Implemented signed OpenID token with default algorithm RSA256.
Change-Id: I5bd5bed5c556e550244e06299bc7e54f53226401
diff --git a/full/src/test/java/de/ids_mannheim/korap/web/controller/UserControllerTest.java b/full/src/test/java/de/ids_mannheim/korap/web/controller/UserControllerTest.java
index 68f1b55..f791244 100644
--- a/full/src/test/java/de/ids_mannheim/korap/web/controller/UserControllerTest.java
+++ b/full/src/test/java/de/ids_mannheim/korap/web/controller/UserControllerTest.java
@@ -29,6 +29,7 @@
import de.ids_mannheim.korap.authentication.http.HttpAuthorizationHandler;
import de.ids_mannheim.korap.config.Attributes;
import de.ids_mannheim.korap.config.BeansFactory;
+import de.ids_mannheim.korap.config.FullConfiguration;
import de.ids_mannheim.korap.config.JWTSigner;
import de.ids_mannheim.korap.config.TestHelper;
import de.ids_mannheim.korap.exceptions.KustvaktException;
@@ -49,7 +50,8 @@
@Autowired
HttpAuthorizationHandler handler;
-
+ @Autowired
+ FullConfiguration config;
private static String[] credentials;
@Override
@@ -201,8 +203,8 @@
String token = node.path("token").asText();
JWTSigner sign = new JWTSigner(BeansFactory.getKustvaktContext().getConfiguration().getSharedSecret(),
- BeansFactory.getKustvaktContext().getConfiguration().getIssuer(), -1);
-
+ config.getIssuer(), -1);
+ //BeansFactory.getKustvaktContext().getConfiguration().getIssuer(), -1);
SignedJWT jwt = sign.verifyToken(token);
while (true) {