Scope: "3gpp#aefIdpath",
}
accessMgmMock := keycloackmocks.AccessManagement{}
- accessMgmMock.On("GetToken", mock.AnythingOfType("string"), mock.AnythingOfType("string"), mock.AnythingOfType("string"), mock.AnythingOfType("string")).Return(jwt, nil)
+ accessMgmMock.On("GetToken", mock.AnythingOfType("string"), mock.AnythingOfType("map[string][]string")).Return(jwt, nil)
requestHandler, _ := getEcho(&serviceRegisterMock, &publishRegisterMock, &invokerRegisterMock, &accessMgmMock)
invokerRegisterMock.AssertCalled(t, "VerifyInvokerSecret", clientId, clientSecret)
serviceRegisterMock.AssertCalled(t, "IsFunctionRegistered", aefId)
publishRegisterMock.AssertCalled(t, "IsAPIPublished", aefId, path)
- accessMgmMock.AssertCalled(t, "GetToken", clientId, clientSecret, "3gpp#"+aefId+":"+path, "invokerrealm")
+ accessMgmMock.AssertNumberOfCalls(t, "GetToken", 1)
}
func TestPostSecurityIdTokenInvokerNotRegistered(t *testing.T) {
jwt := keycloak.Jwttoken{}
accessMgmMock := keycloackmocks.AccessManagement{}
- accessMgmMock.On("GetToken", mock.AnythingOfType("string"), mock.AnythingOfType("string"), mock.AnythingOfType("string"), mock.AnythingOfType("string")).Return(jwt, errors.New("invalid_credentials"))
+ accessMgmMock.On("GetToken", mock.AnythingOfType("string"), mock.AnythingOfType("map[string][]string")).Return(jwt, errors.New("invalid_credentials"))
requestHandler, _ := getEcho(&serviceRegisterMock, &publishRegisterMock, &invokerRegisterMock, &accessMgmMock)
invokerRegisterMock.AssertCalled(t, "VerifyInvokerSecret", clientId, clientSecret)
serviceRegisterMock.AssertCalled(t, "IsFunctionRegistered", aefId)
publishRegisterMock.AssertCalled(t, "IsAPIPublished", aefId, path)
- accessMgmMock.AssertCalled(t, "GetToken", clientId, clientSecret, "3gpp#"+aefId+":"+path, "invokerrealm")
+ accessMgmMock.AssertNumberOfCalls(t, "GetToken", 1)
}
func TestPutTrustedInvokerSuccessfully(t *testing.T) {
assert.Equal(t, *security.SelSecurityMethod, publishserviceapi.SecurityMethodPKI)
}
invokerRegisterMock.AssertCalled(t, "IsInvokerRegistered", invokerId)
-
}
func TestPutTrustedInkoverNotRegistered(t *testing.T) {
assert.Equal(t, publishserviceapi.SecurityMethodPSK, *security.SelSecurityMethod)
}
invokerRegisterMock.AssertCalled(t, "IsInvokerRegistered", invokerId)
-
}
func TestPutTrustedInvokerNotFoundSecurityMethod(t *testing.T) {
publishRegisterMock := publishmocks.PublishRegister{}
publishRegisterMock.On("GetAllPublishedServices").Return(publishedServices)
- requestHandler, _ := getEcho(nil, &publishRegisterMock, &invokerRegisterMock, nil)
+ accessMgmMock := keycloackmocks.AccessManagement{}
+ accessMgmMock.On("AddClient", mock.AnythingOfType("string"), mock.AnythingOfType("string")).Return(nil)
+
+ requestHandler, _ := getEcho(nil, &publishRegisterMock, &invokerRegisterMock, &accessMgmMock)
invokerId := "invokerId"
serviceSecurityUnderTest := getServiceSecurity("aefId", "apiId")
assert.NoError(t, err, "error unmarshaling response")
assert.Equal(t, newNotifURL, string(resultResponse.NotificationDestination))
- // Update with an service security missing required NotificationDestination, should get 400 with problem details
+ // Update with a service security missing required NotificationDestination, should get 400 with problem details
invalidServiceSecurity := securityapi.ServiceSecurity{
SecurityInfo: []securityapi.SecurityInformation{
{