@@ -124,7 +124,7 @@ class SsoAccessTokenProviderTest {
124
124
verify(ssoOidcClient).startDeviceAuthorization(any<StartDeviceAuthorizationRequest >())
125
125
verify(ssoOidcClient).createToken(any<CreateTokenRequest >())
126
126
verify(ssoCache).loadAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl })
127
- verify(ssoCache).loadClientRegistration(argThat { region == ssoRegion })
127
+ verify(ssoCache).loadClientRegistration(argThat { region == ssoRegion }, any< String >() )
128
128
verify(ssoCache).saveAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl }, eq(accessToken))
129
129
}
130
130
@@ -170,7 +170,7 @@ class SsoAccessTokenProviderTest {
170
170
verify(ssoOidcClient).startDeviceAuthorization(any<StartDeviceAuthorizationRequest >())
171
171
verify(ssoOidcClient).createToken(any<CreateTokenRequest >())
172
172
verify(ssoCache).loadAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl })
173
- verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion })
173
+ verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion }, any< String >() )
174
174
verify(ssoCache).saveClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion }, any())
175
175
verify(ssoCache).saveAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl }, eq(accessToken))
176
176
}
@@ -267,7 +267,7 @@ class SsoAccessTokenProviderTest {
267
267
verify(ssoOidcClient).startDeviceAuthorization(any<StartDeviceAuthorizationRequest >())
268
268
verify(ssoOidcClient, times(2 )).createToken(any<CreateTokenRequest >())
269
269
verify(ssoCache).loadAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl })
270
- verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion })
270
+ verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion }, any< String >() )
271
271
verify(ssoCache).saveAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl }, eq(accessToken))
272
272
}
273
273
@@ -296,7 +296,7 @@ class SsoAccessTokenProviderTest {
296
296
val refreshedToken = runBlocking { sut.refreshToken(sut.accessToken()) }
297
297
298
298
verify(ssoCache).loadAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl })
299
- verify(ssoCache).loadClientRegistration(argThat { region == ssoRegion })
299
+ verify(ssoCache).loadClientRegistration(argThat { region == ssoRegion }, any< String >() )
300
300
verify(ssoOidcClient).createToken(any<CreateTokenRequest >())
301
301
verify(ssoCache).saveAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl }, eq(refreshedToken))
302
302
}
@@ -342,7 +342,7 @@ class SsoAccessTokenProviderTest {
342
342
)
343
343
344
344
on(
345
- ssoCache.loadClientRegistration(any<PKCEClientRegistrationCacheKey >())
345
+ ssoCache.loadClientRegistration(any<PKCEClientRegistrationCacheKey >(), any< String >() )
346
346
).thenReturn(
347
347
PKCEClientRegistration (
348
348
clientType = " public" ,
@@ -369,7 +369,7 @@ class SsoAccessTokenProviderTest {
369
369
val refreshedToken = runBlocking { sut.refreshToken(sut.accessToken()) }
370
370
371
371
verify(ssoCache).loadAccessToken(any<PKCEAccessTokenCacheKey >())
372
- verify(ssoCache).loadClientRegistration(any<PKCEClientRegistrationCacheKey >())
372
+ verify(ssoCache).loadClientRegistration(any<PKCEClientRegistrationCacheKey >(), any< String >() )
373
373
verify(ssoOidcClient).createToken(any<CreateTokenRequest >())
374
374
verify(ssoCache).saveAccessToken(any<PKCEAccessTokenCacheKey >(), eq(refreshedToken))
375
375
}
@@ -390,7 +390,7 @@ class SsoAccessTokenProviderTest {
390
390
verify(ssoOidcClient).startDeviceAuthorization(any<StartDeviceAuthorizationRequest >())
391
391
verify(ssoOidcClient).createToken(any<CreateTokenRequest >())
392
392
verify(ssoCache).loadAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl })
393
- verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion })
393
+ verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion }, any< String >() )
394
394
}
395
395
396
396
@Test
@@ -432,7 +432,7 @@ class SsoAccessTokenProviderTest {
432
432
verify(ssoOidcClient).startDeviceAuthorization(any<StartDeviceAuthorizationRequest >())
433
433
verify(ssoOidcClient, times(2 )).createToken(any<CreateTokenRequest >())
434
434
verify(ssoCache).loadAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl })
435
- verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion })
435
+ verify(ssoCache).loadClientRegistration(argThat<DeviceAuthorizationClientRegistrationCacheKey > { region == ssoRegion }, any< String >() )
436
436
verify(ssoCache).saveAccessToken(argThat<DeviceGrantAccessTokenCacheKey > { startUrl == ssoUrl }, eq(accessToken))
437
437
}
438
438
@@ -452,7 +452,7 @@ class SsoAccessTokenProviderTest {
452
452
453
453
verify(ssoOidcClient).registerClient(any<RegisterClientRequest >())
454
454
verify(ssoCache).loadAccessToken(any())
455
- verify(ssoCache).loadClientRegistration(argThat { region == ssoRegion })
455
+ verify(ssoCache).loadClientRegistration(argThat { region == ssoRegion }, any< String >() )
456
456
}
457
457
458
458
@Test
@@ -492,7 +492,7 @@ class SsoAccessTokenProviderTest {
492
492
)
493
493
494
494
on(
495
- ssoCache.loadClientRegistration(argThat { region == ssoRegion })
495
+ ssoCache.loadClientRegistration(argThat { region == ssoRegion }, any< String >() )
496
496
).thenReturn(
497
497
returnValue
498
498
)
0 commit comments