Skip to content

Commit 1a76793

Browse files
committed
tst
1 parent d0000ac commit 1a76793

File tree

2 files changed

+15
-7
lines changed

2 files changed

+15
-7
lines changed

plugins/amazonq/shared/jetbrains-community/src/software/aws/toolkits/jetbrains/services/amazonq/lsp/auth/DefaultAuthCredentialsService.kt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ import software.aws.toolkits.jetbrains.services.amazonq.lsp.model.aws.credential
2626
import software.aws.toolkits.jetbrains.services.amazonq.lsp.model.aws.credentials.UpdateCredentialsPayload
2727
import software.aws.toolkits.jetbrains.services.amazonq.lsp.model.aws.credentials.UpdateCredentialsPayloadData
2828
import software.aws.toolkits.jetbrains.services.amazonq.profile.QRegionProfile
29+
import software.aws.toolkits.jetbrains.services.amazonq.profile.QRegionProfileManager
2930
import software.aws.toolkits.jetbrains.services.amazonq.profile.QRegionProfileSelectedListener
3031
import software.aws.toolkits.jetbrains.utils.isQConnected
3132
import software.aws.toolkits.jetbrains.utils.isQExpired
@@ -184,7 +185,7 @@ class DefaultAuthCredentialsService(
184185
val payload = UpdateConfigurationParams(
185186
section = "aws.q",
186187
settings = mapOf(
187-
"profileArn" to "invalidinvalidinvalid"
188+
"profileArn" to QRegionProfileManager.getInstance().activeProfile(project)?.arn
188189
)
189190
)
190191
return AmazonQLspService.executeIfRunning(project) { server ->

plugins/amazonq/shared/jetbrains-community/tst/software/aws/toolkits/jetbrains/services/amazonq/lsp/auth/DefaultAuthCredentialsServiceTest.kt

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ import software.aws.toolkits.jetbrains.core.credentials.sso.bearer.InteractiveBe
3030
import software.aws.toolkits.jetbrains.services.amazonq.lsp.AmazonQLanguageServer
3131
import software.aws.toolkits.jetbrains.services.amazonq.lsp.AmazonQLspService
3232
import software.aws.toolkits.jetbrains.services.amazonq.lsp.encryption.JwtEncryptionManager
33+
import software.aws.toolkits.jetbrains.services.amazonq.lsp.model.aws.credentials.ConnectionMetadata
34+
import software.aws.toolkits.jetbrains.services.amazonq.lsp.model.aws.credentials.SsoProfileData
3335
import software.aws.toolkits.jetbrains.services.amazonq.lsp.model.aws.credentials.UpdateCredentialsPayload
3436
import software.aws.toolkits.jetbrains.utils.isQConnected
3537
import software.aws.toolkits.jetbrains.utils.isQExpired
@@ -112,6 +114,7 @@ class DefaultAuthCredentialsServiceTest {
112114
connectionId: String = "test-connection-id",
113115
): AwsBearerTokenConnection = mockk {
114116
every { id } returns connectionId
117+
every { startUrl } returns "startUrl"
115118
every { getConnectionSettings() } returns createMockTokenSettings(accessToken)
116119
}
117120

@@ -192,17 +195,18 @@ class DefaultAuthCredentialsServiceTest {
192195

193196
@Test
194197
fun `test updateTokenCredentials unencrypted success`() {
195-
sut = DefaultAuthCredentialsService(project, mockEncryptionManager, mockk())
196-
197-
val token = "unencryptedToken"
198198
val isEncrypted = false
199+
sut = DefaultAuthCredentialsService(project, mockEncryptionManager, mockk())
199200

200-
sut.updateTokenCredentials(token, isEncrypted)
201+
sut.updateTokenCredentials(mockConnection, isEncrypted)
201202

202203
verify(exactly = 1) {
203204
mockLanguageServer.updateTokenCredentials(
204205
UpdateCredentialsPayload(
205-
token,
206+
"test-access-token",
207+
ConnectionMetadata(
208+
SsoProfileData("startUrl")
209+
),
206210
isEncrypted
207211
)
208212
)
@@ -219,12 +223,15 @@ class DefaultAuthCredentialsServiceTest {
219223

220224
every { mockEncryptionManager.encrypt(any()) } returns encryptedToken
221225

222-
sut.updateTokenCredentials(decryptedToken, isEncrypted)
226+
sut.updateTokenCredentials(mockConnection, isEncrypted)
223227

224228
verify(atLeast = 1) {
225229
mockLanguageServer.updateTokenCredentials(
226230
UpdateCredentialsPayload(
227231
encryptedToken,
232+
ConnectionMetadata(
233+
SsoProfileData("startUrl")
234+
),
228235
isEncrypted
229236
)
230237
)

0 commit comments

Comments
 (0)