Skip to content

Commit 7130b1c

Browse files
eclipse0922bburda
authored andcommitted
test(gateway): address auth handlers review feedback
1 parent 353a2a8 commit 7130b1c

1 file changed

Lines changed: 6 additions & 9 deletions

File tree

src/ros2_medkit_gateway/test/test_auth_handlers.cpp

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ TEST_F(AuthHandlersDisabledTest, AuthorizeErrorBodyContainsErrorCode) {
7676
EXPECT_EQ(body["error_code"], ros2_medkit_gateway::ERR_RESOURCE_NOT_FOUND);
7777
}
7878

79-
// @verifies REQ_INTEROP_086
79+
// @verifies REQ_INTEROP_087
8080
TEST_F(AuthHandlersDisabledTest, TokenReturns404WhenAuthDisabled) {
8181
httplib::Request req;
8282
httplib::Response res;
@@ -208,7 +208,7 @@ class AuthHandlersTokenTest : public ::testing::Test {
208208
}
209209
};
210210

211-
// @verifies REQ_INTEROP_086
211+
// @verifies REQ_INTEROP_087
212212
TEST_F(AuthHandlersTokenTest, ReturnsBadRequestForWrongGrantType) {
213213
HandlerContext ctx(nullptr, cors_, auth_, tls_, nullptr);
214214
AuthHandlers handlers(ctx);
@@ -222,7 +222,7 @@ TEST_F(AuthHandlersTokenTest, ReturnsBadRequestForWrongGrantType) {
222222
EXPECT_EQ(body["error"], "unsupported_grant_type");
223223
}
224224

225-
// @verifies REQ_INTEROP_086
225+
// @verifies REQ_INTEROP_087
226226
TEST_F(AuthHandlersTokenTest, ReturnsBadRequestForMissingRefreshToken) {
227227
HandlerContext ctx(nullptr, cors_, auth_, tls_, nullptr);
228228
AuthHandlers handlers(ctx);
@@ -236,7 +236,7 @@ TEST_F(AuthHandlersTokenTest, ReturnsBadRequestForMissingRefreshToken) {
236236
EXPECT_EQ(body["error"], "invalid_request");
237237
}
238238

239-
// @verifies REQ_INTEROP_086
239+
// @verifies REQ_INTEROP_087
240240
TEST_F(AuthHandlersTokenTest, ReturnsBadRequestForEmptyRefreshToken) {
241241
HandlerContext ctx(nullptr, cors_, auth_, tls_, nullptr);
242242
AuthHandlers handlers(ctx);
@@ -341,7 +341,6 @@ class AuthHandlersWithManagerTest : public ::testing::Test {
341341
R"({"grant_type": "client_credentials", "client_id": "test_client", "client_secret": "test_secret"})");
342342
httplib::Response res;
343343
handlers_->handle_auth_authorize(req, res);
344-
EXPECT_EQ(res.status, -1);
345344
return json::parse(res.body);
346345
}
347346
};
@@ -370,7 +369,7 @@ TEST_F(AuthHandlersWithManagerTest, AuthorizeReturnsUnauthorizedForInvalidCreden
370369
EXPECT_EQ(body["error"], "invalid_client");
371370
}
372371

373-
// @verifies REQ_INTEROP_086
372+
// @verifies REQ_INTEROP_087
374373
TEST_F(AuthHandlersWithManagerTest, TokenReturnsNewAccessTokenForValidRefreshToken) {
375374
auto auth_body = authorize_and_get_body();
376375
std::string refresh_token = auth_body["refresh_token"].get<std::string>();
@@ -379,7 +378,6 @@ TEST_F(AuthHandlersWithManagerTest, TokenReturnsNewAccessTokenForValidRefreshTok
379378
httplib::Response res;
380379
handlers_->handle_auth_token(req, res);
381380

382-
EXPECT_EQ(res.status, -1);
383381
auto body = json::parse(res.body);
384382
EXPECT_TRUE(body.contains("access_token"));
385383
EXPECT_TRUE(body["access_token"].is_string());
@@ -388,7 +386,7 @@ TEST_F(AuthHandlersWithManagerTest, TokenReturnsNewAccessTokenForValidRefreshTok
388386
EXPECT_EQ(body["refresh_token"], refresh_token);
389387
}
390388

391-
// @verifies REQ_INTEROP_086
389+
// @verifies REQ_INTEROP_087
392390
TEST_F(AuthHandlersWithManagerTest, TokenReturnsUnauthorizedForInvalidRefreshToken) {
393391
auto req = make_json_request(R"({"grant_type": "refresh_token", "refresh_token": "not.a.valid.refresh.token"})");
394392
httplib::Response res;
@@ -408,7 +406,6 @@ TEST_F(AuthHandlersWithManagerTest, RevokeRevokesRefreshTokenForSubsequentTokenR
408406
httplib::Response revoke_res;
409407
handlers_->handle_auth_revoke(revoke_req, revoke_res);
410408

411-
EXPECT_EQ(revoke_res.status, -1);
412409
auto revoke_body = json::parse(revoke_res.body);
413410
EXPECT_EQ(revoke_body["status"], "revoked");
414411

0 commit comments

Comments
 (0)