Skip to content

Commit 9d58e27

Browse files
committed
fix merge issues
1 parent 37d7e18 commit 9d58e27

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

auth/api/iam/openid4vp_test.go

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -233,10 +233,10 @@ func TestWrapper_handleAuthorizeRequestFromVerifier(t *testing.T) {
233233
ctx := newTestClient(t)
234234
params := defaultParams()
235235
params[clientMetadataParam] = "not empty"
236-
putState(ctx, "state", session)
236+
_ = ctx.client.userSessionStore().Put(userSessionID, userSession)
237237
expectPostError(t, ctx, oauth.InvalidRequest, "client_metadata and client_metadata_uri are mutually exclusive", responseURI, "state")
238238

239-
_, err := ctx.client.handleAuthorizeRequestFromVerifier(context.Background(), holderDID, params)
239+
_, err := ctx.client.handleAuthorizeRequestFromVerifier(httpRequestCtx, holderDID, params, pe.WalletOwnerOrganization)
240240

241241
require.NoError(t, err)
242242
})
@@ -245,9 +245,10 @@ func TestWrapper_handleAuthorizeRequestFromVerifier(t *testing.T) {
245245
params := defaultParams()
246246
delete(params, clientMetadataURIParam)
247247
params[clientMetadataParam] = "{invalid"
248+
_ = ctx.client.userSessionStore().Put(userSessionID, userSession)
248249
expectPostError(t, ctx, oauth.InvalidRequest, "invalid client_metadata", responseURI, "state")
249250

250-
_, err := ctx.client.handleAuthorizeRequestFromVerifier(context.Background(), holderDID, params)
251+
_, err := ctx.client.handleAuthorizeRequestFromVerifier(httpRequestCtx, holderDID, params, pe.WalletOwnerOrganization)
251252

252253
require.NoError(t, err)
253254
})
@@ -294,25 +295,23 @@ func TestWrapper_handleAuthorizeRequestFromVerifier(t *testing.T) {
294295
ctx.iamClient.EXPECT().ClientMetadata(gomock.Any(), "https://example.com/.well-known/authorization-server/iam/verifier").Return(&clientMetadata, nil)
295296
params := defaultParams()
296297
params[presentationDefParam] = "not empty"
297-
putState(ctx, "state", session)
298+
_ = ctx.client.userSessionStore().Put(userSessionID, userSession)
298299
expectPostError(t, ctx, oauth.InvalidRequest, "presentation_definition and presentation_definition_uri are mutually exclusive", responseURI, "state")
299300

300-
_, err := ctx.client.handleAuthorizeRequestFromVerifier(context.Background(), holderDID, params)
301+
_, err := ctx.client.handleAuthorizeRequestFromVerifier(httpRequestCtx, holderDID, params, pe.WalletOwnerOrganization)
301302

302303
require.NoError(t, err)
303304
})
304305
t.Run("invalid presentation_definition", func(t *testing.T) {
305306
ctx := newTestClient(t)
306307
params := defaultParams()
307-
delete(params, clientMetadataURIParam)
308308
delete(params, presentationDefUriParam)
309-
metadata, _ := json.Marshal(clientMetadata)
310-
params[clientMetadataParam] = string(metadata)
311309
params[presentationDefParam] = "{invalid"
312-
putState(ctx, "state", session)
310+
ctx.iamClient.EXPECT().ClientMetadata(gomock.Any(), "https://example.com/.well-known/authorization-server/iam/verifier").Return(&clientMetadata, nil)git c
311+
_ = ctx.client.userSessionStore().Put(userSessionID, userSession)
313312
expectPostError(t, ctx, oauth.InvalidRequest, "invalid presentation_definition", responseURI, "state")
314313

315-
_, err := ctx.client.handleAuthorizeRequestFromVerifier(context.Background(), holderDID, params)
314+
_, err := ctx.client.handleAuthorizeRequestFromVerifier(httpRequestCtx, holderDID, params, pe.WalletOwnerOrganization)
316315

317316
require.NoError(t, err)
318317
})

0 commit comments

Comments
 (0)