Skip to content

Commit 2d72cd2

Browse files
committed
docs, test(gateway): add REQ_INTEROP_095 for POST /revoke endpoint
1 parent a500dd1 commit 2d72cd2

2 files changed

Lines changed: 12 additions & 5 deletions

File tree

docs/requirements/specs/auth.rst

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,13 @@ Auth
88

99
The endpoint shall perform an authorization flow and issue authorization information based on client credentials.
1010

11+
.. req:: POST /revoke
12+
:id: REQ_INTEROP_095
13+
:status: verified
14+
:tags: Auth
15+
16+
The endpoint shall revoke a refresh token.
17+
1118
.. req:: POST /token
1219
:id: REQ_INTEROP_087
1320
:status: verified

src/ros2_medkit_gateway/test/test_auth_handlers.cpp

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ TEST_F(AuthHandlersDisabledTest, TokenReturns404WhenAuthDisabled) {
8484
EXPECT_EQ(res.status, 404);
8585
}
8686

87-
// @verifies REQ_INTEROP_086
87+
// @verifies REQ_INTEROP_095
8888
TEST_F(AuthHandlersDisabledTest, RevokeReturns404WhenAuthDisabled) {
8989
httplib::Request req;
9090
httplib::Response res;
@@ -265,7 +265,7 @@ class AuthHandlersRevokeTest : public ::testing::Test {
265265
}
266266
};
267267

268-
// @verifies REQ_INTEROP_086
268+
// @verifies REQ_INTEROP_095
269269
TEST_F(AuthHandlersRevokeTest, ReturnsBadRequestForInvalidJson) {
270270
HandlerContext ctx(nullptr, cors_, auth_, tls_, nullptr);
271271
AuthHandlers handlers(ctx);
@@ -280,7 +280,7 @@ TEST_F(AuthHandlersRevokeTest, ReturnsBadRequestForInvalidJson) {
280280
EXPECT_EQ(body["error"], "invalid_request");
281281
}
282282

283-
// @verifies REQ_INTEROP_086
283+
// @verifies REQ_INTEROP_095
284284
TEST_F(AuthHandlersRevokeTest, ReturnsBadRequestForMissingTokenField) {
285285
HandlerContext ctx(nullptr, cors_, auth_, tls_, nullptr);
286286
AuthHandlers handlers(ctx);
@@ -294,7 +294,7 @@ TEST_F(AuthHandlersRevokeTest, ReturnsBadRequestForMissingTokenField) {
294294
EXPECT_EQ(body["error"], "invalid_request");
295295
}
296296

297-
// @verifies REQ_INTEROP_086
297+
// @verifies REQ_INTEROP_095
298298
TEST_F(AuthHandlersRevokeTest, ReturnsBadRequestForNonStringToken) {
299299
HandlerContext ctx(nullptr, cors_, auth_, tls_, nullptr);
300300
AuthHandlers handlers(ctx);
@@ -397,7 +397,7 @@ TEST_F(AuthHandlersWithManagerTest, TokenReturnsUnauthorizedForInvalidRefreshTok
397397
EXPECT_EQ(body["error"], "invalid_grant");
398398
}
399399

400-
// @verifies REQ_INTEROP_086
400+
// @verifies REQ_INTEROP_095
401401
TEST_F(AuthHandlersWithManagerTest, RevokeRevokesRefreshTokenForSubsequentTokenRequest) {
402402
auto auth_body = authorize_and_get_body();
403403
std::string refresh_token = auth_body["refresh_token"].get<std::string>();

0 commit comments

Comments
 (0)