime/protoimpl google.golang.org/protobuf/protoadapt google.golang.org/protobuf/types/known/durationpb google.golang.org/protobuf/types/known/timestamppb github.com/google/s2a-go/internal/proto/common_go_proto google.golang.org/protobuf/types/known/anypb google.golang.org/genproto/googleapis/rpc/code github.com/dexidp/dex/server/internal github.com/google/s2a-go/internal/proto/v2/common_go_proto google.golang.org/protobuf/types/known/structpb google.golang.org/protobuf/types/descriptorpb google.golang.org/genproto/googleapis/api github.com/hashicorp/hcl/v2/json github.com/hashicorp/hcl/v2/hclwrite google.golang.org/grpc/internal/pretty google.golang.org/grpc/encoding/proto google.golang.org/genproto/googleapis/rpc/status github.com/googleapis/gax-go/v2/apierror/internal/proto google.golang.org/genproto/googleapis/rpc/errdetails google.golang.org/grpc/binarylog/grpc_binarylog_v1 github.com/prometheus/client_model/go github.com/google/s2a-go/internal/proto/s2a_context_go_proto github.com/google/s2a-go/internal/record/internal/halfconn github.com/google/s2a-go/internal/tokenmanager github.com/google/s2a-go/internal/proto/v2/s2a_context_go_proto google.golang.org/grpc/internal/status google.golang.org/grpc/status github.com/hashicorp/hcl/v2/hclparse github.com/prometheus/common/model go.etcd.io/etcd/api/v3/v3rpc/rpctypes google.golang.org/grpc/internal/binarylog github.com/hashicorp/hcl/v2/gohcl google.golang.org/protobuf/internal/editionssupport google.golang.org/protobuf/types/gofeaturespb github.com/grpc-ecosystem/grpc-gateway/v2/protoc-gen-openapiv2/options google.golang.org/genproto/googleapis/api/annotations net/http/httptrace google.golang.org/grpc/internal/credentials go.etcd.io/etcd/client/pkg/v3/tlsutil github.com/russellhaering/goxmldsig github.com/go-sql-driver/mysql github.com/lib/pq google.golang.org/protobuf/reflect/protodesc net/http/internal/httpcommon golang.org/x/net/internal/httpcommon google.golang.org/grpc/credentials github.com/prometheus/client_golang/prometheus/internal ariga.io/atlas/schemahcl net/http google.golang.org/grpc/credentials/insecure github.com/google/s2a-go/fallback google.golang.org/grpc/resolver google.golang.org/grpc/internal/channelz go.etcd.io/etcd/client/v3/credentials google.golang.org/grpc/peer google.golang.org/grpc/internal/proxyattributes google.golang.org/grpc/internal/transport/networktype google.golang.org/grpc/internal/resolver/passthrough google.golang.org/grpc/balancer/grpclb/state google.golang.org/grpc/resolver/manual google.golang.org/grpc/internal/metadata google.golang.org/grpc/internal/resolver/dns google.golang.org/grpc/internal/resolver/unix go.etcd.io/etcd/client/v3/internal/resolver google.golang.org/grpc/resolver/dns google.golang.org/grpc/channelz google.golang.org/grpc/balancer github.com/golang/protobuf/proto google.golang.org/grpc/internal/serviceconfig google.golang.org/grpc/balancer/pickfirst/pickfirstleaf google.golang.org/grpc/balancer/base google.golang.org/grpc/internal/resolver google.golang.org/grpc/balancer/endpointsharding google.golang.org/grpc/internal/balancer/gracefulswitch google.golang.org/grpc/balancer/pickfirst google.golang.org/grpc/balancer/roundrobin go.etcd.io/etcd/api/v3/versionpb go.etcd.io/etcd/api/v3/mvccpb go.etcd.io/etcd/api/v3/authpb go.etcd.io/etcd/api/v3/membershippb ariga.io/atlas/sql/sqlspec ariga.io/atlas/sql/sqlclient ariga.io/atlas/sql/internal/specutil ariga.io/atlas/sql/sqlite ariga.io/atlas/sql/mysql ariga.io/atlas/sql/postgres entgo.io/ent/dialect/sql/schema github.com/AppsFlyer/go-sundheit/http github.com/AppsFlyer/go-sundheit/checks golang.org/x/net/trace golang.org/x/oauth2/internal net/http/httputil github.com/dexidp/dex/connector github.com/dexidp/dex/pkg/httpclient github.com/googleapis/gax-go/v2/internallog github.com/felixge/httpsnoop cloud.google.com/go/compute/metadata google.golang.org/api/googleapi net/rpc github.com/prometheus/client_golang/internal/github.com/golang/gddo/httputil/header expvar net/http/pprof go.opentelemetry.io/otel/propagation go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp/internal/semconvutil google.golang.org/api/googleapi/transport github.com/Azure/go-ntlmssp github.com/gorilla/mux go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp/internal/request github.com/prometheus/common/expfmt go.uber.org/zap golang.org/x/net/http2 github.com/dexidp/dex/connector/keystone github.com/dexidp/dex/connector/atlassiancrowd github.com/dexidp/dex/connector/mock github.com/dexidp/dex/connector/saml github.com/dexidp/dex/connector/authproxy github.com/prometheus/client_golang/internal/github.com/golang/gddo/httputil golang.org/x/oauth2 go.opentelemetry.io/otel/internal/global github.com/googleapis/gax-go/v2/apierror cloud.google.com/go/auth/internal github.com/go-ldap/ldap/v3 golang.org/x/oauth2/bitbucket github.com/coreos/go-oidc/v3/oidc github.com/dexidp/dex/connector/gitea golang.org/x/oauth2/authhandler github.com/dexidp/dex/connector/gitlab golang.org/x/oauth2/endpoints golang.org/x/oauth2/google/internal/impersonate golang.org/x/oauth2/jwt google.golang.org/api/internal/impersonate github.com/dexidp/dex/connector/linkedin github.com/dexidp/dex/connector/microsoft golang.org/x/oauth2/google/internal/stsexchange github.com/dexidp/dex/connector/oauth github.com/dexidp/dex/connector/openshift github.com/dexidp/dex/connector/bitbucketcloud golang.org/x/oauth2/github cloud.google.com/go/auth github.com/dexidp/dex/connector/github github.com/gorilla/handlers golang.org/x/oauth2/google/internal/externalaccountauthorizeduser golang.org/x/oauth2/google/externalaccount github.com/googleapis/enterprise-certificate-proxy/client go.opentelemetry.io/otel github.com/prometheus/client_golang/prometheus github.com/dexidp/dex/connector/oidc cloud.google.com/go/auth/credentials/internal/stsexchange cloud.google.com/go/auth/credentials/internal/gdch cloud.google.com/go/auth/credentials/internal/impersonate google.golang.org/api/internal/cert cloud.google.com/go/auth/internal/transport/cert go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp/internal/semconv cloud.google.com/go/auth/credentials/internal/externalaccountuser cloud.google.com/go/auth/credentials/internal/externalaccount golang.org/x/oauth2/google github.com/dexidp/dex/storage/ent/db/migrate go.uber.org/zap/zapgrpc go.etcd.io/etcd/client/pkg/v3/logutil go.etcd.io/etcd/client/pkg/v3/fileutil github.com/dexidp/dex/storage/ent/db cloud.google.com/go/auth/oauth2adapt go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp cloud.google.com/go/auth/credentials go.etcd.io/etcd/client/pkg/v3/transport github.com/dexidp/dex/connector/ldap github.com/dexidp/dex/storage/kubernetes google.golang.org/grpc/internal/transport github.com/prometheus/client_golang/prometheus/collectors github.com/prometheus/client_golang/prometheus/promhttp google.golang.org/grpc/internal/resolver/delegatingresolver google.golang.org/grpc github.com/google/s2a-go/internal/handshaker/service github.com/googleapis/gax-go/v2 github.com/grpc-ecosystem/go-grpc-prometheus google.golang.org/grpc/reflection/grpc_reflection_v1 github.com/google/s2a-go/internal/proto/s2a_go_proto github.com/google/s2a-go/internal/proto/v2/s2a_go_proto google.golang.org/grpc/reflection/grpc_reflection_v1alpha github.com/dexidp/dex/api/v2 go.etcd.io/etcd/api/v3/etcdserverpb google.golang.org/grpc/reflection/internal github.com/google/s2a-go/internal/authinfo github.com/google/s2a-go/internal/record google.golang.org/grpc/reflection github.com/google/s2a-go/stream github.com/google/s2a-go/internal/handshaker github.com/google/s2a-go/internal/v2/certverifier github.com/google/s2a-go/internal/v2/remotesigner github.com/google/s2a-go/internal/v2/tlsconfigstore github.com/google/s2a-go/internal/v2 github.com/google/s2a-go cloud.google.com/go/auth/internal/transport google.golang.org/api/internal cloud.google.com/go/auth/httptransport google.golang.org/api/option google.golang.org/api/internal/gensupport google.golang.org/api/option/internaloption google.golang.org/api/transport/http google.golang.org/api/impersonate google.golang.org/api/admin/directory/v1 github.com/dexidp/dex/storage/ent/client go.etcd.io/etcd/client/v3 github.com/dexidp/dex/connector/google go.etcd.io/etcd/client/v3/namespace github.com/dexidp/dex/storage/etcd github.com/dexidp/dex/server github.com/dexidp/dex/storage/ent github.com/dexidp/dex/storage/sql github.com/dexidp/dex/cmd/dex go: downloading github.com/kylelemons/godebug v1.1.0 go: downloading github.com/stretchr/testify v1.11.1 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading gopkg.in/yaml.v3 v3.0.1 ? github.com/dexidp/dex/api [no test files] === RUN TestValidConfiguration --- PASS: TestValidConfiguration (0.00s) === RUN TestInvalidConfiguration --- PASS: TestInvalidConfiguration (0.00s) === RUN TestUnmarshalConfig --- PASS: TestUnmarshalConfig (0.00s) === RUN TestUnmarshalConfigWithEnvNoExpand --- PASS: TestUnmarshalConfigWithEnvNoExpand (0.00s) === RUN TestUnmarshalConfigWithEnvExpand --- PASS: TestUnmarshalConfigWithEnvExpand (0.01s) === RUN TestNewLogger === RUN TestNewLogger/JSON === RUN TestNewLogger/Text === RUN TestNewLogger/Unknown --- PASS: TestNewLogger (0.00s) --- PASS: TestNewLogger/JSON (0.00s) --- PASS: TestNewLogger/Text (0.00s) --- PASS: TestNewLogger/Unknown (0.00s) PASS ok github.com/dexidp/dex/cmd/dex 0.119s === RUN TestRun === RUN TestRun/executable_not_dex === RUN TestRun/executable_is_full_path_to_dex === RUN TestRun/command_is_not_serve === RUN TestRun/no_templates === RUN TestRun/no_templates#01 === RUN TestRun/.tpl_template === RUN TestRun/.tmpl_template === RUN TestRun/.yaml_template --- PASS: TestRun (0.00s) --- PASS: TestRun/executable_not_dex (0.00s) --- PASS: TestRun/executable_is_full_path_to_dex (0.00s) --- PASS: TestRun/command_is_not_serve (0.00s) --- PASS: TestRun/no_templates (0.00s) --- PASS: TestRun/no_templates#01 (0.00s) --- PASS: TestRun/.tpl_template (0.00s) --- PASS: TestRun/.tmpl_template (0.00s) --- PASS: TestRun/.yaml_template (0.00s) PASS ok github.com/dexidp/dex/cmd/docker-entrypoint 0.017s ? github.com/dexidp/dex/connector [no test files] === RUN TestUserGroups --- PASS: TestUserGroups (0.02s) === RUN TestUserGroupsWithFiltering --- PASS: TestUserGroupsWithFiltering (0.02s) === RUN TestUserLoginFlow --- PASS: TestUserLoginFlow (0.04s) === RUN TestUserPassword --- PASS: TestUserPassword (0.03s) === RUN TestIdentityFromCrowdUser --- PASS: TestIdentityFromCrowdUser (0.00s) PASS ok github.com/dexidp/dex/connector/atlassiancrowd 0.181s === RUN TestUser --- PASS: TestUser (0.00s) === RUN TestExtraHeaders --- PASS: TestExtraHeaders (0.00s) === RUN TestSingleGroup --- PASS: TestSingleGroup (0.00s) === RUN TestMultipleGroup --- PASS: TestMultipleGroup (0.00s) === RUN TestMultipleGroupWithCustomSeparator --- PASS: TestMultipleGroupWithCustomSeparator (0.00s) === RUN TestStaticGroup --- PASS: TestStaticGroup (0.00s) PASS ok github.com/dexidp/dex/connector/authproxy 0.032s === RUN TestUserGroups --- PASS: TestUserGroups (0.04s) === RUN TestUserWithoutTeams --- PASS: TestUserWithoutTeams (0.01s) === RUN TestUsernameIncludedInFederatedIdentity --- PASS: TestUsernameIncludedInFederatedIdentity (0.02s) PASS ok github.com/dexidp/dex/connector/bitbucketcloud 0.125s === RUN TestUsernameIncludedInFederatedIdentity --- PASS: TestUsernameIncludedInFederatedIdentity (0.04s) PASS ok github.com/dexidp/dex/connector/gitea 0.102s === RUN TestUserGroups --- PASS: TestUserGroups (0.02s) === RUN TestUserGroupsWithoutOrgs --- PASS: TestUserGroupsWithoutOrgs (0.02s) === RUN TestUserGroupsWithTeamNameFieldConfig --- PASS: TestUserGroupsWithTeamNameFieldConfig (0.04s) === RUN TestUserGroupsWithTeamNameAndSlugFieldConfig --- PASS: TestUserGroupsWithTeamNameAndSlugFieldConfig (0.02s) === RUN TestUsernameIncludedInFederatedIdentity --- PASS: TestUsernameIncludedInFederatedIdentity (0.03s) === RUN TestLoginUsedAsIDWhenConfigured --- PASS: TestLoginUsedAsIDWhenConfigured (0.01s) === RUN TestPreferredEmailDomainConfigured --- PASS: TestPreferredEmailDomainConfigured (0.01s) === RUN TestPreferredEmailDomainConfiguredWithGlob --- PASS: TestPreferredEmailDomainConfiguredWithGlob (0.01s) === RUN TestPreferredEmailDomainConfigured_UserHasNoPreferredDomainEmail --- PASS: TestPreferredEmailDomainConfigured_UserHasNoPreferredDomainEmail (0.01s) === RUN TestPreferredEmailDomainNotConfigured --- PASS: TestPreferredEmailDomainNotConfigured (0.01s) === RUN TestPreferredEmailDomainConfigured_Error_BothPrimaryAndPreferredDomainEmailNotFound --- PASS: TestPreferredEmailDomainConfigured_Error_BothPrimaryAndPreferredDomainEmailNotFound (0.02s) === RUN Test_isPreferredEmailDomain === RUN Test_isPreferredEmailDomain/example.com === RUN Test_isPreferredEmailDomain/example.com#01 === RUN Test_isPreferredEmailDomain/*.example.com === RUN Test_isPreferredEmailDomain/*.example.com#01 === RUN Test_isPreferredEmailDomain/*.example.com#02 === RUN Test_isPreferredEmailDomain/*.example.com#03 === RUN Test_isPreferredEmailDomain/*.*.example.com === RUN Test_isPreferredEmailDomain/*.*.example.com#01 --- PASS: Test_isPreferredEmailDomain (0.00s) --- PASS: Test_isPreferredEmailDomain/example.com (0.00s) --- PASS: Test_isPreferredEmailDomain/example.com#01 (0.00s) --- PASS: Test_isPreferredEmailDomain/*.example.com (0.00s) --- PASS: Test_isPreferredEmailDomain/*.example.com#01 (0.00s) --- PASS: Test_isPreferredEmailDomain/*.example.com#02 (0.00s) --- PASS: Test_isPreferredEmailDomain/*.example.com#03 (0.00s) --- PASS: Test_isPreferredEmailDomain/*.*.example.com (0.00s) --- PASS: Test_isPreferredEmailDomain/*.*.example.com#01 (0.00s) === RUN Test_Open_PreferredDomainConfig === RUN Test_Open_PreferredDomainConfig/example.com === RUN Test_Open_PreferredDomainConfig/*.example.com === RUN Test_Open_PreferredDomainConfig/*.*.example.com === RUN Test_Open_PreferredDomainConfig/example.* --- PASS: Test_Open_PreferredDomainConfig (0.00s) --- PASS: Test_Open_PreferredDomainConfig/example.com (0.00s) --- PASS: Test_Open_PreferredDomainConfig/*.example.com (0.00s) --- PASS: Test_Open_PreferredDomainConfig/*.*.example.com (0.00s) --- PASS: Test_Open_PreferredDomainConfig/example.* (0.00s) PASS ok github.com/dexidp/dex/connector/github 0.261s === RUN TestUserGroups --- PASS: TestUserGroups (0.02s) === RUN TestUserGroupsWithFiltering --- PASS: TestUserGroupsWithFiltering (0.01s) === RUN TestUserGroupsWithoutOrgs --- PASS: TestUserGroupsWithoutOrgs (0.02s) === RUN TestUsernameIncludedInFederatedIdentity --- PASS: TestUsernameIncludedInFederatedIdentity (0.03s) === RUN TestLoginUsedAsIDWhenConfigured --- PASS: TestLoginUsedAsIDWhenConfigured (0.01s) === RUN TestLoginWithTeamWhitelisted --- PASS: TestLoginWithTeamWhitelisted (0.01s) === RUN TestLoginWithTeamNonWhitelisted --- PASS: TestLoginWithTeamNonWhitelisted (0.01s) === RUN TestRefresh --- PASS: TestRefresh (0.01s) === RUN TestRefreshWithEmptyConnectorData --- PASS: TestRefreshWithEmptyConnectorData (0.00s) === RUN TestGroupsWithPermission --- PASS: TestGroupsWithPermission (0.01s) PASS ok github.com/dexidp/dex/connector/gitlab 0.210s === RUN TestOpen === RUN TestOpen/missing_admin_email === RUN TestOpen/service_account_key_not_found === RUN TestOpen/service_account_key_valid === RUN TestOpen/adc === RUN TestOpen/adc_priority --- PASS: TestOpen (0.14s) --- PASS: TestOpen/missing_admin_email (0.11s) --- PASS: TestOpen/service_account_key_not_found (0.01s) --- PASS: TestOpen/service_account_key_valid (0.01s) --- PASS: TestOpen/adc (0.01s) --- PASS: TestOpen/adc_priority (0.01s) === RUN TestGetGroups === RUN TestGetGroups/user1_non_transitive_lookup google_test.go:239: [TestGetGroups/user1_non_transitive_lookup] Amount of API calls per userKey: map[user_1@dexidp.com:1] === RUN TestGetGroups/user1_transitive_lookup google_test.go:239: [TestGetGroups/user1_transitive_lookup] Amount of API calls per userKey: map[groups_0@dexidp.com:1 groups_1@dexidp.com:1 groups_2@dexidp.com:1 user_1@dexidp.com:1] === RUN TestGetGroups/user2_non_transitive_lookup google_test.go:239: [TestGetGroups/user2_non_transitive_lookup] Amount of API calls per userKey: map[user_2@dexidp.com:1] === RUN TestGetGroups/user2_transitive_lookup google_test.go:239: [TestGetGroups/user2_transitive_lookup] Amount of API calls per userKey: map[groups_0@dexidp.com:1 groups_1@dexidp.com:1 user_2@dexidp.com:1] --- PASS: TestGetGroups (0.06s) --- PASS: TestGetGroups/user1_non_transitive_lookup (0.00s) --- PASS: TestGetGroups/user1_transitive_lookup (0.00s) --- PASS: TestGetGroups/user2_non_transitive_lookup (0.00s) --- PASS: TestGetGroups/user2_transitive_lookup (0.00s) === RUN TestDomainToAdminEmailConfig === RUN TestDomainToAdminEmailConfig/correct_user_request google_test.go:294: [TestDomainToAdminEmailConfig/correct_user_request] Amount of API calls per userKey: map[groups_0@dexidp.com:1 groups_1@dexidp.com:1 groups_2@dexidp.com:1 user_1@dexidp.com:1] === RUN TestDomainToAdminEmailConfig/wrong_user_request google_test.go:294: [TestDomainToAdminEmailConfig/wrong_user_request] Amount of API calls per userKey: map[] === RUN TestDomainToAdminEmailConfig/wrong_connector_response google_test.go:294: [TestDomainToAdminEmailConfig/wrong_connector_response] Amount of API calls per userKey: map[] --- PASS: TestDomainToAdminEmailConfig (0.06s) --- PASS: TestDomainToAdminEmailConfig/correct_user_request (0.00s) --- PASS: TestDomainToAdminEmailConfig/wrong_user_request (0.00s) --- PASS: TestDomainToAdminEmailConfig/wrong_connector_response (0.00s) === RUN TestGCEWorkloadIdentity === RUN TestGCEWorkloadIdentity/correct_user_request === RUN TestGCEWorkloadIdentity/wrong_user_request === RUN TestGCEWorkloadIdentity/wrong_connector_response --- PASS: TestGCEWorkloadIdentity (0.07s) --- PASS: TestGCEWorkloadIdentity/correct_user_request (0.00s) --- PASS: TestGCEWorkloadIdentity/wrong_user_request (0.00s) --- PASS: TestGCEWorkloadIdentity/wrong_connector_response (0.00s) === RUN TestPromptTypeConfig === RUN TestPromptTypeConfig/prompt_type_is_nil === RUN TestPromptTypeConfig/prompt_type_is_empty === RUN TestPromptTypeConfig/prompt_type_is_set --- PASS: TestPromptTypeConfig (0.08s) --- PASS: TestPromptTypeConfig/prompt_type_is_nil (0.07s) --- PASS: TestPromptTypeConfig/prompt_type_is_empty (0.01s) --- PASS: TestPromptTypeConfig/prompt_type_is_set (0.01s) PASS ok github.com/dexidp/dex/connector/google 0.484s === RUN TestIncorrectCredentialsLogin keystone_test.go:609: variable "DEX_KEYSTONE_URL" not set, skipping keystone connector tests --- SKIP: TestIncorrectCredentialsLogin (0.00s) === RUN TestValidUserLogin keystone_test.go:609: variable "DEX_KEYSTONE_URL" not set, skipping keystone connector tests --- SKIP: TestValidUserLogin (0.00s) === RUN TestUseRefreshToken keystone_test.go:609: variable "DEX_KEYSTONE_URL" not set, skipping keystone connector tests --- SKIP: TestUseRefreshToken (0.00s) === RUN TestUseRefreshTokenUserDeleted keystone_test.go:609: variable "DEX_KEYSTONE_URL" not set, skipping keystone connector tests --- SKIP: TestUseRefreshTokenUserDeleted (0.00s) === RUN TestUseRefreshTokenGroupsChanged keystone_test.go:609: variable "DEX_KEYSTONE_URL" not set, skipping keystone connector tests --- SKIP: TestUseRefreshTokenGroupsChanged (0.00s) === RUN TestNoGroupsInScope keystone_test.go:609: variable "DEX_KEYSTONE_URL" not set, skipping keystone connector tests --- SKIP: TestNoGroupsInScope (0.00s) PASS ok github.com/dexidp/dex/connector/keystone 0.058s === RUN TestQuery ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestQuery (0.00s) === RUN TestQueryWithEmailSuffix ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestQueryWithEmailSuffix (0.00s) === RUN TestUserFilter ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestUserFilter (0.00s) === RUN TestGroupQuery ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestGroupQuery (0.00s) === RUN TestGroupsOnUserEntity ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestGroupsOnUserEntity (0.00s) === RUN TestGroupFilter ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestGroupFilter (0.00s) === RUN TestGroupToUserMatchers ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestGroupToUserMatchers (0.00s) === RUN TestDeprecatedGroupToUserMatcher ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestDeprecatedGroupToUserMatcher (0.00s) === RUN TestStartTLS ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestStartTLS (0.00s) === RUN TestInsecureSkipVerify ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestInsecureSkipVerify (0.00s) === RUN TestLDAPS ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestLDAPS (0.00s) === RUN TestUsernamePrompt === RUN TestUsernamePrompt/with_usernamePrompt_unset_it_returns_"" === RUN TestUsernamePrompt/with_usernamePrompt_set_it_returns_that --- PASS: TestUsernamePrompt (0.00s) --- PASS: TestUsernamePrompt/with_usernamePrompt_unset_it_returns_"" (0.00s) --- PASS: TestUsernamePrompt/with_usernamePrompt_set_it_returns_that (0.00s) === RUN TestNestedGroups ldap_test.go:592: test environment variable "DEX_LDAP_HOST" not set, skipping --- SKIP: TestNestedGroups (0.00s) PASS ok github.com/dexidp/dex/connector/ldap 0.055s ? github.com/dexidp/dex/connector/linkedin [no test files] === RUN TestLoginURL --- PASS: TestLoginURL (0.00s) === RUN TestLoginURLWithOptions --- PASS: TestLoginURLWithOptions (0.00s) === RUN TestUserIdentityFromGraphAPI --- PASS: TestUserIdentityFromGraphAPI (0.01s) === RUN TestUserGroupsFromGraphAPI --- PASS: TestUserGroupsFromGraphAPI (0.00s) PASS ok github.com/dexidp/dex/connector/microsoft 0.064s ? github.com/dexidp/dex/connector/mock [no test files] === RUN TestOpen --- PASS: TestOpen (0.09s) === RUN TestLoginURL --- PASS: TestLoginURL (0.05s) === RUN TestHandleCallBackForGroupsInUserInfo --- PASS: TestHandleCallBackForGroupsInUserInfo (0.10s) === RUN TestHandleCallBackForGroupMapsInUserInfo --- PASS: TestHandleCallBackForGroupMapsInUserInfo (0.12s) === RUN TestHandleCallBackForGroupsInToken --- PASS: TestHandleCallBackForGroupsInToken (0.07s) === RUN TestHandleCallbackForNumericUserID --- PASS: TestHandleCallbackForNumericUserID (0.11s) PASS ok github.com/dexidp/dex/connector/oauth 0.599s === RUN TestKnownBrokenAuthHeaderProvider --- PASS: TestKnownBrokenAuthHeaderProvider (0.00s) === RUN TestHandleCallback === RUN TestHandleCallback/simpleCase === RUN TestHandleCallback/customEmailClaim === RUN TestHandleCallback/overrideWithCustomEmailClaim === RUN TestHandleCallback/email_verified_not_in_claims,_configured_to_be_skipped === RUN TestHandleCallback/withUserIDKey === RUN TestHandleCallback/withUserNameKey === RUN TestHandleCallback/withPreferredUsernameKey === RUN TestHandleCallback/withoutPreferredUsernameKeyAndBackendReturns === RUN TestHandleCallback/withoutPreferredUsernameKeyAndBackendNotReturn === RUN TestHandleCallback/emptyEmailScope === RUN TestHandleCallback/emptyEmailScopeButEmailProvided === RUN TestHandleCallback/customGroupsKey === RUN TestHandleCallback/customGroupsKeyButGroupsProvided === RUN TestHandleCallback/customGroupsKeyDespiteGroupsProvidedButOverride === RUN TestHandleCallback/singularGroupResponseAsString === RUN TestHandleCallback/singularGroupResponseAsMap === RUN TestHandleCallback/multipleGroupResponseAsMap === RUN TestHandleCallback/newGroupFromClaims === RUN TestHandleCallback/prefixGroupNames === RUN TestHandleCallback/suffixGroupNames === RUN TestHandleCallback/preAndSuffixGroupNames === RUN TestHandleCallback/filterGroupClaims === RUN TestHandleCallback/filterGroupClaimsMap --- PASS: TestHandleCallback (3.23s) --- PASS: TestHandleCallback/simpleCase (0.15s) --- PASS: TestHandleCallback/customEmailClaim (0.11s) --- PASS: TestHandleCallback/overrideWithCustomEmailClaim (0.07s) --- PASS: TestHandleCallback/email_verified_not_in_claims,_configured_to_be_skipped (0.15s) --- PASS: TestHandleCallback/withUserIDKey (0.07s) --- PASS: TestHandleCallback/withUserNameKey (0.12s) --- PASS: TestHandleCallback/withPreferredUsernameKey (0.07s) --- PASS: TestHandleCallback/withoutPreferredUsernameKeyAndBackendReturns (0.35s) --- PASS: TestHandleCallback/withoutPreferredUsernameKeyAndBackendNotReturn (0.03s) --- PASS: TestHandleCallback/emptyEmailScope (0.10s) --- PASS: TestHandleCallback/emptyEmailScopeButEmailProvided (0.25s) --- PASS: TestHandleCallback/customGroupsKey (0.21s) --- PASS: TestHandleCallback/customGroupsKeyButGroupsProvided (0.04s) --- PASS: TestHandleCallback/customGroupsKeyDespiteGroupsProvidedButOverride (0.17s) --- PASS: TestHandleCallback/singularGroupResponseAsString (0.21s) --- PASS: TestHandleCallback/singularGroupResponseAsMap (0.15s) --- PASS: TestHandleCallback/multipleGroupResponseAsMap (0.13s) --- PASS: TestHandleCallback/newGroupFromClaims (0.16s) --- PASS: TestHandleCallback/prefixGroupNames (0.06s) --- PASS: TestHandleCallback/suffixGroupNames (0.16s) --- PASS: TestHandleCallback/preAndSuffixGroupNames (0.23s) --- PASS: TestHandleCallback/filterGroupClaims (0.10s) --- PASS: TestHandleCallback/filterGroupClaimsMap (0.15s) === RUN TestRefresh === RUN TestRefresh/IDTokenOnRefresh === RUN TestRefresh/NoIDTokenOnRefresh --- PASS: TestRefresh (0.25s) --- PASS: TestRefresh/IDTokenOnRefresh (0.07s) --- PASS: TestRefresh/NoIDTokenOnRefresh (0.18s) === RUN TestTokenIdentity === RUN TestTokenIdentity/id_token === RUN TestTokenIdentity/access_token === RUN TestTokenIdentity/id_token_with_user_info === RUN TestTokenIdentity/access_token_with_user_info --- PASS: TestTokenIdentity (0.72s) --- PASS: TestTokenIdentity/id_token (0.38s) --- PASS: TestTokenIdentity/access_token (0.08s) --- PASS: TestTokenIdentity/id_token_with_user_info (0.14s) --- PASS: TestTokenIdentity/access_token_with_user_info (0.12s) === RUN TestPromptType === RUN TestPromptType/none === RUN TestPromptType/provided_empty_string === RUN TestPromptType/login === RUN TestPromptType/consent === RUN TestPromptType/default_value --- PASS: TestPromptType (0.08s) --- PASS: TestPromptType/none (0.00s) --- PASS: TestPromptType/provided_empty_string (0.00s) --- PASS: TestPromptType/login (0.00s) --- PASS: TestPromptType/consent (0.00s) --- PASS: TestPromptType/default_value (0.00s) === RUN TestProviderOverride === RUN TestProviderOverride/No_override === RUN TestProviderOverride/Override --- PASS: TestProviderOverride (0.24s) --- PASS: TestProviderOverride/No_override (0.00s) --- PASS: TestProviderOverride/Override (0.00s) PASS ok github.com/dexidp/dex/connector/oidc 4.570s === RUN TestOpen --- PASS: TestOpen (0.04s) === RUN TestGetUser --- PASS: TestGetUser (0.02s) === RUN TestVerifySingleGroupFn --- PASS: TestVerifySingleGroupFn (0.00s) === RUN TestVerifySingleGroupFailureFn --- PASS: TestVerifySingleGroupFailureFn (0.00s) === RUN TestVerifyMultipleGroupFn --- PASS: TestVerifyMultipleGroupFn (0.00s) === RUN TestVerifyGroup --- PASS: TestVerifyGroup (0.02s) === RUN TestCallbackIdentity --- PASS: TestCallbackIdentity (0.01s) === RUN TestRefreshIdentity --- PASS: TestRefreshIdentity (0.02s) === RUN TestRefreshIdentityFailure --- PASS: TestRefreshIdentityFailure (0.00s) PASS ok github.com/dexidp/dex/connector/openshift 0.175s === RUN TestGoodResponse --- PASS: TestGoodResponse (0.00s) === RUN TestGroups --- PASS: TestGroups (0.00s) === RUN TestGroupsWhitelist --- PASS: TestGroupsWhitelist (0.00s) === RUN TestGroupsWhitelistWithFiltering --- PASS: TestGroupsWhitelistWithFiltering (0.00s) === RUN TestGroupsWhitelistEmpty --- PASS: TestGroupsWhitelistEmpty (0.00s) === RUN TestGroupsWhitelistDisallowed --- PASS: TestGroupsWhitelistDisallowed (0.00s) === RUN TestGroupsWhitelistDisallowedNoGroupsOnIdent --- PASS: TestGroupsWhitelistDisallowedNoGroupsOnIdent (0.00s) === RUN TestOkta --- PASS: TestOkta (0.00s) === RUN TestBadStatus --- PASS: TestBadStatus (0.00s) === RUN TestInvalidCA --- PASS: TestInvalidCA (0.00s) === RUN TestUnsignedResponse --- PASS: TestUnsignedResponse (0.00s) === RUN TestExpiredAssertion --- PASS: TestExpiredAssertion (0.00s) === RUN TestAssertionSignedNotResponse --- PASS: TestAssertionSignedNotResponse (0.00s) === RUN TestInvalidSubjectInResponseTo --- PASS: TestInvalidSubjectInResponseTo (0.00s) === RUN TestInvalidSubjectRecipient --- PASS: TestInvalidSubjectRecipient (0.00s) === RUN TestInvalidAssertionAudience --- PASS: TestInvalidAssertionAudience (0.00s) === RUN TestTwoAssertionFirstSigned --- PASS: TestTwoAssertionFirstSigned (0.00s) === RUN TestTamperedResponseNameID --- PASS: TestTamperedResponseNameID (0.00s) === RUN TestConfigCAData === RUN TestConfigCAData/one_valid_PEM_entry === RUN TestConfigCAData/one_valid_PEM_entry_with_trailing_newline === RUN TestConfigCAData/one_valid_PEM_entry_with_trailing_spaces === RUN TestConfigCAData/one_valid_PEM_entry_with_two_trailing_newlines === RUN TestConfigCAData/two_valid_PEM_entries === RUN TestConfigCAData/two_valid_PEM_entries_with_newline_in_between === RUN TestConfigCAData/two_valid_PEM_entries_with_trailing_newline === RUN TestConfigCAData/empty === RUN TestConfigCAData/one_valid_PEM_entry_with_trailing_data === RUN TestConfigCAData/one_valid_PEM_entry_with_bad_data_before --- PASS: TestConfigCAData (0.00s) --- PASS: TestConfigCAData/one_valid_PEM_entry (0.00s) --- PASS: TestConfigCAData/one_valid_PEM_entry_with_trailing_newline (0.00s) --- PASS: TestConfigCAData/one_valid_PEM_entry_with_trailing_spaces (0.00s) --- PASS: TestConfigCAData/one_valid_PEM_entry_with_two_trailing_newlines (0.00s) --- PASS: TestConfigCAData/two_valid_PEM_entries (0.00s) --- PASS: TestConfigCAData/two_valid_PEM_entries_with_newline_in_between (0.00s) --- PASS: TestConfigCAData/two_valid_PEM_entries_with_trailing_newline (0.00s) --- PASS: TestConfigCAData/empty (0.00s) --- PASS: TestConfigCAData/one_valid_PEM_entry_with_trailing_data (0.00s) --- PASS: TestConfigCAData/one_valid_PEM_entry_with_bad_data_before (0.00s) === RUN TestVerify --- PASS: TestVerify (0.00s) === RUN TestVerifyUnsignedMessageAndSignedAssertionWithRootXmlNs --- PASS: TestVerifyUnsignedMessageAndSignedAssertionWithRootXmlNs (0.00s) === RUN TestVerifySignedMessageAndUnsignedAssertion --- PASS: TestVerifySignedMessageAndUnsignedAssertion (0.00s) === RUN TestVerifyUnsignedMessageAndSignedAssertion --- PASS: TestVerifyUnsignedMessageAndSignedAssertion (0.00s) === RUN TestVerifySignedMessageAndSignedAssertion --- PASS: TestVerifySignedMessageAndSignedAssertion (0.00s) === RUN TestVerifyUnsignedMessageAndUnsignedAssertion --- PASS: TestVerifyUnsignedMessageAndUnsignedAssertion (0.00s) PASS ok github.com/dexidp/dex/connector/saml 0.120s ? github.com/dexidp/dex/pkg/featureflags [no test files] === RUN TestFilter === RUN TestFilter/nothing_given === RUN TestFilter/exactly_one_match === RUN TestFilter/no_group_of_the_required_ones === RUN TestFilter/subset_matching --- PASS: TestFilter (0.00s) --- PASS: TestFilter/nothing_given (0.00s) --- PASS: TestFilter/exactly_one_match (0.00s) --- PASS: TestFilter/no_group_of_the_required_ones (0.00s) --- PASS: TestFilter/subset_matching (0.00s) PASS ok github.com/dexidp/dex/pkg/groups 0.043s === RUN TestRootCAs === RUN TestRootCAs/From_file === RUN TestRootCAs/From_string === RUN TestRootCAs/From_bytes --- PASS: TestRootCAs (0.07s) --- PASS: TestRootCAs/From_file (0.03s) --- PASS: TestRootCAs/From_string (0.02s) --- PASS: TestRootCAs/From_bytes (0.02s) === RUN TestInsecureSkipVerify --- PASS: TestInsecureSkipVerify (0.01s) PASS ok github.com/dexidp/dex/pkg/httpclient 0.139s === RUN TestPassword time=2026-02-05T09:47:33.297Z level=INFO msg="password check failed" component=api err="crypto/bcrypt: hashedPassword is not the hash of the given password" --- PASS: TestPassword (0.14s) === RUN TestCheckCost --- PASS: TestCheckCost (0.00s) === RUN TestRefreshToken time=2026-02-05T09:47:33.300Z level=ERROR msg="refresh token issued to client not found for deletion" component=api client_id=client_id user_id=1 --- PASS: TestRefreshToken (0.00s) === RUN TestUpdateClient === RUN TestUpdateClient/update_client === RUN TestUpdateClient/update_client_without_ID === RUN TestUpdateClient/update_client_which_not_exists_ --- PASS: TestUpdateClient (0.00s) --- PASS: TestUpdateClient/update_client (0.00s) --- PASS: TestUpdateClient/update_client_without_ID (0.00s) --- PASS: TestUpdateClient/update_client_which_not_exists_ (0.00s) === RUN TestCreateConnector --- PASS: TestCreateConnector (0.00s) === RUN TestUpdateConnector --- PASS: TestUpdateConnector (0.00s) === RUN TestDeleteConnector --- PASS: TestDeleteConnector (0.00s) === RUN TestListConnectors --- PASS: TestListConnectors (0.00s) === RUN TestMissingConnectorsCRUDFeatureFlag --- PASS: TestMissingConnectorsCRUDFeatureFlag (0.00s) === RUN TestListClients --- PASS: TestListClients (0.00s) === RUN TestDeviceVerificationURI time=2026-02-05T09:47:33.316Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.316Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.314Z time=2026-02-05T09:47:33.316Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestDeviceVerificationURI (0.00s) === RUN TestHandleDeviceCode === RUN TestHandleDeviceCode/New_Code time=2026-02-05T09:47:33.318Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.318Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.316Z time=2026-02-05T09:47:33.318Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.318Z level=INFO msg="received device request" client_id=test scoped=[openid] === RUN TestHandleDeviceCode/Invalid_request_Type_(GET) time=2026-02-05T09:47:33.319Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.319Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.316Z time=2026-02-05T09:47:33.319Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleDeviceCode/New_Code_with_valid_PKCE time=2026-02-05T09:47:33.321Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.321Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.316Z time=2026-02-05T09:47:33.321Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.321Z level=INFO msg="received device request" client_id=test scoped=[openid] === RUN TestHandleDeviceCode/Invalid_code_challenge_method time=2026-02-05T09:47:33.322Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.322Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.316Z time=2026-02-05T09:47:33.322Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleDeviceCode/New_Code_without_scope time=2026-02-05T09:47:33.323Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.324Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.316Z time=2026-02-05T09:47:33.324Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.324Z level=INFO msg="received device request" client_id=test scoped=[openid] --- PASS: TestHandleDeviceCode (0.01s) --- PASS: TestHandleDeviceCode/New_Code (0.00s) --- PASS: TestHandleDeviceCode/Invalid_request_Type_(GET) (0.00s) --- PASS: TestHandleDeviceCode/New_Code_with_valid_PKCE (0.00s) --- PASS: TestHandleDeviceCode/Invalid_code_challenge_method (0.00s) --- PASS: TestHandleDeviceCode/New_Code_without_scope (0.00s) === RUN TestDeviceCallback === RUN TestDeviceCallback/Missing_State time=2026-02-05T09:47:33.325Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.325Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.325Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Missing_Code time=2026-02-05T09:47:33.326Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.326Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.326Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Error_During_Authorization time=2026-02-05T09:47:33.327Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.327Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.328Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Expired_Auth_Code time=2026-02-05T09:47:33.330Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.330Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.330Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Invalid_Auth_Code time=2026-02-05T09:47:33.331Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.331Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.331Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Expired_Device_Request time=2026-02-05T09:47:33.333Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.333Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.333Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Non-Existent_User_Code time=2026-02-05T09:47:33.334Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.334Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.334Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Bad_Device_Request_Client time=2026-02-05T09:47:33.335Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.335Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.335Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Bad_Device_Request_Secret time=2026-02-05T09:47:33.337Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.337Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.337Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Expired_Device_Token time=2026-02-05T09:47:33.338Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.338Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.338Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Device_Code_Already_Redeemed time=2026-02-05T09:47:33.357Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.357Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.357Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.375Z level=ERROR msg="failed to update device token" err="device token already complete" === RUN TestDeviceCallback/Successful_Exchange time=2026-02-05T09:47:33.376Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.376Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.376Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestDeviceCallback/Prevent_cross-site_scripting time=2026-02-05T09:47:33.396Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.397Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.324Z time=2026-02-05T09:47:33.397Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestDeviceCallback (0.07s) --- PASS: TestDeviceCallback/Missing_State (0.00s) --- PASS: TestDeviceCallback/Missing_Code (0.00s) --- PASS: TestDeviceCallback/Error_During_Authorization (0.00s) --- PASS: TestDeviceCallback/Expired_Auth_Code (0.00s) --- PASS: TestDeviceCallback/Invalid_Auth_Code (0.00s) --- PASS: TestDeviceCallback/Expired_Device_Request (0.00s) --- PASS: TestDeviceCallback/Non-Existent_User_Code (0.00s) --- PASS: TestDeviceCallback/Bad_Device_Request_Client (0.00s) --- PASS: TestDeviceCallback/Bad_Device_Request_Secret (0.00s) --- PASS: TestDeviceCallback/Expired_Device_Token (0.02s) --- PASS: TestDeviceCallback/Device_Code_Already_Redeemed (0.02s) --- PASS: TestDeviceCallback/Successful_Exchange (0.02s) --- PASS: TestDeviceCallback/Prevent_cross-site_scripting (0.00s) === RUN TestDeviceTokenResponse === RUN TestDeviceTokenResponse/Valid_but_pending_token time=2026-02-05T09:47:33.398Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.398Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.398Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.398Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Invalid_Grant_Type time=2026-02-05T09:47:33.399Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.399Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.399Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.399Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_Slow_Down_State time=2026-02-05T09:47:33.401Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.401Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.401Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.401Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_Expired_Device_Token time=2026-02-05T09:47:33.402Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.402Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.402Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.402Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_Nonexistent_Device_Code time=2026-02-05T09:47:33.403Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.403Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.403Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.403Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Empty_Device_Code_in_Request time=2026-02-05T09:47:33.405Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.405Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.405Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.405Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Claim_validated_token_from_Device_Code time=2026-02-05T09:47:33.406Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.406Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.406Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.406Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Successful_Exchange_with_PKCE time=2026-02-05T09:47:33.407Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.407Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.407Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.407Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_Exchange_started_with_PKCE_but_without_verifier_provided time=2026-02-05T09:47:33.410Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.410Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.410Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.410Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_Exchange_not_started_with_PKCE_but_verifier_provided time=2026-02-05T09:47:33.411Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.411Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.411Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.411Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_with_PKCE_but_incorrect_verifier_provided time=2026-02-05T09:47:33.413Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.413Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.413Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.413Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestDeviceTokenResponse/Test_with_PKCE_but_incorrect_challenge_provided time=2026-02-05T09:47:33.414Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.414Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.397Z time=2026-02-05T09:47:33.414Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.414Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true --- PASS: TestDeviceTokenResponse (0.02s) --- PASS: TestDeviceTokenResponse/Valid_but_pending_token (0.00s) --- PASS: TestDeviceTokenResponse/Invalid_Grant_Type (0.00s) --- PASS: TestDeviceTokenResponse/Test_Slow_Down_State (0.00s) --- PASS: TestDeviceTokenResponse/Test_Expired_Device_Token (0.00s) --- PASS: TestDeviceTokenResponse/Test_Nonexistent_Device_Code (0.00s) --- PASS: TestDeviceTokenResponse/Empty_Device_Code_in_Request (0.00s) --- PASS: TestDeviceTokenResponse/Claim_validated_token_from_Device_Code (0.00s) --- PASS: TestDeviceTokenResponse/Successful_Exchange_with_PKCE (0.00s) --- PASS: TestDeviceTokenResponse/Test_Exchange_started_with_PKCE_but_without_verifier_provided (0.00s) --- PASS: TestDeviceTokenResponse/Test_Exchange_not_started_with_PKCE_but_verifier_provided (0.00s) --- PASS: TestDeviceTokenResponse/Test_with_PKCE_but_incorrect_verifier_provided (0.00s) --- PASS: TestDeviceTokenResponse/Test_with_PKCE_but_incorrect_challenge_provided (0.00s) === RUN TestVerifyCodeResponse === RUN TestVerifyCodeResponse/Unknown_user_code time=2026-02-05T09:47:33.415Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.415Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.414Z time=2026-02-05T09:47:33.415Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestVerifyCodeResponse/Expired_user_code time=2026-02-05T09:47:33.417Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.417Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.414Z time=2026-02-05T09:47:33.417Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestVerifyCodeResponse/No_user_code time=2026-02-05T09:47:33.419Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.419Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.414Z time=2026-02-05T09:47:33.419Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestVerifyCodeResponse/Valid_user_code,_expect_redirect_to_auth_endpoint time=2026-02-05T09:47:33.420Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.420Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.414Z time=2026-02-05T09:47:33.420Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestVerifyCodeResponse (0.01s) --- PASS: TestVerifyCodeResponse/Unknown_user_code (0.00s) --- PASS: TestVerifyCodeResponse/Expired_user_code (0.00s) --- PASS: TestVerifyCodeResponse/No_user_code (0.00s) --- PASS: TestVerifyCodeResponse/Valid_user_code,_expect_redirect_to_auth_endpoint (0.00s) === RUN TestHandleHealth time=2026-02-05T09:47:33.421Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.421Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.421Z time=2026-02-05T09:47:33.421Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHandleHealth (0.00s) === RUN TestHandleDiscovery time=2026-02-05T09:47:33.424Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.424Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.424Z time=2026-02-05T09:47:33.424Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHandleDiscovery (0.00s) === RUN TestHandleHealthFailure time=2026-02-05T09:47:33.425Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.425Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.425Z time=2026-02-05T09:47:33.425Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHandleHealthFailure (0.00s) === RUN TestHandleInvalidOAuth2Callbacks time=2026-02-05T09:47:33.426Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.426Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.426Z time=2026-02-05T09:47:33.426Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.427Z level=ERROR msg="invalid 'state' parameter provided" err="not found" --- PASS: TestHandleInvalidOAuth2Callbacks (0.00s) === RUN TestHandleInvalidSAMLCallbacks time=2026-02-05T09:47:33.428Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.428Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.428Z time=2026-02-05T09:47:33.428Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHandleInvalidSAMLCallbacks (0.00s) === RUN TestHandleAuthCode === RUN TestHandleAuthCode/Code_Reuse_should_return_invalid_grant time=2026-02-05T09:47:33.430Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.430Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.430Z time=2026-02-05T09:47:33.430Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.432Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestHandleAuthCode/No_Code_should_return_invalid_request time=2026-02-05T09:47:33.453Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.454Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.454Z time=2026-02-05T09:47:33.454Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.456Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] --- PASS: TestHandleAuthCode (0.03s) --- PASS: TestHandleAuthCode/Code_Reuse_should_return_invalid_grant (0.02s) --- PASS: TestHandleAuthCode/No_Code_should_return_invalid_request (0.01s) === RUN TestHandlePassword === RUN TestHandlePassword/Password_login,_request_refresh_token time=2026-02-05T09:47:33.458Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.458Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.458Z time=2026-02-05T09:47:33.458Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandlePassword/Password_login time=2026-02-05T09:47:33.477Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.477Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.477Z time=2026-02-05T09:47:33.477Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHandlePassword (0.04s) --- PASS: TestHandlePassword/Password_login,_request_refresh_token (0.02s) --- PASS: TestHandlePassword/Password_login (0.02s) === RUN TestHandlePasswordLoginWithSkipApproval === RUN TestHandlePasswordLoginWithSkipApproval/Force_approval time=2026-02-05T09:47:33.499Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.499Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.499Z time=2026-02-05T09:47:33.499Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.499Z level=INFO msg="login successful" connector_id=mockPw username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[] === RUN TestHandlePasswordLoginWithSkipApproval/Skip_approval_by_server_config time=2026-02-05T09:47:33.500Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.500Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.500Z time=2026-02-05T09:47:33.500Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.500Z level=INFO msg="login successful" connector_id=mockPw username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[] === RUN TestHandlePasswordLoginWithSkipApproval/No_skip time=2026-02-05T09:47:33.502Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.502Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.502Z time=2026-02-05T09:47:33.502Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.502Z level=INFO msg="login successful" connector_id=mockPw username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[] === RUN TestHandlePasswordLoginWithSkipApproval/Skip_approval time=2026-02-05T09:47:33.504Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.504Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.504Z time=2026-02-05T09:47:33.504Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.504Z level=INFO msg="login successful" connector_id=mockPw username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[] === RUN TestHandlePasswordLoginWithSkipApproval/Force_approval,_request_refresh_token time=2026-02-05T09:47:33.505Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.505Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.505Z time=2026-02-05T09:47:33.505Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.505Z level=INFO msg="login successful" connector_id=mockPw username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[] === RUN TestHandlePasswordLoginWithSkipApproval/Skip_approval,_request_refresh_token time=2026-02-05T09:47:33.507Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.507Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.507Z time=2026-02-05T09:47:33.507Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.507Z level=INFO msg="login successful" connector_id=mockPw username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[] --- PASS: TestHandlePasswordLoginWithSkipApproval (0.01s) --- PASS: TestHandlePasswordLoginWithSkipApproval/Force_approval (0.00s) --- PASS: TestHandlePasswordLoginWithSkipApproval/Skip_approval_by_server_config (0.00s) --- PASS: TestHandlePasswordLoginWithSkipApproval/No_skip (0.00s) --- PASS: TestHandlePasswordLoginWithSkipApproval/Skip_approval (0.00s) --- PASS: TestHandlePasswordLoginWithSkipApproval/Force_approval,_request_refresh_token (0.00s) --- PASS: TestHandlePasswordLoginWithSkipApproval/Skip_approval,_request_refresh_token (0.00s) === RUN TestHandleConnectorCallbackWithSkipApproval === RUN TestHandleConnectorCallbackWithSkipApproval/Force_approval time=2026-02-05T09:47:33.508Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.508Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.508Z time=2026-02-05T09:47:33.508Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.508Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestHandleConnectorCallbackWithSkipApproval/Skip_approval_by_server_config time=2026-02-05T09:47:33.509Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.509Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.509Z time=2026-02-05T09:47:33.509Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.509Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestHandleConnectorCallbackWithSkipApproval/Skip_approval_by_auth_request time=2026-02-05T09:47:33.510Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.510Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.510Z time=2026-02-05T09:47:33.510Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.510Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestHandleConnectorCallbackWithSkipApproval/Skip_approval time=2026-02-05T09:47:33.511Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.511Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.511Z time=2026-02-05T09:47:33.511Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.511Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestHandleConnectorCallbackWithSkipApproval/Force_approval,_request_refresh_token time=2026-02-05T09:47:33.512Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.512Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.512Z time=2026-02-05T09:47:33.512Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.512Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestHandleConnectorCallbackWithSkipApproval/Skip_approval,_request_refresh_token time=2026-02-05T09:47:33.514Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.514Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.514Z time=2026-02-05T09:47:33.514Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.514Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] --- PASS: TestHandleConnectorCallbackWithSkipApproval (0.01s) --- PASS: TestHandleConnectorCallbackWithSkipApproval/Force_approval (0.00s) --- PASS: TestHandleConnectorCallbackWithSkipApproval/Skip_approval_by_server_config (0.00s) --- PASS: TestHandleConnectorCallbackWithSkipApproval/Skip_approval_by_auth_request (0.00s) --- PASS: TestHandleConnectorCallbackWithSkipApproval/Skip_approval (0.00s) --- PASS: TestHandleConnectorCallbackWithSkipApproval/Force_approval,_request_refresh_token (0.00s) --- PASS: TestHandleConnectorCallbackWithSkipApproval/Skip_approval,_request_refresh_token (0.00s) === RUN TestHandleTokenExchange === RUN TestHandleTokenExchange/id-for-acccess time=2026-02-05T09:47:33.515Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.515Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.515Z time=2026-02-05T09:47:33.515Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleTokenExchange/id-for-id time=2026-02-05T09:47:33.525Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.525Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.525Z time=2026-02-05T09:47:33.525Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleTokenExchange/id-for-default time=2026-02-05T09:47:33.537Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.537Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.537Z time=2026-02-05T09:47:33.537Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleTokenExchange/access-for-access time=2026-02-05T09:47:33.547Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.547Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.547Z time=2026-02-05T09:47:33.547Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleTokenExchange/missing-subject_token_type time=2026-02-05T09:47:33.557Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.557Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.557Z time=2026-02-05T09:47:33.557Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestHandleTokenExchange/missing-subject_token time=2026-02-05T09:47:33.558Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.558Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.558Z time=2026-02-05T09:47:33.558Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHandleTokenExchange (0.04s) --- PASS: TestHandleTokenExchange/id-for-acccess (0.01s) --- PASS: TestHandleTokenExchange/id-for-id (0.01s) --- PASS: TestHandleTokenExchange/id-for-default (0.01s) --- PASS: TestHandleTokenExchange/access-for-access (0.01s) --- PASS: TestHandleTokenExchange/missing-subject_token_type (0.00s) --- PASS: TestHandleTokenExchange/missing-subject_token (0.00s) === RUN TestGetTokenFromRequestSuccess time=2026-02-05T09:47:33.559Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.559Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.558Z time=2026-02-05T09:47:33.559Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestGetTokenFromRequestSuccess/Access_Token === RUN TestGetTokenFromRequestSuccess/Refresh_token === RUN TestGetTokenFromRequestSuccess/Unknown_token --- PASS: TestGetTokenFromRequestSuccess (0.00s) --- PASS: TestGetTokenFromRequestSuccess/Access_Token (0.00s) --- PASS: TestGetTokenFromRequestSuccess/Refresh_token (0.00s) --- PASS: TestGetTokenFromRequestSuccess/Unknown_token (0.00s) === RUN TestGetTokenFromRequestFailure time=2026-02-05T09:47:33.561Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.561Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.560Z time=2026-02-05T09:47:33.561Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestGetTokenFromRequestFailure (0.00s) === RUN TestHandleIntrospect time=2026-02-05T09:47:33.561Z level=INFO msg="config refresh tokens" absolute_lifetime=24h time=2026-02-05T09:47:33.561Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:33.562Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.562Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.561Z === RUN TestHandleIntrospect/No_token === RUN TestHandleIntrospect/Access_Token:_active === RUN TestHandleIntrospect/Access_Token:_wrong === RUN TestHandleIntrospect/Refresh_Token:_active === RUN TestHandleIntrospect/Refresh_Token:_expired === NAME TestHandleIntrospect time=2026-02-05T09:47:33.572Z level=ERROR msg="refresh token expired" token_id=expired === RUN TestHandleIntrospect/Refresh_Token:_active_=>_false_(wrong) --- PASS: TestHandleIntrospect (0.01s) --- PASS: TestHandleIntrospect/No_token (0.00s) --- PASS: TestHandleIntrospect/Access_Token:_active (0.00s) --- PASS: TestHandleIntrospect/Access_Token:_wrong (0.00s) --- PASS: TestHandleIntrospect/Refresh_Token:_active (0.00s) --- PASS: TestHandleIntrospect/Refresh_Token:_expired (0.00s) --- PASS: TestHandleIntrospect/Refresh_Token:_active_=>_false_(wrong) (0.00s) === RUN TestIntrospectErrHelper time=2026-02-05T09:47:33.573Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.573Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.572Z time=2026-02-05T09:47:33.574Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestIntrospectErrHelper/Inactive_Token === RUN TestIntrospectErrHelper/Bad_Request === RUN TestIntrospectErrHelper/Internal_Server_Error --- PASS: TestIntrospectErrHelper (0.00s) --- PASS: TestIntrospectErrHelper/Inactive_Token (0.00s) --- PASS: TestIntrospectErrHelper/Bad_Request (0.00s) --- PASS: TestIntrospectErrHelper/Internal_Server_Error (0.00s) === RUN TestGetClientID --- PASS: TestGetClientID (0.00s) === RUN TestGetAudience --- PASS: TestGetAudience (0.00s) === RUN TestGetSubject --- PASS: TestGetSubject (0.00s) === RUN TestParseAuthorizationRequest === RUN TestParseAuthorizationRequest/normal_request time=2026-02-05T09:47:33.576Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.576Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.576Z === RUN TestParseAuthorizationRequest/POST_request time=2026-02-05T09:47:33.577Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.577Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.577Z === RUN TestParseAuthorizationRequest/invalid_client_id time=2026-02-05T09:47:33.578Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.578Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.578Z === RUN TestParseAuthorizationRequest/invalid_redirect_uri time=2026-02-05T09:47:33.579Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.579Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.579Z === RUN TestParseAuthorizationRequest/implicit_flow time=2026-02-05T09:47:33.580Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.581Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.580Z === RUN TestParseAuthorizationRequest/unsupported_response_type time=2026-02-05T09:47:33.582Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.582Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.582Z === RUN TestParseAuthorizationRequest/only_token_response_type time=2026-02-05T09:47:33.583Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.583Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.583Z === RUN TestParseAuthorizationRequest/choose_connector_id time=2026-02-05T09:47:33.584Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.584Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.584Z === RUN TestParseAuthorizationRequest/choose_second_connector_id time=2026-02-05T09:47:33.585Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.585Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.585Z === RUN TestParseAuthorizationRequest/choose_invalid_connector_id time=2026-02-05T09:47:33.586Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.586Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.586Z === RUN TestParseAuthorizationRequest/PKCE_code_challenge_method_plain time=2026-02-05T09:47:33.588Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.588Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.588Z === RUN TestParseAuthorizationRequest/PKCE_code_challenge_method_default_plain time=2026-02-05T09:47:33.589Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.589Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.589Z === RUN TestParseAuthorizationRequest/PKCE_code_challenge_method_S256 time=2026-02-05T09:47:33.590Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.590Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.590Z === RUN TestParseAuthorizationRequest/PKCE_invalid_code_challenge_method time=2026-02-05T09:47:33.592Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.592Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.592Z === RUN TestParseAuthorizationRequest/No_response_type time=2026-02-05T09:47:33.593Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:33.593Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:33.593Z --- PASS: TestParseAuthorizationRequest (0.02s) --- PASS: TestParseAuthorizationRequest/normal_request (0.00s) --- PASS: TestParseAuthorizationRequest/POST_request (0.00s) --- PASS: TestParseAuthorizationRequest/invalid_client_id (0.00s) --- PASS: TestParseAuthorizationRequest/invalid_redirect_uri (0.00s) --- PASS: TestParseAuthorizationRequest/implicit_flow (0.00s) --- PASS: TestParseAuthorizationRequest/unsupported_response_type (0.00s) --- PASS: TestParseAuthorizationRequest/only_token_response_type (0.00s) --- PASS: TestParseAuthorizationRequest/choose_connector_id (0.00s) --- PASS: TestParseAuthorizationRequest/choose_second_connector_id (0.00s) --- PASS: TestParseAuthorizationRequest/choose_invalid_connector_id (0.00s) --- PASS: TestParseAuthorizationRequest/PKCE_code_challenge_method_plain (0.00s) --- PASS: TestParseAuthorizationRequest/PKCE_code_challenge_method_default_plain (0.00s) --- PASS: TestParseAuthorizationRequest/PKCE_code_challenge_method_S256 (0.00s) --- PASS: TestParseAuthorizationRequest/PKCE_invalid_code_challenge_method (0.00s) --- PASS: TestParseAuthorizationRequest/No_response_type (0.00s) === RUN TestAccessTokenHash --- PASS: TestAccessTokenHash (0.00s) === RUN TestValidRedirectURI --- PASS: TestValidRedirectURI (0.00s) === RUN TestStorageKeySet === RUN TestStorageKeySet/valid_token === RUN TestStorageKeySet/token_signed_by_different_key --- PASS: TestStorageKeySet (1.32s) --- PASS: TestStorageKeySet/valid_token (0.01s) --- PASS: TestStorageKeySet/token_signed_by_different_key (1.31s) === RUN TestRefreshTokenExpirationScenarios === RUN TestRefreshTokenExpirationScenarios/Normal === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.915Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.916Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.916Z level=DEBUG msg="connector data before refresh" connector_data="{\"some\":\"data\"}" time=2026-02-05T09:47:34.916Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestRefreshTokenExpirationScenarios/Not_expired_because_used === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.935Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.935Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.935Z level=DEBUG msg="connector data before refresh" connector_data="{\"some\":\"data\"}" time=2026-02-05T09:47:34.935Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestRefreshTokenExpirationScenarios/Expired_because_not_used === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.953Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.953Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.954Z level=ERROR msg="refresh token expired due to inactivity" token_id=test === RUN TestRefreshTokenExpirationScenarios/Absolutely_expired === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.955Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.955Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.955Z level=ERROR msg="refresh token expired" token_id=test === RUN TestRefreshTokenExpirationScenarios/Obsolete_tokens_are_allowed === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.956Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.956Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.956Z level=DEBUG msg="saved connector data" user_id=1 connector_data="" === RUN TestRefreshTokenExpirationScenarios/Obsolete_tokens_are_not_allowed === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.975Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.975Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.975Z level=ERROR msg="refresh token claimed twice" token_id=test === RUN TestRefreshTokenExpirationScenarios/Obsolete_tokens_are_allowed_but_token_is_expired_globally === NAME TestRefreshTokenExpirationScenarios time=2026-02-05T09:47:34.976Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:34.976Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:34.914Z time=2026-02-05T09:47:34.976Z level=ERROR msg="refresh token expired" token_id=test --- PASS: TestRefreshTokenExpirationScenarios (0.06s) --- PASS: TestRefreshTokenExpirationScenarios/Normal (0.02s) --- PASS: TestRefreshTokenExpirationScenarios/Not_expired_because_used (0.02s) --- PASS: TestRefreshTokenExpirationScenarios/Expired_because_not_used (0.00s) --- PASS: TestRefreshTokenExpirationScenarios/Absolutely_expired (0.00s) --- PASS: TestRefreshTokenExpirationScenarios/Obsolete_tokens_are_allowed (0.02s) --- PASS: TestRefreshTokenExpirationScenarios/Obsolete_tokens_are_not_allowed (0.00s) --- PASS: TestRefreshTokenExpirationScenarios/Obsolete_tokens_are_allowed_but_token_is_expired_globally (0.00s) === RUN TestKeyRotator --- PASS: TestKeyRotator (5.70s) === RUN TestRefreshTokenPolicy === RUN TestRefreshTokenPolicy/Allowed === RUN TestRefreshTokenPolicy/Expired --- PASS: TestRefreshTokenPolicy (0.00s) --- PASS: TestRefreshTokenPolicy/Allowed (0.00s) --- PASS: TestRefreshTokenPolicy/Expired (0.00s) === RUN TestNewTestServer time=2026-02-05T09:47:40.675Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.675Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.675Z time=2026-02-05T09:47:40.675Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestNewTestServer (0.00s) === RUN TestDiscovery time=2026-02-05T09:47:40.676Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.676Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.676Z time=2026-02-05T09:47:40.676Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestDiscovery (0.00s) === RUN TestOAuth2CodeFlow === RUN TestOAuth2CodeFlow/verify_ID_Token time=2026-02-05T09:47:40.678Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.678Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.679Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.681Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/fetch_userinfo time=2026-02-05T09:47:40.701Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.701Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.701Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.705Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/verify_id_token_and_oauth2_token_expiry time=2026-02-05T09:47:40.726Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.726Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.726Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.728Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/verify_at_hash time=2026-02-05T09:47:40.750Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.750Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.750Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.753Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/refresh_token time=2026-02-05T09:47:40.773Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.773Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.773Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.775Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:40.794Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:40.794Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" time=2026-02-05T09:47:40.812Z level=ERROR msg="refresh token claimed twice" token_id=vufe6kfrggq7tb42uu5pfxsoo === RUN TestOAuth2CodeFlow/refresh_with_explicit_scopes time=2026-02-05T09:47:40.815Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.815Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.815Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.818Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:40.836Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:40.836Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestOAuth2CodeFlow/refresh_with_extra_spaces time=2026-02-05T09:47:40.856Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.856Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.856Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.860Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:40.878Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:40.878Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestOAuth2CodeFlow/refresh_with_unauthorized_scopes time=2026-02-05T09:47:40.897Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.897Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.897Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.899Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/refresh_with_different_client_id time=2026-02-05T09:47:40.921Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.921Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.921Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.923Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:40.943Z level=ERROR msg="trying to claim token for different client" client_id=0x339a500 refresh_client_id=unexcistedclientid === RUN TestOAuth2CodeFlow/refresh_with_identity_changes time=2026-02-05T09:47:40.945Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.945Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.945Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.947Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:40.967Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:40.967Z level=DEBUG msg="saved connector data" user_id=fooid connector_data="" === RUN TestOAuth2CodeFlow/unsupported_grant_type time=2026-02-05T09:47:40.987Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.987Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.987Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.990Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:40.991Z level=ERROR msg="unsupported grant type" grant_type=unsupported time=2026-02-05T09:47:40.991Z level=ERROR msg="unsupported grant type" grant_type=unsupported === RUN TestOAuth2CodeFlow/PKCE_with_plain time=2026-02-05T09:47:40.993Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:40.993Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:40.993Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:40.995Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/PKCE_with_S256 time=2026-02-05T09:47:41.017Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.017Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.017Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.020Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/PKCE_with_plain_and_wrong_code_verifier time=2026-02-05T09:47:41.040Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.040Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.040Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.042Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/PKCE_with_S256_and_wrong_code_verifier time=2026-02-05T09:47:41.046Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.046Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.046Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.048Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/PKCE_flow_expected_on_/token time=2026-02-05T09:47:41.050Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.050Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.050Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.052Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/No_PKCE_flow_started_on_/auth time=2026-02-05T09:47:41.056Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.057Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.057Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.059Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/PKCE_with_S256_and_try_to_downgrade_to_plain time=2026-02-05T09:47:41.062Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.062Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.062Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.064Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2CodeFlow/Request_parameter_in_authorization_query time=2026-02-05T09:47:41.068Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.068Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:40.677Z time=2026-02-05T09:47:41.068Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.070Z level=ERROR msg="failed to parse authorization request" err="Server does not support request parameter." --- PASS: TestOAuth2CodeFlow (0.39s) --- PASS: TestOAuth2CodeFlow/verify_ID_Token (0.02s) --- PASS: TestOAuth2CodeFlow/fetch_userinfo (0.02s) --- PASS: TestOAuth2CodeFlow/verify_id_token_and_oauth2_token_expiry (0.02s) --- PASS: TestOAuth2CodeFlow/verify_at_hash (0.02s) --- PASS: TestOAuth2CodeFlow/refresh_token (0.04s) --- PASS: TestOAuth2CodeFlow/refresh_with_explicit_scopes (0.04s) --- PASS: TestOAuth2CodeFlow/refresh_with_extra_spaces (0.04s) --- PASS: TestOAuth2CodeFlow/refresh_with_unauthorized_scopes (0.02s) --- PASS: TestOAuth2CodeFlow/refresh_with_different_client_id (0.02s) --- PASS: TestOAuth2CodeFlow/refresh_with_identity_changes (0.04s) --- PASS: TestOAuth2CodeFlow/unsupported_grant_type (0.01s) --- PASS: TestOAuth2CodeFlow/PKCE_with_plain (0.02s) --- PASS: TestOAuth2CodeFlow/PKCE_with_S256 (0.02s) --- PASS: TestOAuth2CodeFlow/PKCE_with_plain_and_wrong_code_verifier (0.00s) --- PASS: TestOAuth2CodeFlow/PKCE_with_S256_and_wrong_code_verifier (0.01s) --- PASS: TestOAuth2CodeFlow/PKCE_flow_expected_on_/token (0.00s) --- PASS: TestOAuth2CodeFlow/No_PKCE_flow_started_on_/auth (0.01s) --- PASS: TestOAuth2CodeFlow/PKCE_with_S256_and_try_to_downgrade_to_plain (0.01s) --- PASS: TestOAuth2CodeFlow/Request_parameter_in_authorization_query (0.00s) === RUN TestOAuth2ImplicitFlow time=2026-02-05T09:47:41.072Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.072Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.072Z time=2026-02-05T09:47:41.072Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.074Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] --- PASS: TestOAuth2ImplicitFlow (0.02s) === RUN TestCrossClientScopes time=2026-02-05T09:47:41.096Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.096Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.096Z time=2026-02-05T09:47:41.096Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.098Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] --- PASS: TestCrossClientScopes (0.02s) === RUN TestCrossClientScopesWithAzpInAudienceByDefault time=2026-02-05T09:47:41.119Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.119Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.119Z time=2026-02-05T09:47:41.119Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.123Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] --- PASS: TestCrossClientScopesWithAzpInAudienceByDefault (0.02s) === RUN TestPasswordDB --- PASS: TestPasswordDB (0.20s) === RUN TestPasswordDBUsernamePrompt --- PASS: TestPasswordDBUsernamePrompt (0.00s) === RUN TestKeyCacher --- PASS: TestKeyCacher (0.00s) === RUN TestRefreshTokenFlow time=2026-02-05T09:47:41.348Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.348Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.348Z time=2026-02-05T09:47:41.348Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.350Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.372Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] --- PASS: TestRefreshTokenFlow (0.04s) === RUN TestOAuth2DeviceFlow === RUN TestOAuth2DeviceFlow/verify_ID_Token time=2026-02-05T09:47:41.392Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.392Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.392Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.393Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.396Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/fetch_userinfo time=2026-02-05T09:47:41.417Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.417Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.417Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.418Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.419Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/verify_id_token_and_oauth2_token_expiry time=2026-02-05T09:47:41.442Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.442Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.442Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.443Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.444Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/verify_at_hash time=2026-02-05T09:47:41.467Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.467Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.467Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.468Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.469Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/refresh_token time=2026-02-05T09:47:41.491Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.491Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.491Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.492Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.493Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.512Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:41.512Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" time=2026-02-05T09:47:41.530Z level=ERROR msg="refresh token claimed twice" token_id=izhasoy4ikqxw2jdnnoeoqpt3 === RUN TestOAuth2DeviceFlow/refresh_with_explicit_scopes time=2026-02-05T09:47:41.534Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.534Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.534Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.534Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.536Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.554Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:41.554Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestOAuth2DeviceFlow/refresh_with_extra_spaces time=2026-02-05T09:47:41.573Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.573Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.573Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.574Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.575Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.594Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:41.594Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestOAuth2DeviceFlow/refresh_with_unauthorized_scopes time=2026-02-05T09:47:41.615Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.615Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.615Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.616Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.617Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/refresh_with_different_client_id time=2026-02-05T09:47:41.638Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.638Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.638Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.639Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.640Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.659Z level=ERROR msg="trying to claim token for different client" client_id=0x30fce10 refresh_client_id=unexcistedclientid === RUN TestOAuth2DeviceFlow/refresh_with_identity_changes time=2026-02-05T09:47:41.662Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.662Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.662Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.663Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.664Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.683Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:41.683Z level=DEBUG msg="saved connector data" user_id=fooid connector_data="" === RUN TestOAuth2DeviceFlow/unsupported_grant_type time=2026-02-05T09:47:41.703Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.703Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.703Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.704Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.707Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/PKCE_with_plain time=2026-02-05T09:47:41.728Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.728Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.728Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.729Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.731Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/PKCE_with_S256 time=2026-02-05T09:47:41.753Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.753Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.753Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.753Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.755Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/PKCE_with_plain_and_wrong_code_verifier time=2026-02-05T09:47:41.775Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.776Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.776Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.776Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.779Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/PKCE_with_S256_and_wrong_code_verifier time=2026-02-05T09:47:41.800Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.800Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.800Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.801Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.802Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/PKCE_flow_expected_on_/token time=2026-02-05T09:47:41.824Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.824Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.824Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.825Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.827Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/No_PKCE_flow_started_on_/auth time=2026-02-05T09:47:41.847Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.847Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.848Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.848Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.850Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/PKCE_with_S256_and_try_to_downgrade_to_plain time=2026-02-05T09:47:41.872Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.872Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.872Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.874Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.875Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/Request_parameter_in_authorization_query time=2026-02-05T09:47:41.896Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.896Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.896Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.897Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.898Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] === RUN TestOAuth2DeviceFlow/verify_ID_Token#01 time=2026-02-05T09:47:41.920Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.920Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.920Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.921Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.922Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.941Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/fetch_userinfo#01 time=2026-02-05T09:47:41.944Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.944Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.944Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.945Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.947Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.965Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/verify_id_token_and_oauth2_token_expiry#01 time=2026-02-05T09:47:41.968Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.968Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.968Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.969Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.970Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:41.988Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/verify_at_hash#01 time=2026-02-05T09:47:41.992Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:41.992Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:41.992Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:41.993Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:41.994Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.013Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/refresh_token#01 time=2026-02-05T09:47:42.016Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.016Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.016Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.019Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.020Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.039Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true time=2026-02-05T09:47:42.039Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:42.039Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" time=2026-02-05T09:47:42.057Z level=ERROR msg="refresh token claimed twice" token_id=cg3cevscjjklegsu34b64ys7p === RUN TestOAuth2DeviceFlow/refresh_with_explicit_scopes#01 time=2026-02-05T09:47:42.059Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.059Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.059Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.059Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.062Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.081Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true time=2026-02-05T09:47:42.081Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:42.081Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestOAuth2DeviceFlow/refresh_with_extra_spaces#01 time=2026-02-05T09:47:42.100Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.100Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.100Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.101Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.103Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.121Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true time=2026-02-05T09:47:42.121Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:42.121Z level=DEBUG msg="saved connector data" user_id=0-385-28089-0 connector_data="foobar" === RUN TestOAuth2DeviceFlow/refresh_with_unauthorized_scopes#01 time=2026-02-05T09:47:42.142Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.142Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.142Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.144Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.145Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.164Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/refresh_with_different_client_id#01 time=2026-02-05T09:47:42.166Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.166Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.166Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.166Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.169Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.188Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true time=2026-02-05T09:47:42.188Z level=ERROR msg="trying to claim token for different client" client_id=0x389a2d0 refresh_client_id=unexcistedclientid === RUN TestOAuth2DeviceFlow/refresh_with_identity_changes#01 time=2026-02-05T09:47:42.190Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.190Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.190Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.191Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.192Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.210Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true time=2026-02-05T09:47:42.212Z level=DEBUG msg="connector data before refresh" connector_data="foobar" time=2026-02-05T09:47:42.212Z level=DEBUG msg="saved connector data" user_id=fooid connector_data="" === RUN TestOAuth2DeviceFlow/unsupported_grant_type#01 time=2026-02-05T09:47:42.233Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.233Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.233Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.233Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.235Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.253Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/PKCE_with_plain#01 time=2026-02-05T09:47:42.257Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.257Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.257Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.258Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.259Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.277Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/PKCE_with_S256#01 time=2026-02-05T09:47:42.281Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.281Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.281Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.282Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.283Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.301Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/PKCE_with_plain_and_wrong_code_verifier#01 time=2026-02-05T09:47:42.305Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.305Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.305Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.306Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.308Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.326Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/PKCE_with_S256_and_wrong_code_verifier#01 time=2026-02-05T09:47:42.328Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.328Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.328Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.329Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.331Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.349Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/PKCE_flow_expected_on_/token#01 time=2026-02-05T09:47:42.354Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.354Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.354Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.355Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.357Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.375Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/No_PKCE_flow_started_on_/auth#01 time=2026-02-05T09:47:42.377Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.377Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.377Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.378Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.379Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.398Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/PKCE_with_S256_and_try_to_downgrade_to_plain#01 time=2026-02-05T09:47:42.401Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.401Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.401Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.402Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.404Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.422Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true === RUN TestOAuth2DeviceFlow/Request_parameter_in_authorization_query#01 time=2026-02-05T09:47:42.426Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.426Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:41.391Z time=2026-02-05T09:47:42.426Z level=INFO msg="config refresh tokens rotation" enabled=true time=2026-02-05T09:47:42.428Z level=INFO msg="received device request" client_id=testclient scoped="[openid email profile groups offline_access]" time=2026-02-05T09:47:42.430Z level=INFO msg="login successful" connector_id=mock username="Kilgore Trout" preferred_username="" email=kilgore@kilgore.trout groups=[authors] time=2026-02-05T09:47:42.448Z level=WARN msg="the /device/token endpoint was called. It will be removed, use /token instead." deprecated=true --- PASS: TestOAuth2DeviceFlow (1.06s) --- PASS: TestOAuth2DeviceFlow/verify_ID_Token (0.03s) --- PASS: TestOAuth2DeviceFlow/fetch_userinfo (0.02s) --- PASS: TestOAuth2DeviceFlow/verify_id_token_and_oauth2_token_expiry (0.02s) --- PASS: TestOAuth2DeviceFlow/verify_at_hash (0.02s) --- PASS: TestOAuth2DeviceFlow/refresh_token (0.04s) --- PASS: TestOAuth2DeviceFlow/refresh_with_explicit_scopes (0.04s) --- PASS: TestOAuth2DeviceFlow/refresh_with_extra_spaces (0.04s) --- PASS: TestOAuth2DeviceFlow/refresh_with_unauthorized_scopes (0.02s) --- PASS: TestOAuth2DeviceFlow/refresh_with_different_client_id (0.02s) --- PASS: TestOAuth2DeviceFlow/refresh_with_identity_changes (0.04s) --- PASS: TestOAuth2DeviceFlow/unsupported_grant_type (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_plain (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_S256 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_plain_and_wrong_code_verifier (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_S256_and_wrong_code_verifier (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_flow_expected_on_/token (0.02s) --- PASS: TestOAuth2DeviceFlow/No_PKCE_flow_started_on_/auth (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_S256_and_try_to_downgrade_to_plain (0.03s) --- PASS: TestOAuth2DeviceFlow/Request_parameter_in_authorization_query (0.02s) --- PASS: TestOAuth2DeviceFlow/verify_ID_Token#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/fetch_userinfo#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/verify_id_token_and_oauth2_token_expiry#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/verify_at_hash#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/refresh_token#01 (0.04s) --- PASS: TestOAuth2DeviceFlow/refresh_with_explicit_scopes#01 (0.04s) --- PASS: TestOAuth2DeviceFlow/refresh_with_extra_spaces#01 (0.04s) --- PASS: TestOAuth2DeviceFlow/refresh_with_unauthorized_scopes#01 (0.03s) --- PASS: TestOAuth2DeviceFlow/refresh_with_different_client_id#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/refresh_with_identity_changes#01 (0.04s) --- PASS: TestOAuth2DeviceFlow/unsupported_grant_type#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_plain#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_S256#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_plain_and_wrong_code_verifier#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_S256_and_wrong_code_verifier#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_flow_expected_on_/token#01 (0.03s) --- PASS: TestOAuth2DeviceFlow/No_PKCE_flow_started_on_/auth#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/PKCE_with_S256_and_try_to_downgrade_to_plain#01 (0.02s) --- PASS: TestOAuth2DeviceFlow/Request_parameter_in_authorization_query#01 (0.02s) === RUN TestServerSupportedGrants === RUN TestServerSupportedGrants/Simple time=2026-02-05T09:47:42.450Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.450Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.450Z time=2026-02-05T09:47:42.450Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestServerSupportedGrants/Minimal time=2026-02-05T09:47:42.451Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.451Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.451Z time=2026-02-05T09:47:42.451Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestServerSupportedGrants/With_password_connector time=2026-02-05T09:47:42.452Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.452Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.452Z time=2026-02-05T09:47:42.452Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestServerSupportedGrants/With_token_response time=2026-02-05T09:47:42.455Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.455Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.455Z time=2026-02-05T09:47:42.455Z level=INFO msg="config refresh tokens rotation" enabled=true === RUN TestServerSupportedGrants/All time=2026-02-05T09:47:42.457Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.457Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.457Z time=2026-02-05T09:47:42.457Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestServerSupportedGrants (0.01s) --- PASS: TestServerSupportedGrants/Simple (0.00s) --- PASS: TestServerSupportedGrants/Minimal (0.00s) --- PASS: TestServerSupportedGrants/With_password_connector (0.00s) --- PASS: TestServerSupportedGrants/With_token_response (0.00s) --- PASS: TestServerSupportedGrants/All (0.00s) === RUN TestHeaders time=2026-02-05T09:47:42.458Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.458Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.458Z time=2026-02-05T09:47:42.458Z level=INFO msg="config refresh tokens rotation" enabled=true --- PASS: TestHeaders (0.00s) === RUN TestConnectorFailureHandling === RUN TestConnectorFailureHandling/all_connectors_succeed_with_flag_enabled time=2026-02-05T09:47:42.460Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.460Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.460Z === RUN TestConnectorFailureHandling/all_connectors_succeed_with_flag_disabled time=2026-02-05T09:47:42.461Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.461Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.461Z === RUN TestConnectorFailureHandling/partial_connector_failure_with_flag_enabled time=2026-02-05T09:47:42.462Z level=ERROR msg="server: Failed to open connector" id=bad-connector err="failed to open connector: unknown connector type \"nonexistent\"" time=2026-02-05T09:47:42.462Z level=INFO msg="keys expired, rotating" time=2026-02-05T09:47:42.462Z level=INFO msg="keys rotated" next_rotation=2126-01-12T09:47:42.462Z === RUN TestConnectorFailureHandling/partial_connector_failure_with_flag_disabled === RUN TestConnectorFailureHandling/all_connectors_fail_with_flag_enabled time=2026-02-05T09:47:42.465Z level=ERROR msg="server: Failed to open connector" id=bad1 err="failed to open connector: unknown connector type \"nonexistent1\"" time=2026-02-05T09:47:42.465Z level=ERROR msg="server: Failed to open connector" id=bad2 err="failed to open connector: unknown connector type \"nonexistent2\"" === RUN TestConnectorFailureHandling/all_connectors_fail_with_flag_disabled === RUN TestConnectorFailureHandling/no_connectors --- PASS: TestConnectorFailureHandling (0.01s) --- PASS: TestConnectorFailureHandling/all_connectors_succeed_with_flag_enabled (0.00s) --- PASS: TestConnectorFailureHandling/all_connectors_succeed_with_flag_disabled (0.00s) --- PASS: TestConnectorFailureHandling/partial_connector_failure_with_flag_enabled (0.00s) --- PASS: TestConnectorFailureHandling/partial_connector_failure_with_flag_disabled (0.00s) --- PASS: TestConnectorFailureHandling/all_connectors_fail_with_flag_enabled (0.00s) --- PASS: TestConnectorFailureHandling/all_connectors_fail_with_flag_disabled (0.00s) --- PASS: TestConnectorFailureHandling/no_connectors (0.00s) === RUN TestRelativeURL === RUN TestRelativeURL/server-root-req-one-level-asset-two-level === RUN TestRelativeURL/server-one-level-req-one-level-asset-two-level === RUN TestRelativeURL/server-root-req-two-level-asset-three-level === RUN TestRelativeURL/external-url --- PASS: TestRelativeURL (0.00s) --- PASS: TestRelativeURL/server-root-req-one-level-asset-two-level (0.00s) --- PASS: TestRelativeURL/server-one-level-req-one-level-asset-two-level (0.00s) --- PASS: TestRelativeURL/server-root-req-two-level-asset-three-level (0.00s) --- PASS: TestRelativeURL/external-url (0.00s) PASS ok github.com/dexidp/dex/server 9.352s ? github.com/dexidp/dex/server/internal [no test files] ? github.com/dexidp/dex/storage [no test files] ? github.com/dexidp/dex/storage/conformance [no test files] === RUN TestMySQL mysql_test.go:57: test environment variable DEX_MYSQL_ENT_HOST not set, skipping --- SKIP: TestMySQL (0.00s) === RUN TestMySQLDSN === RUN TestMySQLDSN/Host_port === RUN TestMySQLDSN/Host_with_port === RUN TestMySQLDSN/Host_ipv6_with_port === RUN TestMySQLDSN/Credentials_and_timeout === RUN TestMySQLDSN/SSL === RUN TestMySQLDSN/With_Params --- PASS: TestMySQLDSN (0.00s) --- PASS: TestMySQLDSN/Host_port (0.00s) --- PASS: TestMySQLDSN/Host_with_port (0.00s) --- PASS: TestMySQLDSN/Host_ipv6_with_port (0.00s) --- PASS: TestMySQLDSN/Credentials_and_timeout (0.00s) --- PASS: TestMySQLDSN/SSL (0.00s) --- PASS: TestMySQLDSN/With_Params (0.00s) === RUN TestPostgres postgres_test.go:52: test environment variable DEX_POSTGRES_ENT_HOST not set, skipping --- SKIP: TestPostgres (0.00s) === RUN TestPostgresDSN === RUN TestPostgresDSN/Host_port === RUN TestPostgresDSN/Host_with_port === RUN TestPostgresDSN/Host_ipv6_with_port === RUN TestPostgresDSN/Credentials_and_timeout === RUN TestPostgresDSN/SSL --- PASS: TestPostgresDSN (0.00s) --- PASS: TestPostgresDSN/Host_port (0.00s) --- PASS: TestPostgresDSN/Host_with_port (0.00s) --- PASS: TestPostgresDSN/Host_ipv6_with_port (0.00s) --- PASS: TestPostgresDSN/Credentials_and_timeout (0.00s) --- PASS: TestPostgresDSN/SSL (0.00s) === RUN TestPostgresDriver postgres_test.go:140: test environment variable DEX_POSTGRES_ENT_HOST not set, skipping --- SKIP: TestPostgresDriver (0.00s) === RUN TestSQLite3 === RUN TestSQLite3/AuthCodeCRUD time=2026-02-05T09:47:33.178Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/AuthRequestCRUD time=2026-02-05T09:47:33.183Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/ClientCRUD time=2026-02-05T09:47:33.187Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/RefreshTokenCRUD time=2026-02-05T09:47:33.191Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/PasswordCRUD time=2026-02-05T09:47:33.195Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/KeysCRUD time=2026-02-05T09:47:33.201Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/OfflineSessionCRUD time=2026-02-05T09:47:33.226Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/ConnectorCRUD time=2026-02-05T09:47:33.229Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/GarbageCollection time=2026-02-05T09:47:33.233Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/TimezoneSupport time=2026-02-05T09:47:33.241Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/DeviceRequestCRUD time=2026-02-05T09:47:33.244Z level=DEBUG msg="experimental ent-based storage driver is enabled" === RUN TestSQLite3/DeviceTokenCRUD time=2026-02-05T09:47:33.247Z level=DEBUG msg="experimental ent-based storage driver is enabled" --- PASS: TestSQLite3 (0.07s) --- PASS: TestSQLite3/AuthCodeCRUD (0.01s) --- PASS: TestSQLite3/AuthRequestCRUD (0.00s) --- PASS: TestSQLite3/ClientCRUD (0.00s) --- PASS: TestSQLite3/RefreshTokenCRUD (0.00s) --- PASS: TestSQLite3/PasswordCRUD (0.01s) --- PASS: TestSQLite3/KeysCRUD (0.03s) --- PASS: TestSQLite3/OfflineSessionCRUD (0.00s) --- PASS: TestSQLite3/ConnectorCRUD (0.00s) --- PASS: TestSQLite3/GarbageCollection (0.01s) --- PASS: TestSQLite3/TimezoneSupport (0.00s) --- PASS: TestSQLite3/DeviceRequestCRUD (0.00s) --- PASS: TestSQLite3/DeviceTokenCRUD (0.00s) PASS ok github.com/dexidp/dex/storage/ent 0.134s ? github.com/dexidp/dex/storage/ent/client [no test files] ? github.com/dexidp/dex/storage/ent/db [no test files] ? github.com/dexidp/dex/storage/ent/db/authcode [no test files] ? github.com/dexidp/dex/storage/ent/db/authrequest [no test files] ? github.com/dexidp/dex/storage/ent/db/connector [no test files] ? github.com/dexidp/dex/storage/ent/db/devicerequest [no test files] ? github.com/dexidp/dex/storage/ent/db/devicetoken [no test files] ? github.com/dexidp/dex/storage/ent/db/enttest [no test files] ? github.com/dexidp/dex/storage/ent/db/hook [no test files] ? github.com/dexidp/dex/storage/ent/db/keys [no test files] ? github.com/dexidp/dex/storage/ent/db/migrate [no test files] ? github.com/dexidp/dex/storage/ent/db/oauth2client [no test files] ? github.com/dexidp/dex/storage/ent/db/offlinesession [no test files] ? github.com/dexidp/dex/storage/ent/db/password [no test files] ? github.com/dexidp/dex/storage/ent/db/predicate [no test files] ? github.com/dexidp/dex/storage/ent/db/refreshtoken [no test files] ? github.com/dexidp/dex/storage/ent/db/runtime [no test files] ? github.com/dexidp/dex/storage/ent/schema [no test files] === RUN TestEtcd etcd_test.go:62: test environment variable "DEX_ETCD_ENDPOINTS" not set, skipping --- SKIP: TestEtcd (0.00s) PASS ok github.com/dexidp/dex/storage/etcd 0.062s === RUN TestIDToName --- PASS: TestIDToName (0.00s) === RUN TestOfflineTokenName --- PASS: TestOfflineTokenName (0.00s) === RUN TestInClusterTransport === RUN TestInClusterTransport/Stale_token === RUN TestInClusterTransport/Normal_token --- PASS: TestInClusterTransport (0.00s) --- PASS: TestInClusterTransport/Stale_token (0.00s) --- PASS: TestInClusterTransport/Normal_token (0.00s) === RUN TestNamespaceFromServiceAccountJWT --- PASS: TestNamespaceFromServiceAccountJWT (0.00s) === RUN TestGetClusterConfigNamespace === RUN TestGetClusterConfigNamespace/With_env_variable === RUN TestGetClusterConfigNamespace/With_token === RUN TestGetClusterConfigNamespace/With_namespace_file === RUN TestGetClusterConfigNamespace/With_file_and_token === RUN TestGetClusterConfigNamespace/With_file_and_env === RUN TestGetClusterConfigNamespace/With_token_and_env === RUN TestGetClusterConfigNamespace/With_file,_token_and_env === RUN TestGetClusterConfigNamespace/Without_anything --- PASS: TestGetClusterConfigNamespace (0.00s) --- PASS: TestGetClusterConfigNamespace/With_env_variable (0.00s) --- PASS: TestGetClusterConfigNamespace/With_token (0.00s) --- PASS: TestGetClusterConfigNamespace/With_namespace_file (0.00s) --- PASS: TestGetClusterConfigNamespace/With_file_and_token (0.00s) --- PASS: TestGetClusterConfigNamespace/With_file_and_env (0.00s) --- PASS: TestGetClusterConfigNamespace/With_token_and_env (0.00s) --- PASS: TestGetClusterConfigNamespace/With_file,_token_and_env (0.00s) --- PASS: TestGetClusterConfigNamespace/Without_anything (0.00s) === RUN TestStorage storage_test.go:28: variable "DEX_KUBERNETES_CONFIG_PATH" not set, skipping kubernetes storage tests --- SKIP: TestStorage (0.00s) === RUN TestURLFor --- PASS: TestURLFor (0.00s) === RUN TestUpdateKeys --- PASS: TestUpdateKeys (0.12s) === RUN TestRetryOnConflict === RUN TestRetryOnConflict/Timeout_reached === RUN TestRetryOnConflict/HTTP_Error === RUN TestRetryOnConflict/Error === RUN TestRetryOnConflict/OK --- PASS: TestRetryOnConflict (0.01s) --- PASS: TestRetryOnConflict/Timeout_reached (0.01s) --- PASS: TestRetryOnConflict/HTTP_Error (0.00s) --- PASS: TestRetryOnConflict/Error (0.00s) --- PASS: TestRetryOnConflict/OK (0.00s) === RUN TestRefreshTokenLock storage_test.go:299: variable "DEX_KUBERNETES_CONFIG_PATH" not set, skipping kubernetes storage tests --- SKIP: TestRefreshTokenLock (0.00s) PASS ok github.com/dexidp/dex/storage/kubernetes 0.181s ? github.com/dexidp/dex/storage/kubernetes/k8sapi [no test files] === RUN TestStorage === RUN TestStorage/AuthCodeCRUD === RUN TestStorage/AuthRequestCRUD === RUN TestStorage/ClientCRUD === RUN TestStorage/RefreshTokenCRUD === RUN TestStorage/PasswordCRUD === RUN TestStorage/KeysCRUD === RUN TestStorage/OfflineSessionCRUD === RUN TestStorage/ConnectorCRUD === RUN TestStorage/GarbageCollection === RUN TestStorage/TimezoneSupport === RUN TestStorage/DeviceRequestCRUD === RUN TestStorage/DeviceTokenCRUD --- PASS: TestStorage (0.00s) --- PASS: TestStorage/AuthCodeCRUD (0.00s) --- PASS: TestStorage/AuthRequestCRUD (0.00s) --- PASS: TestStorage/ClientCRUD (0.00s) --- PASS: TestStorage/RefreshTokenCRUD (0.00s) --- PASS: TestStorage/PasswordCRUD (0.00s) --- PASS: TestStorage/KeysCRUD (0.00s) --- PASS: TestStorage/OfflineSessionCRUD (0.00s) --- PASS: TestStorage/ConnectorCRUD (0.00s) --- PASS: TestStorage/GarbageCollection (0.00s) --- PASS: TestStorage/TimezoneSupport (0.00s) --- PASS: TestStorage/DeviceRequestCRUD (0.00s) --- PASS: TestStorage/DeviceTokenCRUD (0.00s) === RUN TestStaticClients --- PASS: TestStaticClients (0.00s) === RUN TestStaticPasswords --- PASS: TestStaticPasswords (0.00s) === RUN TestStaticConnectors --- PASS: TestStaticConnectors (0.00s) PASS ok github.com/dexidp/dex/storage/memory 0.048s === RUN TestCreateDataSourceName === RUN TestCreateDataSourceName/with_no_configuration === RUN TestCreateDataSourceName/with_typical_configuration === RUN TestCreateDataSourceName/with_unix_socket_host === RUN TestCreateDataSourceName/with_tcp_host === RUN TestCreateDataSourceName/with_tcp_host:port === RUN TestCreateDataSourceName/with_tcp_host_and_port === RUN TestCreateDataSourceName/with_ssl_ca_cert === RUN TestCreateDataSourceName/with_ssl_client_cert === RUN TestCreateDataSourceName/with_funny_characters_in_credentials --- PASS: TestCreateDataSourceName (0.00s) --- PASS: TestCreateDataSourceName/with_no_configuration (0.00s) --- PASS: TestCreateDataSourceName/with_typical_configuration (0.00s) --- PASS: TestCreateDataSourceName/with_unix_socket_host (0.00s) --- PASS: TestCreateDataSourceName/with_tcp_host (0.00s) --- PASS: TestCreateDataSourceName/with_tcp_host:port (0.00s) --- PASS: TestCreateDataSourceName/with_tcp_host_and_port (0.00s) --- PASS: TestCreateDataSourceName/with_ssl_ca_cert (0.00s) --- PASS: TestCreateDataSourceName/with_ssl_client_cert (0.00s) --- PASS: TestCreateDataSourceName/with_funny_characters_in_credentials (0.00s) === RUN TestPostgres config_test.go:213: test environment variable "DEX_POSTGRES_HOST" not set, skipping --- SKIP: TestPostgres (0.00s) === RUN TestMySQL config_test.go:247: test environment variable "DEX_MYSQL_HOST" not set, skipping --- SKIP: TestMySQL (0.00s) === RUN TestDecoder --- PASS: TestDecoder (0.00s) === RUN TestEncoder --- PASS: TestEncoder (0.00s) === RUN TestMigrate --- PASS: TestMigrate (0.01s) === RUN TestPostgresTunables postgres_test.go:16: test environment variable "DEX_POSTGRES_HOST" not set, skipping --- SKIP: TestPostgresTunables (0.00s) === RUN TestTranslate --- PASS: TestTranslate (0.00s) === RUN TestSQLite3 === RUN TestSQLite3/AuthCodeCRUD === RUN TestSQLite3/AuthRequestCRUD === RUN TestSQLite3/ClientCRUD === RUN TestSQLite3/RefreshTokenCRUD === RUN TestSQLite3/PasswordCRUD === RUN TestSQLite3/KeysCRUD === RUN TestSQLite3/OfflineSessionCRUD === RUN TestSQLite3/ConnectorCRUD === RUN TestSQLite3/GarbageCollection === RUN TestSQLite3/TimezoneSupport === RUN TestSQLite3/DeviceRequestCRUD === RUN TestSQLite3/DeviceTokenCRUD --- PASS: TestSQLite3 (0.14s) --- PASS: TestSQLite3/AuthCodeCRUD (0.01s) --- PASS: TestSQLite3/AuthRequestCRUD (0.01s) --- PASS: TestSQLite3/ClientCRUD (0.01s) --- PASS: TestSQLite3/RefreshTokenCRUD (0.01s) --- PASS: TestSQLite3/PasswordCRUD (0.01s) --- PASS: TestSQLite3/KeysCRUD (0.03s) --- PASS: TestSQLite3/OfflineSessionCRUD (0.01s) --- PASS: TestSQLite3/ConnectorCRUD (0.01s) --- PASS: TestSQLite3/GarbageCollection (0.01s) --- PASS: TestSQLite3/TimezoneSupport (0.01s) --- PASS: TestSQLite3/DeviceRequestCRUD (0.01s) --- PASS: TestSQLite3/DeviceTokenCRUD (0.01s) PASS ok github.com/dexidp/dex/storage/sql 0.199s ? github.com/dexidp/dex/web [no test files] >>> dex-idp: Entering fakeroot... created directory: '/home/buildozer/aports/community/dex-idp/pkg/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/bin' 'bin/dex' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/bin/dex-idp' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/etc' 'config.yaml.dist' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/etc/dex.yaml' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/etc/init.d' '/home/buildozer/aports/community/dex-idp/src/dex-idp.initd' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/etc/init.d/dex-idp' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/bash-completion/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/bash-completion/completions' 'dex-idp.bash' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/bash-completion/completions/dex-idp' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/fish/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/fish/vendor_completions.d' 'dex-idp.fish' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/fish/vendor_completions.d/dex-idp.fish' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/zsh/' created directory: '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/zsh/site-functions' 'dex-idp.zsh' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp/usr/share/zsh/site-functions/_dex-idp' >>> dex-idp-bash-completion*: Running split function bashcomp... 'usr/share/bash-completion/completions' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp-bash-completion/usr/share/bash-completion/completions' >>> dex-idp-bash-completion*: Preparing subpackage dex-idp-bash-completion... >>> dex-idp-bash-completion*: Running postcheck for dex-idp-bash-completion >>> dex-idp-fish-completion*: Running split function fishcomp... 'usr/share/fish/vendor_completions.d' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp-fish-completion/usr/share/fish/vendor_completions.d' >>> dex-idp-fish-completion*: Preparing subpackage dex-idp-fish-completion... >>> dex-idp-fish-completion*: Running postcheck for dex-idp-fish-completion >>> dex-idp-openrc*: Running split function openrc... 'etc/init.d' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp-openrc/etc/init.d' >>> dex-idp-openrc*: Preparing subpackage dex-idp-openrc... >>> dex-idp-openrc*: Running postcheck for dex-idp-openrc >>> dex-idp-zsh-completion*: Running split function zshcomp... 'usr/share/zsh/site-functions' -> '/home/buildozer/aports/community/dex-idp/pkg/dex-idp-zsh-completion/usr/share/zsh/site-functions' >>> dex-idp-zsh-completion*: Preparing subpackage dex-idp-zsh-completion... >>> dex-idp-zsh-completion*: Running postcheck for dex-idp-zsh-completion >>> dex-idp*: Running postcheck for dex-idp >>> dex-idp*: Preparing package dex-idp... >>> dex-idp*: Stripping binaries >>> dex-idp*: Script found. /bin/sh added as a dependency for dex-idp-2.44.0-r6.apk >>> dex-idp*: Adding .pre-install >>> dex-idp*: Scanning shared objects >>> dex-idp-bash-completion*: Tracing dependencies... >>> dex-idp-bash-completion*: Package size: 15.6 KB >>> dex-idp-bash-completion*: Compressing data... >>> dex-idp-bash-completion*: Create checksum... >>> dex-idp-bash-completion*: Create dex-idp-bash-completion-2.44.0-r6.apk >>> dex-idp-fish-completion*: Tracing dependencies... >>> dex-idp-fish-completion*: Package size: 9.2 KB >>> dex-idp-fish-completion*: Compressing data... >>> dex-idp-fish-completion*: Create checksum... >>> dex-idp-fish-completion*: Create dex-idp-fish-completion-2.44.0-r6.apk >>> dex-idp-openrc*: Tracing dependencies... >>> dex-idp-openrc*: Package size: 294.0 B >>> dex-idp-openrc*: Compressing data... >>> dex-idp-openrc*: Create checksum... >>> dex-idp-openrc*: Create dex-idp-openrc-2.44.0-r6.apk >>> dex-idp-zsh-completion*: Tracing dependencies... >>> dex-idp-zsh-completion*: Package size: 7.5 KB >>> dex-idp-zsh-completion*: Compressing data... >>> dex-idp-zsh-completion*: Create checksum... >>> dex-idp-zsh-completion*: Create dex-idp-zsh-completion-2.44.0-r6.apk >>> dex-idp*: Tracing dependencies... /bin/sh so:libc.musl-armhf.so.1 >>> dex-idp*: Package size: 34.3 MB >>> dex-idp*: Compressing data... >>> dex-idp*: Create checksum... >>> dex-idp*: Create dex-idp-2.44.0-r6.apk >>> dex-idp: Build complete at Thu, 05 Feb 2026 09:47:43 +0000 elapsed time 0h 2m 2s >>> dex-idp: Cleaning up srcdir >>> dex-idp: Cleaning up pkgdir >>> dex-idp: Cleaning up tmpdir >>> dex-idp: Uninstalling dependencies... (1/3) Purging .makedepends-dex-idp (20260205.094542) (2/3) Purging go (1.25.7-r0) (3/3) Purging tzdata (2025c-r0) Executing busybox-1.37.0-r30.trigger OK: 342.6 MiB in 105 packages >>> dex-idp: Updating the community/armhf repository index... >>> dex-idp: Signing the index...