@@ -52,7 +52,7 @@ func TestLoadVerificationConfig_MockProvider_WithOptionalFields(t *testing.T) {
5252
5353func TestLoadVerificationConfig_NonMockProvider_RequiresWebhookSecret (t * testing.T ) {
5454 clearVerificationEnv (t )
55- t .Setenv ("VERIFICATION_PROVIDER" , "jumio " )
55+ t .Setenv ("VERIFICATION_PROVIDER" , "onfido " )
5656 t .Setenv ("VERIFICATION_WEBHOOK_URL" , "https://example.com/webhook" )
5757 t .Setenv ("VERIFICATION_API_KEY" , "api-key" )
5858 t .Setenv ("VERIFICATION_API_SECRET" , "api-secret" )
@@ -66,7 +66,7 @@ func TestLoadVerificationConfig_NonMockProvider_RequiresWebhookSecret(t *testing
6666
6767func TestLoadVerificationConfig_NonMockProvider_RequiresWebhookURL (t * testing.T ) {
6868 clearVerificationEnv (t )
69- t .Setenv ("VERIFICATION_PROVIDER" , "jumio " )
69+ t .Setenv ("VERIFICATION_PROVIDER" , "onfido " )
7070 t .Setenv ("VERIFICATION_WEBHOOK_SECRET" , "secret" )
7171 // Missing VERIFICATION_WEBHOOK_URL
7272 t .Setenv ("VERIFICATION_API_KEY" , "api-key" )
@@ -108,22 +108,22 @@ func TestLoadVerificationConfig_NonMockProvider_RequiresAPISecret(t *testing.T)
108108
109109func TestLoadVerificationConfig_NonMockProvider_ValidFullConfig (t * testing.T ) {
110110 clearVerificationEnv (t )
111- t .Setenv ("VERIFICATION_PROVIDER" , "jumio " )
111+ t .Setenv ("VERIFICATION_PROVIDER" , "onfido " )
112112 t .Setenv ("VERIFICATION_WEBHOOK_SECRET" , "webhook-secret" )
113113 t .Setenv ("VERIFICATION_WEBHOOK_URL" , "https://api.example.com/webhooks/verification" )
114114 t .Setenv ("VERIFICATION_API_KEY" , "my-api-key" )
115115 t .Setenv ("VERIFICATION_API_SECRET" , "my-api-secret" )
116- t .Setenv ("VERIFICATION_BASE_URL" , "https://custom.jumio .com/api" )
116+ t .Setenv ("VERIFICATION_BASE_URL" , "https://custom.onfido .com/api" )
117117
118118 cfg , err := LoadVerificationConfig ()
119119
120120 require .NoError (t , err )
121- assert .Equal (t , "jumio " , cfg .Provider )
121+ assert .Equal (t , "onfido " , cfg .Provider )
122122 assert .Equal (t , "webhook-secret" , cfg .WebhookSecret )
123123 assert .Equal (t , "https://api.example.com/webhooks/verification" , cfg .WebhookURL )
124124 assert .Equal (t , "my-api-key" , cfg .ProviderConfig ["api_key" ])
125125 assert .Equal (t , "my-api-secret" , cfg .ProviderConfig ["api_secret" ])
126- assert .Equal (t , "https://custom.jumio .com/api" , cfg .ProviderConfig ["base_url" ])
126+ assert .Equal (t , "https://custom.onfido .com/api" , cfg .ProviderConfig ["base_url" ])
127127}
128128
129129func TestLoadVerificationConfig_MissingProvider (t * testing.T ) {
@@ -206,9 +206,6 @@ func TestVerificationConfig_Validate_ProviderCaseInsensitive(t *testing.T) {
206206 {"mock" },
207207 {"MOCK" },
208208 {"Mock" },
209- {"jumio" },
210- {"JUMIO" },
211- {"Jumio" },
212209 {"onfido" },
213210 {"ONFIDO" },
214211 {"Onfido" },
@@ -244,8 +241,8 @@ func TestVerificationConfig_IsMock(t *testing.T) {
244241 {"mock" , true },
245242 {"MOCK" , true },
246243 {"Mock" , true },
247- {"jumio" , false },
248244 {"onfido" , false },
245+ {"stripe" , false },
249246 {"" , false },
250247 }
251248
@@ -260,10 +257,9 @@ func TestVerificationConfig_IsMock(t *testing.T) {
260257func TestVerificationConfig_SupportedProviders (t * testing.T ) {
261258 // Verify the SupportedProviders list contains expected values
262259 assert .Contains (t , SupportedProviders , "mock" )
263- assert .Contains (t , SupportedProviders , "jumio" )
264260 assert .Contains (t , SupportedProviders , "onfido" )
265261 assert .Contains (t , SupportedProviders , "stripe" )
266- assert .Len (t , SupportedProviders , 4 )
262+ assert .Len (t , SupportedProviders , 3 )
267263}
268264
269265func TestLoadVerificationConfig_StripeProvider_OnlyNeedsAPIKey (t * testing.T ) {
@@ -353,7 +349,7 @@ func TestVerificationConfig_ValidateForEnvironment_ProductionRejectsMock(t *test
353349
354350func TestVerificationConfig_ValidateForEnvironment_ProductionRejectsHTTPWebhook (t * testing.T ) {
355351 cfg := & VerificationConfig {
356- Provider : "jumio " ,
352+ Provider : "onfido " ,
357353 WebhookSecret : "a]strongsecretthatis32charslong!!" , // 32+ chars
358354 WebhookURL : "http://api.example.com/webhooks" , // HTTP, not HTTPS
359355 ProviderConfig : map [string ]string {"api_key" : "key" , "api_secret" : "secret" },
@@ -367,7 +363,7 @@ func TestVerificationConfig_ValidateForEnvironment_ProductionRejectsHTTPWebhook(
367363
368364func TestVerificationConfig_ValidateForEnvironment_ProductionRejectsWeakSecret (t * testing.T ) {
369365 cfg := & VerificationConfig {
370- Provider : "jumio " ,
366+ Provider : "onfido " ,
371367 WebhookSecret : "short-secret" , // < 32 chars
372368 WebhookURL : "https://api.example.com/webhooks" ,
373369 ProviderConfig : map [string ]string {"api_key" : "key" , "api_secret" : "secret" },
@@ -391,7 +387,7 @@ func TestVerificationConfig_ValidateForEnvironment_DevelopmentAllowsMock(t *test
391387
392388func TestVerificationConfig_ValidateForEnvironment_ProductionAcceptsValidConfig (t * testing.T ) {
393389 cfg := & VerificationConfig {
394- Provider : "jumio " ,
390+ Provider : "onfido " ,
395391 WebhookSecret : "a-very-strong-secret-that-is-at-least-32-characters-long" ,
396392 WebhookURL : "https://api.example.com/webhooks/verification" ,
397393 ProviderConfig : map [string ]string {"api_key" : "key" , "api_secret" : "secret" },
0 commit comments