@@ -50,7 +50,7 @@ public abstract class BaseMessageTest<T extends AbstractMessage> {
5050 private static final String PRIVATE_KEY_FILE = "src/test/resources/rsa-private.pem" ;
5151 private static final String PUBLIC_KEY_FILE = "src/test/resources/rsa-public.pem" ;
5252 //TODO: return keyOwner to https://issuer.example.com once edmund explains how parameter is used in getJWTVerifyKeys
53- protected String keyOwner = "" ; //" https://issuer.example.com";
53+ protected String keyOwner = "https://issuer.example.com" ;
5454 protected KeyJar keyJarOfPrivateKeys = null ;
5555 protected KeyJar keyJarOfPublicKeys = null ;
5656 protected String signedJwt = null ;
@@ -148,7 +148,7 @@ protected String getSignedJwt(String alg)
148148 default :
149149 break ;
150150 }
151- return JWT .create ().withIssuer ("op" ).sign (algorithm );
151+ return JWT .create ().withIssuer (keyOwner ).sign (algorithm );
152152 }
153153
154154 /**
@@ -209,7 +209,7 @@ protected KeyJar getKeyJarPub()
209209 */
210210 protected String generateIdTokenNow (Map <String , Object > claims , Key key , String algo )
211211 throws InvalidClaimException {
212- claims .put ("iss" , "issuer" );
212+ claims .put ("iss" , keyOwner );
213213 claims .put ("sub" , "subject" );
214214 claims .put ("aud" , "clientid" );
215215 claims .put ("exp" , (System .currentTimeMillis () / 1000 ) + 5 );
0 commit comments