@@ -588,7 +588,7 @@ func TestWrapper_Callback(t *testing.T) {
588
588
var tokenResponse TokenResponse
589
589
err = ctx .client .accessTokenClientStore ().Get (token , & tokenResponse )
590
590
require .NoError (t , err )
591
- assert .Equal (t , oauth .AccessTokenRequestStatusActive , * tokenResponse .Status )
591
+ assert .Equal (t , oauth .AccessTokenRequestStatusActive , tokenResponse .Get ( "status" ) )
592
592
assert .Equal (t , "access" , tokenResponse .AccessToken )
593
593
})
594
594
t .Run ("unknown did" , func (t * testing.T ) {
@@ -904,7 +904,7 @@ func TestWrapper_RequestUserAccessToken(t *testing.T) {
904
904
var tokenResponse TokenResponse
905
905
require .NotNil (t , redirectResponse .SessionId )
906
906
err = ctx .client .accessTokenClientStore ().Get (redirectResponse .SessionId , & tokenResponse )
907
- assert .Equal (t , oauth .AccessTokenRequestStatusPending , * tokenResponse .Status )
907
+ assert .Equal (t , oauth .AccessTokenRequestStatusPending , tokenResponse .Get ( "status" ) )
908
908
})
909
909
t .Run ("preauthorized_user" , func (t * testing.T ) {
910
910
ctx := newTestClient (t )
@@ -1288,19 +1288,15 @@ func TestWrapper_CallbackOid4vciCredentialIssuance(t *testing.T) {
1288
1288
IssuerTokenEndpoint : tokenEndpoint ,
1289
1289
IssuerCredentialEndpoint : credEndpoint ,
1290
1290
}
1291
- tokenResponse := oauth.Oid4vciTokenResponse {
1292
- AccessToken : accessToken ,
1293
- TokenType : "Bearer" ,
1294
- CNonce : & cNonce ,
1295
- }
1291
+ tokenResponse := oauth .NewTokenResponse (accessToken , "Bearer" , 0 , "" ).With ("c_nonce" , cNonce )
1296
1292
credentialResponse := iam.CredentialResponse {
1297
1293
Format : "jwt_vc" ,
1298
1294
Credential : verifiableCredential .Raw (),
1299
1295
}
1300
1296
t .Run ("ok" , func (t * testing.T ) {
1301
1297
ctx := newTestClient (t )
1302
1298
ctx .client .storageEngine .GetSessionDatabase ().GetStore (15 * time .Minute , "oid4vci" ).Put (state , & session )
1303
- ctx .iamClient .EXPECT ().AccessTokenOid4vci (nil , holderDID . String (), tokenEndpoint , redirectURI , code , & pkceParams .Verifier ).Return (& tokenResponse , nil )
1299
+ ctx .iamClient .EXPECT ().AccessToken (nil , code , issuerDID , redirectURI , holderDID , pkceParams .Verifier ).Return (tokenResponse , nil )
1304
1300
ctx .keyResolver .EXPECT ().ResolveKey (holderDID , nil , resolver .NutsSigningKeyType ).Return (ssi .MustParseURI ("kid" ), nil , nil )
1305
1301
ctx .jwtSigner .EXPECT ().SignJWT (gomock .Any (), gomock .Any (), gomock .Any (), gomock .Any ()).Return ("signed-proof" , nil )
1306
1302
ctx .iamClient .EXPECT ().VerifiableCredentials (nil , credEndpoint , accessToken , "signed-proof" ).Return (& credentialResponse , nil )
@@ -1352,7 +1348,7 @@ func TestWrapper_CallbackOid4vciCredentialIssuance(t *testing.T) {
1352
1348
t .Run ("fail_access_token" , func (t * testing.T ) {
1353
1349
ctx := newTestClient (t )
1354
1350
ctx .client .storageEngine .GetSessionDatabase ().GetStore (15 * time .Minute , "oid4vci" ).Put (state , & session )
1355
- ctx .iamClient .EXPECT ().AccessTokenOid4vci (nil , holderDID . String (), tokenEndpoint , redirectURI , code , & pkceParams .Verifier ).Return (nil , errors .New ("FAIL" ))
1351
+ ctx .iamClient .EXPECT ().AccessToken (nil , code , issuerDID , redirectURI , holderDID , pkceParams .Verifier ).Return (nil , errors .New ("FAIL" ))
1356
1352
1357
1353
callback , err := ctx .client .CallbackOid4vciCredentialIssuance (nil , CallbackOid4vciCredentialIssuanceRequestObject {
1358
1354
Params : CallbackOid4vciCredentialIssuanceParams {
@@ -1368,7 +1364,7 @@ func TestWrapper_CallbackOid4vciCredentialIssuance(t *testing.T) {
1368
1364
t .Run ("fail_credential_response" , func (t * testing.T ) {
1369
1365
ctx := newTestClient (t )
1370
1366
require .NoError (t , ctx .client .storageEngine .GetSessionDatabase ().GetStore (15 * time .Minute , "oid4vci" ).Put (state , & session ))
1371
- ctx .iamClient .EXPECT ().AccessTokenOid4vci (nil , holderDID . String (), tokenEndpoint , redirectURI , code , & pkceParams .Verifier ).Return (& tokenResponse , nil )
1367
+ ctx .iamClient .EXPECT ().AccessToken (nil , code , issuerDID , redirectURI , holderDID , pkceParams .Verifier ).Return (tokenResponse , nil )
1372
1368
ctx .keyResolver .EXPECT ().ResolveKey (holderDID , nil , resolver .NutsSigningKeyType ).Return (ssi .MustParseURI ("kid" ), nil , nil )
1373
1369
ctx .jwtSigner .EXPECT ().SignJWT (gomock .Any (), gomock .Any (), gomock .Any (), gomock .Any ()).Return ("signed-proof" , nil )
1374
1370
ctx .iamClient .EXPECT ().VerifiableCredentials (nil , credEndpoint , accessToken , "signed-proof" ).Return (nil , errors .New ("FAIL" ))
@@ -1387,7 +1383,7 @@ func TestWrapper_CallbackOid4vciCredentialIssuance(t *testing.T) {
1387
1383
t .Run ("fail_verify" , func (t * testing.T ) {
1388
1384
ctx := newTestClient (t )
1389
1385
require .NoError (t , ctx .client .storageEngine .GetSessionDatabase ().GetStore (15 * time .Minute , "oid4vci" ).Put (state , & session ))
1390
- ctx .iamClient .EXPECT ().AccessTokenOid4vci (nil , holderDID . String (), tokenEndpoint , redirectURI , code , & pkceParams .Verifier ).Return (& tokenResponse , nil )
1386
+ ctx .iamClient .EXPECT ().AccessToken (nil , code , issuerDID , redirectURI , holderDID , pkceParams .Verifier ).Return (tokenResponse , nil )
1391
1387
ctx .keyResolver .EXPECT ().ResolveKey (holderDID , nil , resolver .NutsSigningKeyType ).Return (ssi .MustParseURI ("kid" ), nil , nil )
1392
1388
ctx .jwtSigner .EXPECT ().SignJWT (gomock .Any (), gomock .Any (), gomock .Any (), gomock .Any ()).Return ("signed-proof" , nil )
1393
1389
ctx .iamClient .EXPECT ().VerifiableCredentials (nil , credEndpoint , accessToken , "signed-proof" ).Return (& credentialResponse , nil )
@@ -1406,7 +1402,7 @@ func TestWrapper_CallbackOid4vciCredentialIssuance(t *testing.T) {
1406
1402
t .Run ("error - key not found" , func (t * testing.T ) {
1407
1403
ctx := newTestClient (t )
1408
1404
require .NoError (t , ctx .client .storageEngine .GetSessionDatabase ().GetStore (15 * time .Minute , "oid4vci" ).Put (state , & session ))
1409
- ctx .iamClient .EXPECT ().AccessTokenOid4vci (nil , holderDID . String (), tokenEndpoint , redirectURI , code , & pkceParams .Verifier ).Return (& tokenResponse , nil )
1405
+ ctx .iamClient .EXPECT ().AccessToken (nil , code , issuerDID , redirectURI , holderDID , pkceParams .Verifier ).Return (tokenResponse , nil )
1410
1406
ctx .keyResolver .EXPECT ().ResolveKey (holderDID , nil , resolver .NutsSigningKeyType ).Return (ssi.URI {}, nil , resolver .ErrKeyNotFound )
1411
1407
1412
1408
callback , err := ctx .client .CallbackOid4vciCredentialIssuance (nil , CallbackOid4vciCredentialIssuanceRequestObject {
@@ -1423,7 +1419,7 @@ func TestWrapper_CallbackOid4vciCredentialIssuance(t *testing.T) {
1423
1419
t .Run ("error - signature failure" , func (t * testing.T ) {
1424
1420
ctx := newTestClient (t )
1425
1421
require .NoError (t , ctx .client .storageEngine .GetSessionDatabase ().GetStore (15 * time .Minute , "oid4vci" ).Put (state , & session ))
1426
- ctx .iamClient .EXPECT ().AccessTokenOid4vci (nil , holderDID . String (), tokenEndpoint , redirectURI , code , & pkceParams .Verifier ).Return (& tokenResponse , nil )
1422
+ ctx .iamClient .EXPECT ().AccessToken (nil , code , issuerDID , redirectURI , holderDID , pkceParams .Verifier ).Return (tokenResponse , nil )
1427
1423
ctx .keyResolver .EXPECT ().ResolveKey (holderDID , nil , resolver .NutsSigningKeyType ).Return (ssi .MustParseURI ("kid" ), nil , nil )
1428
1424
ctx .jwtSigner .EXPECT ().SignJWT (gomock .Any (), gomock .Any (), gomock .Any (), gomock .Any ()).Return ("" , errors .New ("signature failed" ))
1429
1425
0 commit comments