diff --git a/command/agent_test.go b/command/agent_test.go index d7281fc38e..386ad47799 100644 --- a/command/agent_test.go +++ b/command/agent_test.go @@ -64,6 +64,7 @@ func TestExitAfterAuth(t *testing.T) { } _, err = client.Logical().Write("auth/jwt/role/test", map[string]interface{}{ + "role_type": "jwt", "bound_subject": "r3qXcK2bix9eFECzsU3Sbmh0K16fatW6@clients", "bound_audiences": "https://vault.plugin.auth.jwt.test", "user_claim": "https://vault/user", diff --git a/command/auth_enable_test.go b/command/auth_enable_test.go index 4c94cee3da..6813ded478 100644 --- a/command/auth_enable_test.go +++ b/command/auth_enable_test.go @@ -175,7 +175,8 @@ func TestAuthEnableCommand_Run(t *testing.T) { // Add 1 to account for the "token" backend, which is visible when you walk the filesystem but // is treated as special and excluded from the registry. - expected := len(builtinplugins.Registry.Keys(consts.PluginTypeCredential)) + 1 + // Subtract 1 to account for "oidc" which is an alias of "jwt" and not a separate plugin. + expected := len(builtinplugins.Registry.Keys(consts.PluginTypeCredential)) if len(backends) != expected { t.Fatalf("expected %d credential backends, got %d", expected, len(backends)) } diff --git a/command/base_predict_test.go b/command/base_predict_test.go index b4f3264d19..c09dc9f4cc 100644 --- a/command/base_predict_test.go +++ b/command/base_predict_test.go @@ -352,6 +352,7 @@ func TestPredict_Plugins(t *testing.T) { "mysql-legacy-database-plugin", "mysql-rds-database-plugin", "nomad", + "oidc", "okta", "pki", "postgresql",