|
| 1 | +package org.openapitools.client.api; |
| 2 | + |
| 3 | +import org.openapitools.client.ApiResponse; |
| 4 | +import org.openapitools.client.ApiException; |
| 5 | +import org.openapitools.client.ApiClient; |
| 6 | +import org.openapitools.client.auth.HttpBasicAuth; |
| 7 | +import org.openapitools.client.model.CodeRequest; |
| 8 | +import org.openapitools.client.model.MessagingCodeResponse; |
| 9 | +import org.openapitools.client.Configuration; |
| 10 | +import org.junit.jupiter.api.Assertions; |
| 11 | +import org.junit.jupiter.api.Test; |
| 12 | + |
| 13 | +import java.net.URI; |
| 14 | + |
| 15 | +import javax.security.auth.AuthPermission; |
| 16 | + |
| 17 | +import static org.hamcrest.MatcherAssert.assertThat; |
| 18 | +import static org.hamcrest.CoreMatchers.instanceOf; |
| 19 | +import static org.hamcrest.Matchers.greaterThan; |
| 20 | +import static org.hamcrest.Matchers.is; |
| 21 | +import static org.hamcrest.Matchers.matchesRegex; |
| 22 | +import static org.hamcrest.Matchers.contains; |
| 23 | + |
| 24 | +import static org.openapitools.client.utils.TestingEnvironmentVariables.*; |
| 25 | + |
| 26 | +public class MfaApiTest { |
| 27 | + ApiClient defaultClient = Configuration.getDefaultApiClient(); |
| 28 | + HttpBasicAuth Basic = (HttpBasicAuth) defaultClient.getAuthentication("Basic"); |
| 29 | + private final MfaApi api = new MfaApi(defaultClient); |
| 30 | + |
| 31 | + @Test |
| 32 | + public void successfulMfaGenerateMessagingCodeRequest() throws ApiException { |
| 33 | + Basic.setUsername(BW_USERNAME); |
| 34 | + Basic.setPassword(BW_PASSWORD); |
| 35 | + |
| 36 | + CodeRequest request = new CodeRequest(); |
| 37 | + request.setTo(USER_NUMBER); |
| 38 | + request.setFrom(BW_NUMBER); |
| 39 | + request.setApplicationId(BW_MESSAGING_APPLICATION_ID); |
| 40 | + request.setScope("scope"); |
| 41 | + request.setMessage("Your temporary {NAME} {SCOPE} code is {CODE}"); |
| 42 | + request.setDigits(6); |
| 43 | + ApiResponse<MessagingCodeResponse> response = api.generateMessagingCodeWithHttpInfo(BW_ACCOUNT_ID, request); |
| 44 | + assertThat(response.getStatusCode(), is(200)); |
| 45 | + |
| 46 | + assertThat(response.getData(), instanceOf(MessagingCodeResponse.class)); |
| 47 | + } |
| 48 | + |
| 49 | + @Test |
| 50 | + public void successfulMfaGenerateVoiceCodeRequest() { |
| 51 | + Basic.setUsername(BW_USERNAME); |
| 52 | + Basic.setPassword(BW_PASSWORD); |
| 53 | + } |
| 54 | + |
| 55 | + @Test |
| 56 | + public void successfulMfaVerifyCodeRequest() { |
| 57 | + Basic.setUsername(BW_USERNAME); |
| 58 | + Basic.setPassword(BW_PASSWORD); |
| 59 | + } |
| 60 | + |
| 61 | + @Test |
| 62 | + public void badRequest() { |
| 63 | + Basic.setUsername(BW_USERNAME); |
| 64 | + Basic.setPassword(BW_PASSWORD); |
| 65 | + } |
| 66 | + |
| 67 | + @Test |
| 68 | + public void unauthorizedRequest() { |
| 69 | + Basic.setUsername("bad_username"); |
| 70 | + Basic.setPassword("bad_password"); |
| 71 | + } |
| 72 | + |
| 73 | + @Test |
| 74 | + public void forbiddenRequest() { |
| 75 | + Basic.setUsername(FORBIDDEN_USERNAME); |
| 76 | + Basic.setPassword(FORBIDDEN_PASSWORD); |
| 77 | + } |
| 78 | + |
| 79 | +} |
0 commit comments