Skip to content

Commit dcdf20a

Browse files
authored
refactor(test): improve IATP tests assertions (#1907)
* refactor(test): improve IATP tests assertions * pr remark
1 parent c07be5b commit dcdf20a

File tree

3 files changed

+14
-14
lines changed

3 files changed

+14
-14
lines changed

edc-tests/e2e-fixtures/src/testFixtures/java/org/eclipse/tractusx/edc/tests/participant/TractusxParticipantBase.java

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -212,12 +212,10 @@ public ValidatableResponse getCatalog(TractusxParticipantBase provider) {
212212
.add(CONTEXT, createObjectBuilder().add(VOCAB, EDC_NAMESPACE))
213213
.add(TYPE, "CatalogRequest")
214214
.add("counterPartyId", provider.id)
215-
.add("counterPartyAddress", provider.federatedCatalog.get().toString())
215+
.add("counterPartyAddress", provider.getProtocolUrl())
216216
.add("protocol", protocol);
217217

218-
219-
return given()
220-
.baseUri(federatedCatalog.get().toString())
218+
return baseManagementRequest()
221219
.header("x-api-key", MANAGEMENT_API_KEY)
222220
.contentType(JSON)
223221
.when()

edc-tests/e2e/iatp-tests/src/test/java/org/eclipse/tractusx/edc/tests/transfer/AbstractIatpConsumerPullTest.java

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,6 @@
6060
import static org.eclipse.tractusx.edc.tests.participant.TractusxParticipantBase.ASYNC_TIMEOUT;
6161
import static org.eclipse.tractusx.edc.tests.transfer.iatp.harness.IatpHelperFunctions.createVcBuilder;
6262
import static org.eclipse.tractusx.edc.tests.transfer.iatp.harness.IatpHelperFunctions.membershipSubject;
63-
import static org.hamcrest.Matchers.not;
6463
import static org.mockserver.integration.ClientAndServer.startClientAndServer;
6564
import static org.mockserver.model.HttpRequest.request;
6665
import static org.mockserver.model.HttpResponse.response;
@@ -153,6 +152,11 @@ void transferData_whenContractPolicyNotFulfilled(JsonObject contractPolicy, Stri
153152
var accessPolicyId = provider().createPolicyDefinition(createAccessPolicy(consumer().getBpn()));
154153
var contractPolicyId = provider().createPolicyDefinition(contractPolicy);
155154
provider().createContractDefinition(assetId, "def-1", accessPolicyId, contractPolicyId);
155+
156+
consumer().getCatalog(provider())
157+
.log().ifValidationFails()
158+
.statusCode(200);
159+
156160
var negotiationId = consumer().initContractNegotiation(provider(), assetId);
157161

158162
await().pollInterval(fibonacci())
@@ -199,16 +203,15 @@ void catalogRequest_whenCredentialExpired() {
199203
.build())
200204
.orElseThrow(f -> new RuntimeException(f.getFailureDetail()));
201205

202-
203-
// verify the failed catalog request
204206
try {
205207
consumer().getCatalog(provider())
206208
.log().ifError()
207-
.statusCode(not(200));
209+
.statusCode(502);
208210
} finally {
209-
// restore the non-expired cred
211+
// restore the original credential
210212
store.update(existingCred);
211213
}
214+
212215
}
213216

214217
@DisplayName("Expect the Catalog request to fail if a credential is revoked")
@@ -268,9 +271,9 @@ void catalogRequest_whenCredentialRevoked() {
268271
// verify the failed catalog request
269272
consumer().getCatalog(provider())
270273
.log().ifValidationFails()
271-
.statusCode(not(200));
274+
.statusCode(502);
272275
} finally {
273-
// restore the original credential without credentialStatus
276+
// restore the original credential
274277
store.update(existingCred);
275278
}
276279
}

edc-tests/e2e/iatp-tests/src/test/java/org/eclipse/tractusx/edc/tests/transfer/CredentialSpoofTest.java

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,6 @@
5252
import static org.eclipse.tractusx.edc.tests.transfer.iatp.harness.IatpHelperFunctions.configureParticipant;
5353
import static org.eclipse.tractusx.edc.tests.transfer.iatp.runtime.Runtimes.iatpRuntime;
5454
import static org.eclipse.tractusx.edc.tests.transfer.iatp.runtime.Runtimes.stsRuntime;
55-
import static org.hamcrest.Matchers.not;
5655
import static org.mockserver.model.HttpRequest.request;
5756
import static org.mockserver.model.HttpResponse.response;
5857

@@ -139,7 +138,7 @@ void shouldNotImpersonateConsumer_withWrappedConsumerCredential() {
139138

140139
MALICIOUS_ACTOR.getCatalog(PROVIDER)
141140
.log().ifError()
142-
.statusCode(not(200));
141+
.statusCode(502);
143142
}
144143

145144
@Test
@@ -167,7 +166,7 @@ void shouldNotImpersonateConsumer_withConsumerPresentation() {
167166

168167
MALICIOUS_ACTOR.getCatalog(PROVIDER)
169168
.log().ifError()
170-
.statusCode(not(200));
169+
.statusCode(502);
171170

172171
}
173172

0 commit comments

Comments
 (0)