@@ -233,10 +233,10 @@ func TestWrapper_handleAuthorizeRequestFromVerifier(t *testing.T) {
233
233
ctx := newTestClient (t )
234
234
params := defaultParams ()
235
235
params [clientMetadataParam ] = "not empty"
236
- putState ( ctx , "state" , session )
236
+ _ = ctx . client . userSessionStore (). Put ( userSessionID , userSession )
237
237
expectPostError (t , ctx , oauth .InvalidRequest , "client_metadata and client_metadata_uri are mutually exclusive" , responseURI , "state" )
238
238
239
- _ , err := ctx .client .handleAuthorizeRequestFromVerifier (context . Background () , holderDID , params )
239
+ _ , err := ctx .client .handleAuthorizeRequestFromVerifier (httpRequestCtx , holderDID , params , pe . WalletOwnerOrganization )
240
240
241
241
require .NoError (t , err )
242
242
})
@@ -245,9 +245,10 @@ func TestWrapper_handleAuthorizeRequestFromVerifier(t *testing.T) {
245
245
params := defaultParams ()
246
246
delete (params , clientMetadataURIParam )
247
247
params [clientMetadataParam ] = "{invalid"
248
+ _ = ctx .client .userSessionStore ().Put (userSessionID , userSession )
248
249
expectPostError (t , ctx , oauth .InvalidRequest , "invalid client_metadata" , responseURI , "state" )
249
250
250
- _ , err := ctx .client .handleAuthorizeRequestFromVerifier (context . Background () , holderDID , params )
251
+ _ , err := ctx .client .handleAuthorizeRequestFromVerifier (httpRequestCtx , holderDID , params , pe . WalletOwnerOrganization )
251
252
252
253
require .NoError (t , err )
253
254
})
@@ -294,25 +295,23 @@ func TestWrapper_handleAuthorizeRequestFromVerifier(t *testing.T) {
294
295
ctx .iamClient .EXPECT ().ClientMetadata (gomock .Any (), "https://example.com/.well-known/authorization-server/iam/verifier" ).Return (& clientMetadata , nil )
295
296
params := defaultParams ()
296
297
params [presentationDefParam ] = "not empty"
297
- putState ( ctx , "state" , session )
298
+ _ = ctx . client . userSessionStore (). Put ( userSessionID , userSession )
298
299
expectPostError (t , ctx , oauth .InvalidRequest , "presentation_definition and presentation_definition_uri are mutually exclusive" , responseURI , "state" )
299
300
300
- _ , err := ctx .client .handleAuthorizeRequestFromVerifier (context . Background () , holderDID , params )
301
+ _ , err := ctx .client .handleAuthorizeRequestFromVerifier (httpRequestCtx , holderDID , params , pe . WalletOwnerOrganization )
301
302
302
303
require .NoError (t , err )
303
304
})
304
305
t .Run ("invalid presentation_definition" , func (t * testing.T ) {
305
306
ctx := newTestClient (t )
306
307
params := defaultParams ()
307
- delete (params , clientMetadataURIParam )
308
308
delete (params , presentationDefUriParam )
309
- metadata , _ := json .Marshal (clientMetadata )
310
- params [clientMetadataParam ] = string (metadata )
311
309
params [presentationDefParam ] = "{invalid"
312
- putState (ctx , "state" , session )
310
+ ctx .iamClient .EXPECT ().ClientMetadata (gomock .Any (), "https://example.com/.well-known/authorization-server/iam/verifier" ).Return (& clientMetadata , nil )git c
311
+ _ = ctx .client .userSessionStore ().Put (userSessionID , userSession )
313
312
expectPostError (t , ctx , oauth .InvalidRequest , "invalid presentation_definition" , responseURI , "state" )
314
313
315
- _ , err := ctx .client .handleAuthorizeRequestFromVerifier (context . Background () , holderDID , params )
314
+ _ , err := ctx .client .handleAuthorizeRequestFromVerifier (httpRequestCtx , holderDID , params , pe . WalletOwnerOrganization )
316
315
317
316
require .NoError (t , err )
318
317
})
0 commit comments