@itentialopensource/adapter-aws_cognito_identity_provider 0.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintignore +5 -0
- package/.eslintrc.js +18 -0
- package/.jshintrc +3 -0
- package/AUTH.md +108 -0
- package/BROKER.md +211 -0
- package/CALLS.md +813 -0
- package/CHANGELOG.md +9 -0
- package/CODE_OF_CONDUCT.md +43 -0
- package/CONTRIBUTING.md +13 -0
- package/ENHANCE.md +69 -0
- package/LICENSE +201 -0
- package/PROPERTIES.md +646 -0
- package/README.md +343 -0
- package/SUMMARY.md +9 -0
- package/SYSTEMINFO.md +16 -0
- package/TAB1.md +8 -0
- package/TAB2.md +392 -0
- package/TROUBLESHOOT.md +47 -0
- package/adapter.js +14144 -0
- package/adapterBase.js +1452 -0
- package/entities/.generic/action.json +214 -0
- package/entities/.generic/schema.json +28 -0
- package/entities/.system/action.json +50 -0
- package/entities/.system/mockdatafiles/getToken-default.json +3 -0
- package/entities/.system/mockdatafiles/healthcheck-default.json +3 -0
- package/entities/.system/schema.json +19 -0
- package/entities/.system/schemaTokenReq.json +53 -0
- package/entities/.system/schemaTokenResp.json +53 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAddCustomAttributes/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAddCustomAttributes/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminAddUserToGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminAddUserToGroup/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminConfirmSignUp/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminConfirmSignUp/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminCreateUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminCreateUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAttributes/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAttributes/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDisableProviderForUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDisableProviderForUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDisableUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminDisableUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminEnableUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminEnableUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminForgetDevice/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminForgetDevice/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminGetDevice/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminGetDevice/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminGetUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminGetUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminInitiateAuth/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminInitiateAuth/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminLinkProviderForUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminLinkProviderForUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminListDevices/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminListDevices/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminListGroupsForUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminListGroupsForUser/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminListUserAuthEvents/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminListUserAuthEvents/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminRemoveUserFromGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminRemoveUserFromGroup/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminResetUserPassword/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminResetUserPassword/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminRespondToAuthChallenge/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminRespondToAuthChallenge/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserMFAPreference/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserMFAPreference/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserPassword/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserPassword/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserSettings/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserSettings/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateAuthEventFeedback/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateAuthEventFeedback/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateDeviceStatus/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateDeviceStatus/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateUserAttributes/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateUserAttributes/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUserGlobalSignOut/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAdminUserGlobalSignOut/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAssociateSoftwareToken/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceAssociateSoftwareToken/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceChangePassword/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceChangePassword/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceConfirmDevice/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceConfirmDevice/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceConfirmForgotPassword/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceConfirmForgotPassword/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceConfirmSignUp/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceConfirmSignUp/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateGroup/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateIdentityProvider/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateIdentityProvider/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateResourceServer/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateResourceServer/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserImportJob/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserImportJob/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPool/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPool/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolClient/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolClient/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolDomain/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolDomain/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteGroup/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteIdentityProvider/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteIdentityProvider/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteResourceServer/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteResourceServer/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserAttributes/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserAttributes/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPool/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPool/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolClient/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolClient/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDomain/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDomain/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeIdentityProvider/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeIdentityProvider/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeResourceServer/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeResourceServer/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeRiskConfiguration/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeRiskConfiguration/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserImportJob/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserImportJob/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPool/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPool/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolClient/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolClient/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDomain/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDomain/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceForgetDevice/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceForgetDevice/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceForgotPassword/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceForgotPassword/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetCSVHeader/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetCSVHeader/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetDevice/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetDevice/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetGroup/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetIdentityProviderByIdentifier/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetIdentityProviderByIdentifier/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetSigningCertificate/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetSigningCertificate/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUICustomization/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUICustomization/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUser/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUser/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUserAttributeVerificationCode/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUserAttributeVerificationCode/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUserPoolMfaConfig/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGetUserPoolMfaConfig/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGlobalSignOut/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceGlobalSignOut/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceInitiateAuth/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceInitiateAuth/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListDevices/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListDevices/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListGroups/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListGroups/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListIdentityProviders/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListIdentityProviders/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListResourceServers/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListResourceServers/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListTagsForResource/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListTagsForResource/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUserImportJobs/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUserImportJobs/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUserPoolClients/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUserPoolClients/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUserPools/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUserPools/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUsers/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUsers/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUsersInGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceListUsersInGroup/schema.json +41 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceResendConfirmationCode/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceResendConfirmationCode/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceRespondToAuthChallenge/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceRespondToAuthChallenge/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceRevokeToken/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceRevokeToken/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetRiskConfiguration/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetRiskConfiguration/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUICustomization/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUICustomization/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUserMFAPreference/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUserMFAPreference/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUserPoolMfaConfig/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUserPoolMfaConfig/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUserSettings/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSetUserSettings/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSignUp/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceSignUp/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceStartUserImportJob/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceStartUserImportJob/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceStopUserImportJob/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceStopUserImportJob/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceTagResource/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceTagResource/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUntagResource/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUntagResource/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateAuthEventFeedback/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateAuthEventFeedback/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateDeviceStatus/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateDeviceStatus/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateGroup/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateGroup/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateIdentityProvider/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateIdentityProvider/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateResourceServer/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateResourceServer/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserAttributes/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserAttributes/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPool/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPool/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolClient/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolClient/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolDomain/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolDomain/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceVerifySoftwareToken/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceVerifySoftwareToken/schema.json +19 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceVerifyUserAttribute/action.json +24 -0
- package/entities/XAmzTargetAWSCognitoIdentityProviderServiceVerifyUserAttribute/schema.json +19 -0
- package/error.json +190 -0
- package/metadata.json +92 -0
- package/package.json +81 -0
- package/pronghorn.json +5618 -0
- package/propertiesDecorators.json +14 -0
- package/propertiesSchema.json +1659 -0
- package/refs?service=git-upload-pack +0 -0
- package/report/adapterInfo.json +10 -0
- package/report/auto-adapter-openapi.json +44 -0
- package/report/aws_cognito.json +25915 -0
- package/report/creationReport.json +2215 -0
- package/sampleProperties.json +270 -0
- package/test/integration/adapterTestBasicGet.js +83 -0
- package/test/integration/adapterTestConnectivity.js +118 -0
- package/test/integration/adapterTestIntegration.js +3106 -0
- package/test/unit/adapterBaseTestUnit.js +1024 -0
- package/test/unit/adapterTestUnit.js +4433 -0
- package/utils/adapterInfo.js +206 -0
- package/utils/addAuth.js +94 -0
- package/utils/artifactize.js +146 -0
- package/utils/basicGet.js +50 -0
- package/utils/checkMigrate.js +63 -0
- package/utils/entitiesToDB.js +179 -0
- package/utils/findPath.js +74 -0
- package/utils/methodDocumentor.js +273 -0
- package/utils/modify.js +152 -0
- package/utils/packModificationScript.js +35 -0
- package/utils/patches2bundledDeps.js +90 -0
- package/utils/pre-commit.sh +32 -0
- package/utils/removeHooks.js +20 -0
- package/utils/setup.js +33 -0
- package/utils/taskMover.js +309 -0
- package/utils/tbScript.js +239 -0
- package/utils/tbUtils.js +489 -0
- package/utils/testRunner.js +298 -0
- package/utils/troubleshootingAdapter.js +193 -0
|
@@ -0,0 +1,3106 @@
|
|
|
1
|
+
/* @copyright Itential, LLC 2019 (pre-modifications) */
|
|
2
|
+
|
|
3
|
+
// Set globals
|
|
4
|
+
/* global describe it log pronghornProps */
|
|
5
|
+
/* eslint no-unused-vars: warn */
|
|
6
|
+
/* eslint no-underscore-dangle: warn */
|
|
7
|
+
/* eslint import/no-dynamic-require:warn */
|
|
8
|
+
|
|
9
|
+
// include required items for testing & logging
|
|
10
|
+
const assert = require('assert');
|
|
11
|
+
const fs = require('fs');
|
|
12
|
+
const path = require('path');
|
|
13
|
+
const util = require('util');
|
|
14
|
+
const mocha = require('mocha');
|
|
15
|
+
const winston = require('winston');
|
|
16
|
+
const { expect } = require('chai');
|
|
17
|
+
const { use } = require('chai');
|
|
18
|
+
const td = require('testdouble');
|
|
19
|
+
|
|
20
|
+
const anything = td.matchers.anything();
|
|
21
|
+
|
|
22
|
+
// stub and attemptTimeout are used throughout the code so set them here
|
|
23
|
+
let logLevel = 'none';
|
|
24
|
+
const isRapidFail = false;
|
|
25
|
+
const isSaveMockData = false;
|
|
26
|
+
|
|
27
|
+
// read in the properties from the sampleProperties files
|
|
28
|
+
let adaptdir = __dirname;
|
|
29
|
+
if (adaptdir.endsWith('/test/integration')) {
|
|
30
|
+
adaptdir = adaptdir.substring(0, adaptdir.length - 17);
|
|
31
|
+
} else if (adaptdir.endsWith('/test/unit')) {
|
|
32
|
+
adaptdir = adaptdir.substring(0, adaptdir.length - 10);
|
|
33
|
+
}
|
|
34
|
+
const samProps = require(`${adaptdir}/sampleProperties.json`).properties;
|
|
35
|
+
|
|
36
|
+
// these variables can be changed to run in integrated mode so easier to set them here
|
|
37
|
+
// always check these in with bogus data!!!
|
|
38
|
+
samProps.stub = true;
|
|
39
|
+
|
|
40
|
+
// uncomment if connecting
|
|
41
|
+
// samProps.host = 'replace.hostorip.here';
|
|
42
|
+
// samProps.authentication.username = 'username';
|
|
43
|
+
// samProps.authentication.password = 'password';
|
|
44
|
+
// samProps.authentication.token = 'password';
|
|
45
|
+
// samProps.protocol = 'http';
|
|
46
|
+
// samProps.port = 80;
|
|
47
|
+
// samProps.ssl.enabled = false;
|
|
48
|
+
// samProps.ssl.accept_invalid_cert = false;
|
|
49
|
+
|
|
50
|
+
if (samProps.request.attempt_timeout < 30000) {
|
|
51
|
+
samProps.request.attempt_timeout = 30000;
|
|
52
|
+
}
|
|
53
|
+
samProps.devicebroker.enabled = true;
|
|
54
|
+
const attemptTimeout = samProps.request.attempt_timeout;
|
|
55
|
+
const { stub } = samProps;
|
|
56
|
+
|
|
57
|
+
// these are the adapter properties. You generally should not need to alter
|
|
58
|
+
// any of these after they are initially set up
|
|
59
|
+
global.pronghornProps = {
|
|
60
|
+
pathProps: {
|
|
61
|
+
encrypted: false
|
|
62
|
+
},
|
|
63
|
+
adapterProps: {
|
|
64
|
+
adapters: [{
|
|
65
|
+
id: 'Test-aws_cognito_identity_provider',
|
|
66
|
+
type: 'AwsCognitoIdentityProvider',
|
|
67
|
+
properties: samProps
|
|
68
|
+
}]
|
|
69
|
+
}
|
|
70
|
+
};
|
|
71
|
+
|
|
72
|
+
global.$HOME = `${__dirname}/../..`;
|
|
73
|
+
|
|
74
|
+
// set the log levels that Pronghorn uses, spam and trace are not defaulted in so without
|
|
75
|
+
// this you may error on log.trace calls.
|
|
76
|
+
const myCustomLevels = {
|
|
77
|
+
levels: {
|
|
78
|
+
spam: 6,
|
|
79
|
+
trace: 5,
|
|
80
|
+
debug: 4,
|
|
81
|
+
info: 3,
|
|
82
|
+
warn: 2,
|
|
83
|
+
error: 1,
|
|
84
|
+
none: 0
|
|
85
|
+
}
|
|
86
|
+
};
|
|
87
|
+
|
|
88
|
+
// need to see if there is a log level passed in
|
|
89
|
+
process.argv.forEach((val) => {
|
|
90
|
+
// is there a log level defined to be passed in?
|
|
91
|
+
if (val.indexOf('--LOG') === 0) {
|
|
92
|
+
// get the desired log level
|
|
93
|
+
const inputVal = val.split('=')[1];
|
|
94
|
+
|
|
95
|
+
// validate the log level is supported, if so set it
|
|
96
|
+
if (Object.hasOwnProperty.call(myCustomLevels.levels, inputVal)) {
|
|
97
|
+
logLevel = inputVal;
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
});
|
|
101
|
+
|
|
102
|
+
// need to set global logging
|
|
103
|
+
global.log = winston.createLogger({
|
|
104
|
+
level: logLevel,
|
|
105
|
+
levels: myCustomLevels.levels,
|
|
106
|
+
transports: [
|
|
107
|
+
new winston.transports.Console()
|
|
108
|
+
]
|
|
109
|
+
});
|
|
110
|
+
|
|
111
|
+
/**
|
|
112
|
+
* Runs the common asserts for test
|
|
113
|
+
*/
|
|
114
|
+
function runCommonAsserts(data, error) {
|
|
115
|
+
assert.equal(undefined, error);
|
|
116
|
+
assert.notEqual(undefined, data);
|
|
117
|
+
assert.notEqual(null, data);
|
|
118
|
+
assert.notEqual(undefined, data.response);
|
|
119
|
+
assert.notEqual(null, data.response);
|
|
120
|
+
}
|
|
121
|
+
|
|
122
|
+
/**
|
|
123
|
+
* Runs the error asserts for the test
|
|
124
|
+
*/
|
|
125
|
+
function runErrorAsserts(data, error, code, origin, displayStr) {
|
|
126
|
+
assert.equal(null, data);
|
|
127
|
+
assert.notEqual(undefined, error);
|
|
128
|
+
assert.notEqual(null, error);
|
|
129
|
+
assert.notEqual(undefined, error.IAPerror);
|
|
130
|
+
assert.notEqual(null, error.IAPerror);
|
|
131
|
+
assert.notEqual(undefined, error.IAPerror.displayString);
|
|
132
|
+
assert.notEqual(null, error.IAPerror.displayString);
|
|
133
|
+
assert.equal(code, error.icode);
|
|
134
|
+
assert.equal(origin, error.IAPerror.origin);
|
|
135
|
+
assert.equal(displayStr, error.IAPerror.displayString);
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
/**
|
|
139
|
+
* @function saveMockData
|
|
140
|
+
* Attempts to take data from responses and place them in MockDataFiles to help create Mockdata.
|
|
141
|
+
* Note, this was built based on entity file structure for Adapter-Engine 1.6.x
|
|
142
|
+
* @param {string} entityName - Name of the entity saving mock data for
|
|
143
|
+
* @param {string} actionName - Name of the action saving mock data for
|
|
144
|
+
* @param {string} descriptor - Something to describe this test (used as a type)
|
|
145
|
+
* @param {string or object} responseData - The data to put in the mock file.
|
|
146
|
+
*/
|
|
147
|
+
function saveMockData(entityName, actionName, descriptor, responseData) {
|
|
148
|
+
// do not need to save mockdata if we are running in stub mode (already has mock data) or if told not to save
|
|
149
|
+
if (stub || !isSaveMockData) {
|
|
150
|
+
return false;
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
// must have a response in order to store the response
|
|
154
|
+
if (responseData && responseData.response) {
|
|
155
|
+
let data = responseData.response;
|
|
156
|
+
|
|
157
|
+
// if there was a raw response that one is better as it is untranslated
|
|
158
|
+
if (responseData.raw) {
|
|
159
|
+
data = responseData.raw;
|
|
160
|
+
|
|
161
|
+
try {
|
|
162
|
+
const temp = JSON.parse(data);
|
|
163
|
+
data = temp;
|
|
164
|
+
} catch (pex) {
|
|
165
|
+
// do not care if it did not parse as we will just use data
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
|
|
169
|
+
try {
|
|
170
|
+
const base = path.join(__dirname, `../../entities/${entityName}/`);
|
|
171
|
+
const mockdatafolder = 'mockdatafiles';
|
|
172
|
+
const filename = `mockdatafiles/${actionName}-${descriptor}.json`;
|
|
173
|
+
|
|
174
|
+
if (!fs.existsSync(base + mockdatafolder)) {
|
|
175
|
+
fs.mkdirSync(base + mockdatafolder);
|
|
176
|
+
}
|
|
177
|
+
|
|
178
|
+
// write the data we retrieved
|
|
179
|
+
fs.writeFile(base + filename, JSON.stringify(data, null, 2), 'utf8', (errWritingMock) => {
|
|
180
|
+
if (errWritingMock) throw errWritingMock;
|
|
181
|
+
|
|
182
|
+
// update the action file to reflect the changes. Note: We're replacing the default object for now!
|
|
183
|
+
fs.readFile(`${base}action.json`, (errRead, content) => {
|
|
184
|
+
if (errRead) throw errRead;
|
|
185
|
+
|
|
186
|
+
// parse the action file into JSON
|
|
187
|
+
const parsedJson = JSON.parse(content);
|
|
188
|
+
|
|
189
|
+
// The object update we'll write in.
|
|
190
|
+
const responseObj = {
|
|
191
|
+
type: descriptor,
|
|
192
|
+
key: '',
|
|
193
|
+
mockFile: filename
|
|
194
|
+
};
|
|
195
|
+
|
|
196
|
+
// get the object for method we're trying to change.
|
|
197
|
+
const currentMethodAction = parsedJson.actions.find((obj) => obj.name === actionName);
|
|
198
|
+
|
|
199
|
+
// if the method was not found - should never happen but...
|
|
200
|
+
if (!currentMethodAction) {
|
|
201
|
+
throw Error('Can\'t find an action for this method in the provided entity.');
|
|
202
|
+
}
|
|
203
|
+
|
|
204
|
+
// if there is a response object, we want to replace the Response object. Otherwise we'll create one.
|
|
205
|
+
const actionResponseObj = currentMethodAction.responseObjects.find((obj) => obj.type === descriptor);
|
|
206
|
+
|
|
207
|
+
// Add the action responseObj back into the array of response objects.
|
|
208
|
+
if (!actionResponseObj) {
|
|
209
|
+
// if there is a default response object, we want to get the key.
|
|
210
|
+
const defaultResponseObj = currentMethodAction.responseObjects.find((obj) => obj.type === 'default');
|
|
211
|
+
|
|
212
|
+
// save the default key into the new response object
|
|
213
|
+
if (defaultResponseObj) {
|
|
214
|
+
responseObj.key = defaultResponseObj.key;
|
|
215
|
+
}
|
|
216
|
+
|
|
217
|
+
// save the new response object
|
|
218
|
+
currentMethodAction.responseObjects = [responseObj];
|
|
219
|
+
} else {
|
|
220
|
+
// update the location of the mock data file
|
|
221
|
+
actionResponseObj.mockFile = responseObj.mockFile;
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
// Save results
|
|
225
|
+
fs.writeFile(`${base}action.json`, JSON.stringify(parsedJson, null, 2), (err) => {
|
|
226
|
+
if (err) throw err;
|
|
227
|
+
});
|
|
228
|
+
});
|
|
229
|
+
});
|
|
230
|
+
} catch (e) {
|
|
231
|
+
log.debug(`Failed to save mock data for ${actionName}. ${e.message}`);
|
|
232
|
+
return false;
|
|
233
|
+
}
|
|
234
|
+
}
|
|
235
|
+
|
|
236
|
+
// no response to save
|
|
237
|
+
log.debug(`No data passed to save into mockdata for ${actionName}`);
|
|
238
|
+
return false;
|
|
239
|
+
}
|
|
240
|
+
|
|
241
|
+
// require the adapter that we are going to be using
|
|
242
|
+
const AwsCognitoIdentityProvider = require('../../adapter');
|
|
243
|
+
|
|
244
|
+
// begin the testing - these should be pretty well defined between the describe and the it!
|
|
245
|
+
describe('[integration] Aws_cognito_identity_provider Adapter Test', () => {
|
|
246
|
+
describe('AwsCognitoIdentityProvider Class Tests', () => {
|
|
247
|
+
const a = new AwsCognitoIdentityProvider(
|
|
248
|
+
pronghornProps.adapterProps.adapters[0].id,
|
|
249
|
+
pronghornProps.adapterProps.adapters[0].properties
|
|
250
|
+
);
|
|
251
|
+
|
|
252
|
+
if (isRapidFail) {
|
|
253
|
+
const state = {};
|
|
254
|
+
state.passed = true;
|
|
255
|
+
|
|
256
|
+
mocha.afterEach(function x() {
|
|
257
|
+
state.passed = state.passed
|
|
258
|
+
&& (this.currentTest.state === 'passed');
|
|
259
|
+
});
|
|
260
|
+
mocha.beforeEach(function x() {
|
|
261
|
+
if (!state.passed) {
|
|
262
|
+
return this.currentTest.skip();
|
|
263
|
+
}
|
|
264
|
+
return true;
|
|
265
|
+
});
|
|
266
|
+
}
|
|
267
|
+
|
|
268
|
+
describe('#class instance created', () => {
|
|
269
|
+
it('should be a class with properties', (done) => {
|
|
270
|
+
try {
|
|
271
|
+
assert.notEqual(null, a);
|
|
272
|
+
assert.notEqual(undefined, a);
|
|
273
|
+
const checkId = global.pronghornProps.adapterProps.adapters[0].id;
|
|
274
|
+
assert.equal(checkId, a.id);
|
|
275
|
+
assert.notEqual(null, a.allProps);
|
|
276
|
+
const check = global.pronghornProps.adapterProps.adapters[0].properties.healthcheck.type;
|
|
277
|
+
assert.equal(check, a.healthcheckType);
|
|
278
|
+
done();
|
|
279
|
+
} catch (error) {
|
|
280
|
+
log.error(`Test Failure: ${error}`);
|
|
281
|
+
done(error);
|
|
282
|
+
}
|
|
283
|
+
}).timeout(attemptTimeout);
|
|
284
|
+
});
|
|
285
|
+
|
|
286
|
+
describe('#connect', () => {
|
|
287
|
+
it('should get connected - no healthcheck', (done) => {
|
|
288
|
+
try {
|
|
289
|
+
a.healthcheckType = 'none';
|
|
290
|
+
a.connect();
|
|
291
|
+
|
|
292
|
+
try {
|
|
293
|
+
assert.equal(true, a.alive);
|
|
294
|
+
done();
|
|
295
|
+
} catch (error) {
|
|
296
|
+
log.error(`Test Failure: ${error}`);
|
|
297
|
+
done(error);
|
|
298
|
+
}
|
|
299
|
+
} catch (error) {
|
|
300
|
+
log.error(`Adapter Exception: ${error}`);
|
|
301
|
+
done(error);
|
|
302
|
+
}
|
|
303
|
+
});
|
|
304
|
+
it('should get connected - startup healthcheck', (done) => {
|
|
305
|
+
try {
|
|
306
|
+
a.healthcheckType = 'startup';
|
|
307
|
+
a.connect();
|
|
308
|
+
|
|
309
|
+
try {
|
|
310
|
+
assert.equal(true, a.alive);
|
|
311
|
+
done();
|
|
312
|
+
} catch (error) {
|
|
313
|
+
log.error(`Test Failure: ${error}`);
|
|
314
|
+
done(error);
|
|
315
|
+
}
|
|
316
|
+
} catch (error) {
|
|
317
|
+
log.error(`Adapter Exception: ${error}`);
|
|
318
|
+
done(error);
|
|
319
|
+
}
|
|
320
|
+
});
|
|
321
|
+
});
|
|
322
|
+
|
|
323
|
+
describe('#healthCheck', () => {
|
|
324
|
+
it('should be healthy', (done) => {
|
|
325
|
+
try {
|
|
326
|
+
a.healthCheck(null, (data) => {
|
|
327
|
+
try {
|
|
328
|
+
assert.equal(true, a.healthy);
|
|
329
|
+
saveMockData('system', 'healthcheck', 'default', data);
|
|
330
|
+
done();
|
|
331
|
+
} catch (err) {
|
|
332
|
+
log.error(`Test Failure: ${err}`);
|
|
333
|
+
done(err);
|
|
334
|
+
}
|
|
335
|
+
});
|
|
336
|
+
} catch (error) {
|
|
337
|
+
log.error(`Adapter Exception: ${error}`);
|
|
338
|
+
done(error);
|
|
339
|
+
}
|
|
340
|
+
}).timeout(attemptTimeout);
|
|
341
|
+
});
|
|
342
|
+
|
|
343
|
+
// broker tests
|
|
344
|
+
describe('#getDevicesFiltered - errors', () => {
|
|
345
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
346
|
+
try {
|
|
347
|
+
const opts = {
|
|
348
|
+
filter: {
|
|
349
|
+
name: 'deviceName'
|
|
350
|
+
}
|
|
351
|
+
};
|
|
352
|
+
a.getDevicesFiltered(opts, (data, error) => {
|
|
353
|
+
try {
|
|
354
|
+
if (stub) {
|
|
355
|
+
if (samProps.devicebroker.getDevicesFiltered[0].handleFailure === 'ignore') {
|
|
356
|
+
assert.equal(null, error);
|
|
357
|
+
assert.notEqual(undefined, data);
|
|
358
|
+
assert.notEqual(null, data);
|
|
359
|
+
assert.equal(0, data.total);
|
|
360
|
+
assert.equal(0, data.list.length);
|
|
361
|
+
} else {
|
|
362
|
+
const displayE = 'Error 400 received on request';
|
|
363
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
364
|
+
}
|
|
365
|
+
} else {
|
|
366
|
+
runCommonAsserts(data, error);
|
|
367
|
+
}
|
|
368
|
+
done();
|
|
369
|
+
} catch (err) {
|
|
370
|
+
log.error(`Test Failure: ${err}`);
|
|
371
|
+
done(err);
|
|
372
|
+
}
|
|
373
|
+
});
|
|
374
|
+
} catch (error) {
|
|
375
|
+
log.error(`Adapter Exception: ${error}`);
|
|
376
|
+
done(error);
|
|
377
|
+
}
|
|
378
|
+
}).timeout(attemptTimeout);
|
|
379
|
+
});
|
|
380
|
+
|
|
381
|
+
describe('#iapGetDeviceCount - errors', () => {
|
|
382
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
383
|
+
try {
|
|
384
|
+
const opts = {
|
|
385
|
+
filter: {
|
|
386
|
+
name: 'deviceName'
|
|
387
|
+
}
|
|
388
|
+
};
|
|
389
|
+
a.iapGetDeviceCount((data, error) => {
|
|
390
|
+
try {
|
|
391
|
+
if (stub) {
|
|
392
|
+
if (samProps.devicebroker.getDevicesFiltered[0].handleFailure === 'ignore') {
|
|
393
|
+
assert.equal(null, error);
|
|
394
|
+
assert.notEqual(undefined, data);
|
|
395
|
+
assert.notEqual(null, data);
|
|
396
|
+
assert.equal(0, data.count);
|
|
397
|
+
} else {
|
|
398
|
+
const displayE = 'Error 400 received on request';
|
|
399
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
400
|
+
}
|
|
401
|
+
} else {
|
|
402
|
+
runCommonAsserts(data, error);
|
|
403
|
+
}
|
|
404
|
+
done();
|
|
405
|
+
} catch (err) {
|
|
406
|
+
log.error(`Test Failure: ${err}`);
|
|
407
|
+
done(err);
|
|
408
|
+
}
|
|
409
|
+
});
|
|
410
|
+
} catch (error) {
|
|
411
|
+
log.error(`Adapter Exception: ${error}`);
|
|
412
|
+
done(error);
|
|
413
|
+
}
|
|
414
|
+
}).timeout(attemptTimeout);
|
|
415
|
+
});
|
|
416
|
+
|
|
417
|
+
// exposed cache tests
|
|
418
|
+
describe('#iapPopulateEntityCache - errors', () => {
|
|
419
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
420
|
+
try {
|
|
421
|
+
a.iapPopulateEntityCache('Device', (data, error) => {
|
|
422
|
+
try {
|
|
423
|
+
if (stub) {
|
|
424
|
+
assert.equal(null, data);
|
|
425
|
+
assert.notEqual(undefined, error);
|
|
426
|
+
assert.notEqual(null, error);
|
|
427
|
+
done();
|
|
428
|
+
} else {
|
|
429
|
+
assert.equal(undefined, error);
|
|
430
|
+
assert.equal('success', data[0]);
|
|
431
|
+
done();
|
|
432
|
+
}
|
|
433
|
+
} catch (err) {
|
|
434
|
+
log.error(`Test Failure: ${err}`);
|
|
435
|
+
done(err);
|
|
436
|
+
}
|
|
437
|
+
});
|
|
438
|
+
} catch (error) {
|
|
439
|
+
log.error(`Adapter Exception: ${error}`);
|
|
440
|
+
done(error);
|
|
441
|
+
}
|
|
442
|
+
}).timeout(attemptTimeout);
|
|
443
|
+
});
|
|
444
|
+
|
|
445
|
+
describe('#iapRetrieveEntitiesCache - errors', () => {
|
|
446
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
447
|
+
try {
|
|
448
|
+
a.iapRetrieveEntitiesCache('Device', {}, (data, error) => {
|
|
449
|
+
try {
|
|
450
|
+
if (stub) {
|
|
451
|
+
assert.equal(null, data);
|
|
452
|
+
assert.notEqual(null, error);
|
|
453
|
+
assert.notEqual(undefined, error);
|
|
454
|
+
} else {
|
|
455
|
+
assert.equal(undefined, error);
|
|
456
|
+
assert.notEqual(null, data);
|
|
457
|
+
assert.notEqual(undefined, data);
|
|
458
|
+
}
|
|
459
|
+
done();
|
|
460
|
+
} catch (err) {
|
|
461
|
+
log.error(`Test Failure: ${err}`);
|
|
462
|
+
done(err);
|
|
463
|
+
}
|
|
464
|
+
});
|
|
465
|
+
} catch (error) {
|
|
466
|
+
log.error(`Adapter Exception: ${error}`);
|
|
467
|
+
done(error);
|
|
468
|
+
}
|
|
469
|
+
}).timeout(attemptTimeout);
|
|
470
|
+
});
|
|
471
|
+
/*
|
|
472
|
+
-----------------------------------------------------------------------
|
|
473
|
+
-----------------------------------------------------------------------
|
|
474
|
+
*** All code above this comment will be replaced during a migration ***
|
|
475
|
+
******************* DO NOT REMOVE THIS COMMENT BLOCK ******************
|
|
476
|
+
-----------------------------------------------------------------------
|
|
477
|
+
-----------------------------------------------------------------------
|
|
478
|
+
*/
|
|
479
|
+
|
|
480
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAddCustomAttributesAddCustomAttributesBodyParam = {};
|
|
481
|
+
describe('#addCustomAttributes - errors', () => {
|
|
482
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
483
|
+
try {
|
|
484
|
+
a.addCustomAttributes(xAmzTargetAWSCognitoIdentityProviderServiceAddCustomAttributesAddCustomAttributesBodyParam, null, (data, error) => {
|
|
485
|
+
try {
|
|
486
|
+
if (stub) {
|
|
487
|
+
const displayE = 'Error 400 received on request';
|
|
488
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
489
|
+
} else {
|
|
490
|
+
runCommonAsserts(data, error);
|
|
491
|
+
}
|
|
492
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAddCustomAttributes', 'addCustomAttributes', 'default', data);
|
|
493
|
+
done();
|
|
494
|
+
} catch (err) {
|
|
495
|
+
log.error(`Test Failure: ${err}`);
|
|
496
|
+
done(err);
|
|
497
|
+
}
|
|
498
|
+
});
|
|
499
|
+
} catch (error) {
|
|
500
|
+
log.error(`Adapter Exception: ${error}`);
|
|
501
|
+
done(error);
|
|
502
|
+
}
|
|
503
|
+
}).timeout(attemptTimeout);
|
|
504
|
+
});
|
|
505
|
+
|
|
506
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminAddUserToGroupAdminAddUserToGroupBodyParam = {};
|
|
507
|
+
describe('#adminAddUserToGroup - errors', () => {
|
|
508
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
509
|
+
try {
|
|
510
|
+
a.adminAddUserToGroup(xAmzTargetAWSCognitoIdentityProviderServiceAdminAddUserToGroupAdminAddUserToGroupBodyParam, null, (data, error) => {
|
|
511
|
+
try {
|
|
512
|
+
if (stub) {
|
|
513
|
+
const displayE = 'Error 400 received on request';
|
|
514
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
515
|
+
} else {
|
|
516
|
+
runCommonAsserts(data, error);
|
|
517
|
+
}
|
|
518
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminAddUserToGroup', 'adminAddUserToGroup', 'default', data);
|
|
519
|
+
done();
|
|
520
|
+
} catch (err) {
|
|
521
|
+
log.error(`Test Failure: ${err}`);
|
|
522
|
+
done(err);
|
|
523
|
+
}
|
|
524
|
+
});
|
|
525
|
+
} catch (error) {
|
|
526
|
+
log.error(`Adapter Exception: ${error}`);
|
|
527
|
+
done(error);
|
|
528
|
+
}
|
|
529
|
+
}).timeout(attemptTimeout);
|
|
530
|
+
});
|
|
531
|
+
|
|
532
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminConfirmSignUpAdminConfirmSignUpBodyParam = {};
|
|
533
|
+
describe('#adminConfirmSignUp - errors', () => {
|
|
534
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
535
|
+
try {
|
|
536
|
+
a.adminConfirmSignUp(xAmzTargetAWSCognitoIdentityProviderServiceAdminConfirmSignUpAdminConfirmSignUpBodyParam, null, (data, error) => {
|
|
537
|
+
try {
|
|
538
|
+
if (stub) {
|
|
539
|
+
const displayE = 'Error 400 received on request';
|
|
540
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
541
|
+
} else {
|
|
542
|
+
runCommonAsserts(data, error);
|
|
543
|
+
}
|
|
544
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminConfirmSignUp', 'adminConfirmSignUp', 'default', data);
|
|
545
|
+
done();
|
|
546
|
+
} catch (err) {
|
|
547
|
+
log.error(`Test Failure: ${err}`);
|
|
548
|
+
done(err);
|
|
549
|
+
}
|
|
550
|
+
});
|
|
551
|
+
} catch (error) {
|
|
552
|
+
log.error(`Adapter Exception: ${error}`);
|
|
553
|
+
done(error);
|
|
554
|
+
}
|
|
555
|
+
}).timeout(attemptTimeout);
|
|
556
|
+
});
|
|
557
|
+
|
|
558
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminCreateUserAdminCreateUserBodyParam = {};
|
|
559
|
+
describe('#adminCreateUser - errors', () => {
|
|
560
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
561
|
+
try {
|
|
562
|
+
a.adminCreateUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminCreateUserAdminCreateUserBodyParam, null, (data, error) => {
|
|
563
|
+
try {
|
|
564
|
+
if (stub) {
|
|
565
|
+
const displayE = 'Error 400 received on request';
|
|
566
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
567
|
+
} else {
|
|
568
|
+
runCommonAsserts(data, error);
|
|
569
|
+
}
|
|
570
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminCreateUser', 'adminCreateUser', 'default', data);
|
|
571
|
+
done();
|
|
572
|
+
} catch (err) {
|
|
573
|
+
log.error(`Test Failure: ${err}`);
|
|
574
|
+
done(err);
|
|
575
|
+
}
|
|
576
|
+
});
|
|
577
|
+
} catch (error) {
|
|
578
|
+
log.error(`Adapter Exception: ${error}`);
|
|
579
|
+
done(error);
|
|
580
|
+
}
|
|
581
|
+
}).timeout(attemptTimeout);
|
|
582
|
+
});
|
|
583
|
+
|
|
584
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAdminDeleteUserBodyParam = {};
|
|
585
|
+
describe('#adminDeleteUser - errors', () => {
|
|
586
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
587
|
+
try {
|
|
588
|
+
a.adminDeleteUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAdminDeleteUserBodyParam, null, (data, error) => {
|
|
589
|
+
try {
|
|
590
|
+
if (stub) {
|
|
591
|
+
const displayE = 'Error 400 received on request';
|
|
592
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
593
|
+
} else {
|
|
594
|
+
runCommonAsserts(data, error);
|
|
595
|
+
}
|
|
596
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUser', 'adminDeleteUser', 'default', data);
|
|
597
|
+
done();
|
|
598
|
+
} catch (err) {
|
|
599
|
+
log.error(`Test Failure: ${err}`);
|
|
600
|
+
done(err);
|
|
601
|
+
}
|
|
602
|
+
});
|
|
603
|
+
} catch (error) {
|
|
604
|
+
log.error(`Adapter Exception: ${error}`);
|
|
605
|
+
done(error);
|
|
606
|
+
}
|
|
607
|
+
}).timeout(attemptTimeout);
|
|
608
|
+
});
|
|
609
|
+
|
|
610
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAttributesAdminDeleteUserAttributesBodyParam = {};
|
|
611
|
+
describe('#adminDeleteUserAttributes - errors', () => {
|
|
612
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
613
|
+
try {
|
|
614
|
+
a.adminDeleteUserAttributes(xAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAttributesAdminDeleteUserAttributesBodyParam, null, (data, error) => {
|
|
615
|
+
try {
|
|
616
|
+
if (stub) {
|
|
617
|
+
const displayE = 'Error 400 received on request';
|
|
618
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
619
|
+
} else {
|
|
620
|
+
runCommonAsserts(data, error);
|
|
621
|
+
}
|
|
622
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminDeleteUserAttributes', 'adminDeleteUserAttributes', 'default', data);
|
|
623
|
+
done();
|
|
624
|
+
} catch (err) {
|
|
625
|
+
log.error(`Test Failure: ${err}`);
|
|
626
|
+
done(err);
|
|
627
|
+
}
|
|
628
|
+
});
|
|
629
|
+
} catch (error) {
|
|
630
|
+
log.error(`Adapter Exception: ${error}`);
|
|
631
|
+
done(error);
|
|
632
|
+
}
|
|
633
|
+
}).timeout(attemptTimeout);
|
|
634
|
+
});
|
|
635
|
+
|
|
636
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminDisableProviderForUserAdminDisableProviderForUserBodyParam = {};
|
|
637
|
+
describe('#adminDisableProviderForUser - errors', () => {
|
|
638
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
639
|
+
try {
|
|
640
|
+
a.adminDisableProviderForUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminDisableProviderForUserAdminDisableProviderForUserBodyParam, null, (data, error) => {
|
|
641
|
+
try {
|
|
642
|
+
if (stub) {
|
|
643
|
+
const displayE = 'Error 400 received on request';
|
|
644
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
645
|
+
} else {
|
|
646
|
+
runCommonAsserts(data, error);
|
|
647
|
+
}
|
|
648
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminDisableProviderForUser', 'adminDisableProviderForUser', 'default', data);
|
|
649
|
+
done();
|
|
650
|
+
} catch (err) {
|
|
651
|
+
log.error(`Test Failure: ${err}`);
|
|
652
|
+
done(err);
|
|
653
|
+
}
|
|
654
|
+
});
|
|
655
|
+
} catch (error) {
|
|
656
|
+
log.error(`Adapter Exception: ${error}`);
|
|
657
|
+
done(error);
|
|
658
|
+
}
|
|
659
|
+
}).timeout(attemptTimeout);
|
|
660
|
+
});
|
|
661
|
+
|
|
662
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminDisableUserAdminDisableUserBodyParam = {};
|
|
663
|
+
describe('#adminDisableUser - errors', () => {
|
|
664
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
665
|
+
try {
|
|
666
|
+
a.adminDisableUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminDisableUserAdminDisableUserBodyParam, null, (data, error) => {
|
|
667
|
+
try {
|
|
668
|
+
if (stub) {
|
|
669
|
+
const displayE = 'Error 400 received on request';
|
|
670
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
671
|
+
} else {
|
|
672
|
+
runCommonAsserts(data, error);
|
|
673
|
+
}
|
|
674
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminDisableUser', 'adminDisableUser', 'default', data);
|
|
675
|
+
done();
|
|
676
|
+
} catch (err) {
|
|
677
|
+
log.error(`Test Failure: ${err}`);
|
|
678
|
+
done(err);
|
|
679
|
+
}
|
|
680
|
+
});
|
|
681
|
+
} catch (error) {
|
|
682
|
+
log.error(`Adapter Exception: ${error}`);
|
|
683
|
+
done(error);
|
|
684
|
+
}
|
|
685
|
+
}).timeout(attemptTimeout);
|
|
686
|
+
});
|
|
687
|
+
|
|
688
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminEnableUserAdminEnableUserBodyParam = {};
|
|
689
|
+
describe('#adminEnableUser - errors', () => {
|
|
690
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
691
|
+
try {
|
|
692
|
+
a.adminEnableUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminEnableUserAdminEnableUserBodyParam, null, (data, error) => {
|
|
693
|
+
try {
|
|
694
|
+
if (stub) {
|
|
695
|
+
const displayE = 'Error 400 received on request';
|
|
696
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
697
|
+
} else {
|
|
698
|
+
runCommonAsserts(data, error);
|
|
699
|
+
}
|
|
700
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminEnableUser', 'adminEnableUser', 'default', data);
|
|
701
|
+
done();
|
|
702
|
+
} catch (err) {
|
|
703
|
+
log.error(`Test Failure: ${err}`);
|
|
704
|
+
done(err);
|
|
705
|
+
}
|
|
706
|
+
});
|
|
707
|
+
} catch (error) {
|
|
708
|
+
log.error(`Adapter Exception: ${error}`);
|
|
709
|
+
done(error);
|
|
710
|
+
}
|
|
711
|
+
}).timeout(attemptTimeout);
|
|
712
|
+
});
|
|
713
|
+
|
|
714
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminForgetDeviceAdminForgetDeviceBodyParam = {};
|
|
715
|
+
describe('#adminForgetDevice - errors', () => {
|
|
716
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
717
|
+
try {
|
|
718
|
+
a.adminForgetDevice(xAmzTargetAWSCognitoIdentityProviderServiceAdminForgetDeviceAdminForgetDeviceBodyParam, null, (data, error) => {
|
|
719
|
+
try {
|
|
720
|
+
if (stub) {
|
|
721
|
+
const displayE = 'Error 400 received on request';
|
|
722
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
723
|
+
} else {
|
|
724
|
+
runCommonAsserts(data, error);
|
|
725
|
+
}
|
|
726
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminForgetDevice', 'adminForgetDevice', 'default', data);
|
|
727
|
+
done();
|
|
728
|
+
} catch (err) {
|
|
729
|
+
log.error(`Test Failure: ${err}`);
|
|
730
|
+
done(err);
|
|
731
|
+
}
|
|
732
|
+
});
|
|
733
|
+
} catch (error) {
|
|
734
|
+
log.error(`Adapter Exception: ${error}`);
|
|
735
|
+
done(error);
|
|
736
|
+
}
|
|
737
|
+
}).timeout(attemptTimeout);
|
|
738
|
+
});
|
|
739
|
+
|
|
740
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminGetDeviceAdminGetDeviceBodyParam = {};
|
|
741
|
+
describe('#adminGetDevice - errors', () => {
|
|
742
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
743
|
+
try {
|
|
744
|
+
a.adminGetDevice(xAmzTargetAWSCognitoIdentityProviderServiceAdminGetDeviceAdminGetDeviceBodyParam, null, (data, error) => {
|
|
745
|
+
try {
|
|
746
|
+
if (stub) {
|
|
747
|
+
const displayE = 'Error 400 received on request';
|
|
748
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
749
|
+
} else {
|
|
750
|
+
runCommonAsserts(data, error);
|
|
751
|
+
}
|
|
752
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminGetDevice', 'adminGetDevice', 'default', data);
|
|
753
|
+
done();
|
|
754
|
+
} catch (err) {
|
|
755
|
+
log.error(`Test Failure: ${err}`);
|
|
756
|
+
done(err);
|
|
757
|
+
}
|
|
758
|
+
});
|
|
759
|
+
} catch (error) {
|
|
760
|
+
log.error(`Adapter Exception: ${error}`);
|
|
761
|
+
done(error);
|
|
762
|
+
}
|
|
763
|
+
}).timeout(attemptTimeout);
|
|
764
|
+
});
|
|
765
|
+
|
|
766
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminGetUserAdminGetUserBodyParam = {};
|
|
767
|
+
describe('#adminGetUser - errors', () => {
|
|
768
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
769
|
+
try {
|
|
770
|
+
a.adminGetUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminGetUserAdminGetUserBodyParam, null, (data, error) => {
|
|
771
|
+
try {
|
|
772
|
+
if (stub) {
|
|
773
|
+
const displayE = 'Error 400 received on request';
|
|
774
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
775
|
+
} else {
|
|
776
|
+
runCommonAsserts(data, error);
|
|
777
|
+
}
|
|
778
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminGetUser', 'adminGetUser', 'default', data);
|
|
779
|
+
done();
|
|
780
|
+
} catch (err) {
|
|
781
|
+
log.error(`Test Failure: ${err}`);
|
|
782
|
+
done(err);
|
|
783
|
+
}
|
|
784
|
+
});
|
|
785
|
+
} catch (error) {
|
|
786
|
+
log.error(`Adapter Exception: ${error}`);
|
|
787
|
+
done(error);
|
|
788
|
+
}
|
|
789
|
+
}).timeout(attemptTimeout);
|
|
790
|
+
});
|
|
791
|
+
|
|
792
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminInitiateAuthAdminInitiateAuthBodyParam = {};
|
|
793
|
+
describe('#adminInitiateAuth - errors', () => {
|
|
794
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
795
|
+
try {
|
|
796
|
+
a.adminInitiateAuth(xAmzTargetAWSCognitoIdentityProviderServiceAdminInitiateAuthAdminInitiateAuthBodyParam, null, (data, error) => {
|
|
797
|
+
try {
|
|
798
|
+
if (stub) {
|
|
799
|
+
const displayE = 'Error 400 received on request';
|
|
800
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
801
|
+
} else {
|
|
802
|
+
runCommonAsserts(data, error);
|
|
803
|
+
}
|
|
804
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminInitiateAuth', 'adminInitiateAuth', 'default', data);
|
|
805
|
+
done();
|
|
806
|
+
} catch (err) {
|
|
807
|
+
log.error(`Test Failure: ${err}`);
|
|
808
|
+
done(err);
|
|
809
|
+
}
|
|
810
|
+
});
|
|
811
|
+
} catch (error) {
|
|
812
|
+
log.error(`Adapter Exception: ${error}`);
|
|
813
|
+
done(error);
|
|
814
|
+
}
|
|
815
|
+
}).timeout(attemptTimeout);
|
|
816
|
+
});
|
|
817
|
+
|
|
818
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminLinkProviderForUserAdminLinkProviderForUserBodyParam = {};
|
|
819
|
+
describe('#adminLinkProviderForUser - errors', () => {
|
|
820
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
821
|
+
try {
|
|
822
|
+
a.adminLinkProviderForUser(xAmzTargetAWSCognitoIdentityProviderServiceAdminLinkProviderForUserAdminLinkProviderForUserBodyParam, null, (data, error) => {
|
|
823
|
+
try {
|
|
824
|
+
if (stub) {
|
|
825
|
+
const displayE = 'Error 400 received on request';
|
|
826
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
827
|
+
} else {
|
|
828
|
+
runCommonAsserts(data, error);
|
|
829
|
+
}
|
|
830
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminLinkProviderForUser', 'adminLinkProviderForUser', 'default', data);
|
|
831
|
+
done();
|
|
832
|
+
} catch (err) {
|
|
833
|
+
log.error(`Test Failure: ${err}`);
|
|
834
|
+
done(err);
|
|
835
|
+
}
|
|
836
|
+
});
|
|
837
|
+
} catch (error) {
|
|
838
|
+
log.error(`Adapter Exception: ${error}`);
|
|
839
|
+
done(error);
|
|
840
|
+
}
|
|
841
|
+
}).timeout(attemptTimeout);
|
|
842
|
+
});
|
|
843
|
+
|
|
844
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminListDevicesAdminListDevicesBodyParam = {};
|
|
845
|
+
describe('#adminListDevices - errors', () => {
|
|
846
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
847
|
+
try {
|
|
848
|
+
a.adminListDevices(xAmzTargetAWSCognitoIdentityProviderServiceAdminListDevicesAdminListDevicesBodyParam, null, (data, error) => {
|
|
849
|
+
try {
|
|
850
|
+
if (stub) {
|
|
851
|
+
const displayE = 'Error 400 received on request';
|
|
852
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
853
|
+
} else {
|
|
854
|
+
runCommonAsserts(data, error);
|
|
855
|
+
}
|
|
856
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminListDevices', 'adminListDevices', 'default', data);
|
|
857
|
+
done();
|
|
858
|
+
} catch (err) {
|
|
859
|
+
log.error(`Test Failure: ${err}`);
|
|
860
|
+
done(err);
|
|
861
|
+
}
|
|
862
|
+
});
|
|
863
|
+
} catch (error) {
|
|
864
|
+
log.error(`Adapter Exception: ${error}`);
|
|
865
|
+
done(error);
|
|
866
|
+
}
|
|
867
|
+
}).timeout(attemptTimeout);
|
|
868
|
+
});
|
|
869
|
+
|
|
870
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminListGroupsForUserAdminListGroupsForUserBodyParam = {};
|
|
871
|
+
describe('#adminListGroupsForUser - errors', () => {
|
|
872
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
873
|
+
try {
|
|
874
|
+
a.adminListGroupsForUser(null, null, xAmzTargetAWSCognitoIdentityProviderServiceAdminListGroupsForUserAdminListGroupsForUserBodyParam, null, (data, error) => {
|
|
875
|
+
try {
|
|
876
|
+
if (stub) {
|
|
877
|
+
const displayE = 'Error 400 received on request';
|
|
878
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
879
|
+
} else {
|
|
880
|
+
runCommonAsserts(data, error);
|
|
881
|
+
}
|
|
882
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminListGroupsForUser', 'adminListGroupsForUser', 'default', data);
|
|
883
|
+
done();
|
|
884
|
+
} catch (err) {
|
|
885
|
+
log.error(`Test Failure: ${err}`);
|
|
886
|
+
done(err);
|
|
887
|
+
}
|
|
888
|
+
});
|
|
889
|
+
} catch (error) {
|
|
890
|
+
log.error(`Adapter Exception: ${error}`);
|
|
891
|
+
done(error);
|
|
892
|
+
}
|
|
893
|
+
}).timeout(attemptTimeout);
|
|
894
|
+
});
|
|
895
|
+
|
|
896
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminListUserAuthEventsAdminListUserAuthEventsBodyParam = {};
|
|
897
|
+
describe('#adminListUserAuthEvents - errors', () => {
|
|
898
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
899
|
+
try {
|
|
900
|
+
a.adminListUserAuthEvents(null, null, xAmzTargetAWSCognitoIdentityProviderServiceAdminListUserAuthEventsAdminListUserAuthEventsBodyParam, null, (data, error) => {
|
|
901
|
+
try {
|
|
902
|
+
if (stub) {
|
|
903
|
+
const displayE = 'Error 400 received on request';
|
|
904
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
905
|
+
} else {
|
|
906
|
+
runCommonAsserts(data, error);
|
|
907
|
+
}
|
|
908
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminListUserAuthEvents', 'adminListUserAuthEvents', 'default', data);
|
|
909
|
+
done();
|
|
910
|
+
} catch (err) {
|
|
911
|
+
log.error(`Test Failure: ${err}`);
|
|
912
|
+
done(err);
|
|
913
|
+
}
|
|
914
|
+
});
|
|
915
|
+
} catch (error) {
|
|
916
|
+
log.error(`Adapter Exception: ${error}`);
|
|
917
|
+
done(error);
|
|
918
|
+
}
|
|
919
|
+
}).timeout(attemptTimeout);
|
|
920
|
+
});
|
|
921
|
+
|
|
922
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminRemoveUserFromGroupAdminRemoveUserFromGroupBodyParam = {};
|
|
923
|
+
describe('#adminRemoveUserFromGroup - errors', () => {
|
|
924
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
925
|
+
try {
|
|
926
|
+
a.adminRemoveUserFromGroup(xAmzTargetAWSCognitoIdentityProviderServiceAdminRemoveUserFromGroupAdminRemoveUserFromGroupBodyParam, null, (data, error) => {
|
|
927
|
+
try {
|
|
928
|
+
if (stub) {
|
|
929
|
+
const displayE = 'Error 400 received on request';
|
|
930
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
931
|
+
} else {
|
|
932
|
+
runCommonAsserts(data, error);
|
|
933
|
+
}
|
|
934
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminRemoveUserFromGroup', 'adminRemoveUserFromGroup', 'default', data);
|
|
935
|
+
done();
|
|
936
|
+
} catch (err) {
|
|
937
|
+
log.error(`Test Failure: ${err}`);
|
|
938
|
+
done(err);
|
|
939
|
+
}
|
|
940
|
+
});
|
|
941
|
+
} catch (error) {
|
|
942
|
+
log.error(`Adapter Exception: ${error}`);
|
|
943
|
+
done(error);
|
|
944
|
+
}
|
|
945
|
+
}).timeout(attemptTimeout);
|
|
946
|
+
});
|
|
947
|
+
|
|
948
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminResetUserPasswordAdminResetUserPasswordBodyParam = {};
|
|
949
|
+
describe('#adminResetUserPassword - errors', () => {
|
|
950
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
951
|
+
try {
|
|
952
|
+
a.adminResetUserPassword(xAmzTargetAWSCognitoIdentityProviderServiceAdminResetUserPasswordAdminResetUserPasswordBodyParam, null, (data, error) => {
|
|
953
|
+
try {
|
|
954
|
+
if (stub) {
|
|
955
|
+
const displayE = 'Error 400 received on request';
|
|
956
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
957
|
+
} else {
|
|
958
|
+
runCommonAsserts(data, error);
|
|
959
|
+
}
|
|
960
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminResetUserPassword', 'adminResetUserPassword', 'default', data);
|
|
961
|
+
done();
|
|
962
|
+
} catch (err) {
|
|
963
|
+
log.error(`Test Failure: ${err}`);
|
|
964
|
+
done(err);
|
|
965
|
+
}
|
|
966
|
+
});
|
|
967
|
+
} catch (error) {
|
|
968
|
+
log.error(`Adapter Exception: ${error}`);
|
|
969
|
+
done(error);
|
|
970
|
+
}
|
|
971
|
+
}).timeout(attemptTimeout);
|
|
972
|
+
});
|
|
973
|
+
|
|
974
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminRespondToAuthChallengeAdminRespondToAuthChallengeBodyParam = {};
|
|
975
|
+
describe('#adminRespondToAuthChallenge - errors', () => {
|
|
976
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
977
|
+
try {
|
|
978
|
+
a.adminRespondToAuthChallenge(xAmzTargetAWSCognitoIdentityProviderServiceAdminRespondToAuthChallengeAdminRespondToAuthChallengeBodyParam, null, (data, error) => {
|
|
979
|
+
try {
|
|
980
|
+
if (stub) {
|
|
981
|
+
const displayE = 'Error 400 received on request';
|
|
982
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
983
|
+
} else {
|
|
984
|
+
runCommonAsserts(data, error);
|
|
985
|
+
}
|
|
986
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminRespondToAuthChallenge', 'adminRespondToAuthChallenge', 'default', data);
|
|
987
|
+
done();
|
|
988
|
+
} catch (err) {
|
|
989
|
+
log.error(`Test Failure: ${err}`);
|
|
990
|
+
done(err);
|
|
991
|
+
}
|
|
992
|
+
});
|
|
993
|
+
} catch (error) {
|
|
994
|
+
log.error(`Adapter Exception: ${error}`);
|
|
995
|
+
done(error);
|
|
996
|
+
}
|
|
997
|
+
}).timeout(attemptTimeout);
|
|
998
|
+
});
|
|
999
|
+
|
|
1000
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserMFAPreferenceAdminSetUserMFAPreferenceBodyParam = {};
|
|
1001
|
+
describe('#adminSetUserMFAPreference - errors', () => {
|
|
1002
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1003
|
+
try {
|
|
1004
|
+
a.adminSetUserMFAPreference(xAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserMFAPreferenceAdminSetUserMFAPreferenceBodyParam, null, (data, error) => {
|
|
1005
|
+
try {
|
|
1006
|
+
if (stub) {
|
|
1007
|
+
const displayE = 'Error 400 received on request';
|
|
1008
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1009
|
+
} else {
|
|
1010
|
+
runCommonAsserts(data, error);
|
|
1011
|
+
}
|
|
1012
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserMFAPreference', 'adminSetUserMFAPreference', 'default', data);
|
|
1013
|
+
done();
|
|
1014
|
+
} catch (err) {
|
|
1015
|
+
log.error(`Test Failure: ${err}`);
|
|
1016
|
+
done(err);
|
|
1017
|
+
}
|
|
1018
|
+
});
|
|
1019
|
+
} catch (error) {
|
|
1020
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1021
|
+
done(error);
|
|
1022
|
+
}
|
|
1023
|
+
}).timeout(attemptTimeout);
|
|
1024
|
+
});
|
|
1025
|
+
|
|
1026
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserPasswordAdminSetUserPasswordBodyParam = {};
|
|
1027
|
+
describe('#adminSetUserPassword - errors', () => {
|
|
1028
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1029
|
+
try {
|
|
1030
|
+
a.adminSetUserPassword(xAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserPasswordAdminSetUserPasswordBodyParam, null, (data, error) => {
|
|
1031
|
+
try {
|
|
1032
|
+
if (stub) {
|
|
1033
|
+
const displayE = 'Error 400 received on request';
|
|
1034
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1035
|
+
} else {
|
|
1036
|
+
runCommonAsserts(data, error);
|
|
1037
|
+
}
|
|
1038
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserPassword', 'adminSetUserPassword', 'default', data);
|
|
1039
|
+
done();
|
|
1040
|
+
} catch (err) {
|
|
1041
|
+
log.error(`Test Failure: ${err}`);
|
|
1042
|
+
done(err);
|
|
1043
|
+
}
|
|
1044
|
+
});
|
|
1045
|
+
} catch (error) {
|
|
1046
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1047
|
+
done(error);
|
|
1048
|
+
}
|
|
1049
|
+
}).timeout(attemptTimeout);
|
|
1050
|
+
});
|
|
1051
|
+
|
|
1052
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserSettingsAdminSetUserSettingsBodyParam = {};
|
|
1053
|
+
describe('#adminSetUserSettings - errors', () => {
|
|
1054
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1055
|
+
try {
|
|
1056
|
+
a.adminSetUserSettings(xAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserSettingsAdminSetUserSettingsBodyParam, null, (data, error) => {
|
|
1057
|
+
try {
|
|
1058
|
+
if (stub) {
|
|
1059
|
+
const displayE = 'Error 400 received on request';
|
|
1060
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1061
|
+
} else {
|
|
1062
|
+
runCommonAsserts(data, error);
|
|
1063
|
+
}
|
|
1064
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminSetUserSettings', 'adminSetUserSettings', 'default', data);
|
|
1065
|
+
done();
|
|
1066
|
+
} catch (err) {
|
|
1067
|
+
log.error(`Test Failure: ${err}`);
|
|
1068
|
+
done(err);
|
|
1069
|
+
}
|
|
1070
|
+
});
|
|
1071
|
+
} catch (error) {
|
|
1072
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1073
|
+
done(error);
|
|
1074
|
+
}
|
|
1075
|
+
}).timeout(attemptTimeout);
|
|
1076
|
+
});
|
|
1077
|
+
|
|
1078
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateAuthEventFeedbackAdminUpdateAuthEventFeedbackBodyParam = {};
|
|
1079
|
+
describe('#adminUpdateAuthEventFeedback - errors', () => {
|
|
1080
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1081
|
+
try {
|
|
1082
|
+
a.adminUpdateAuthEventFeedback(xAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateAuthEventFeedbackAdminUpdateAuthEventFeedbackBodyParam, null, (data, error) => {
|
|
1083
|
+
try {
|
|
1084
|
+
if (stub) {
|
|
1085
|
+
const displayE = 'Error 400 received on request';
|
|
1086
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1087
|
+
} else {
|
|
1088
|
+
runCommonAsserts(data, error);
|
|
1089
|
+
}
|
|
1090
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateAuthEventFeedback', 'adminUpdateAuthEventFeedback', 'default', data);
|
|
1091
|
+
done();
|
|
1092
|
+
} catch (err) {
|
|
1093
|
+
log.error(`Test Failure: ${err}`);
|
|
1094
|
+
done(err);
|
|
1095
|
+
}
|
|
1096
|
+
});
|
|
1097
|
+
} catch (error) {
|
|
1098
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1099
|
+
done(error);
|
|
1100
|
+
}
|
|
1101
|
+
}).timeout(attemptTimeout);
|
|
1102
|
+
});
|
|
1103
|
+
|
|
1104
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateDeviceStatusAdminUpdateDeviceStatusBodyParam = {};
|
|
1105
|
+
describe('#adminUpdateDeviceStatus - errors', () => {
|
|
1106
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1107
|
+
try {
|
|
1108
|
+
a.adminUpdateDeviceStatus(xAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateDeviceStatusAdminUpdateDeviceStatusBodyParam, null, (data, error) => {
|
|
1109
|
+
try {
|
|
1110
|
+
if (stub) {
|
|
1111
|
+
const displayE = 'Error 400 received on request';
|
|
1112
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1113
|
+
} else {
|
|
1114
|
+
runCommonAsserts(data, error);
|
|
1115
|
+
}
|
|
1116
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateDeviceStatus', 'adminUpdateDeviceStatus', 'default', data);
|
|
1117
|
+
done();
|
|
1118
|
+
} catch (err) {
|
|
1119
|
+
log.error(`Test Failure: ${err}`);
|
|
1120
|
+
done(err);
|
|
1121
|
+
}
|
|
1122
|
+
});
|
|
1123
|
+
} catch (error) {
|
|
1124
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1125
|
+
done(error);
|
|
1126
|
+
}
|
|
1127
|
+
}).timeout(attemptTimeout);
|
|
1128
|
+
});
|
|
1129
|
+
|
|
1130
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateUserAttributesAdminUpdateUserAttributesBodyParam = {};
|
|
1131
|
+
describe('#adminUpdateUserAttributes - errors', () => {
|
|
1132
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1133
|
+
try {
|
|
1134
|
+
a.adminUpdateUserAttributes(xAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateUserAttributesAdminUpdateUserAttributesBodyParam, null, (data, error) => {
|
|
1135
|
+
try {
|
|
1136
|
+
if (stub) {
|
|
1137
|
+
const displayE = 'Error 400 received on request';
|
|
1138
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1139
|
+
} else {
|
|
1140
|
+
runCommonAsserts(data, error);
|
|
1141
|
+
}
|
|
1142
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminUpdateUserAttributes', 'adminUpdateUserAttributes', 'default', data);
|
|
1143
|
+
done();
|
|
1144
|
+
} catch (err) {
|
|
1145
|
+
log.error(`Test Failure: ${err}`);
|
|
1146
|
+
done(err);
|
|
1147
|
+
}
|
|
1148
|
+
});
|
|
1149
|
+
} catch (error) {
|
|
1150
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1151
|
+
done(error);
|
|
1152
|
+
}
|
|
1153
|
+
}).timeout(attemptTimeout);
|
|
1154
|
+
});
|
|
1155
|
+
|
|
1156
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAdminUserGlobalSignOutAdminUserGlobalSignOutBodyParam = {};
|
|
1157
|
+
describe('#adminUserGlobalSignOut - errors', () => {
|
|
1158
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1159
|
+
try {
|
|
1160
|
+
a.adminUserGlobalSignOut(xAmzTargetAWSCognitoIdentityProviderServiceAdminUserGlobalSignOutAdminUserGlobalSignOutBodyParam, null, (data, error) => {
|
|
1161
|
+
try {
|
|
1162
|
+
if (stub) {
|
|
1163
|
+
const displayE = 'Error 400 received on request';
|
|
1164
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1165
|
+
} else {
|
|
1166
|
+
runCommonAsserts(data, error);
|
|
1167
|
+
}
|
|
1168
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAdminUserGlobalSignOut', 'adminUserGlobalSignOut', 'default', data);
|
|
1169
|
+
done();
|
|
1170
|
+
} catch (err) {
|
|
1171
|
+
log.error(`Test Failure: ${err}`);
|
|
1172
|
+
done(err);
|
|
1173
|
+
}
|
|
1174
|
+
});
|
|
1175
|
+
} catch (error) {
|
|
1176
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1177
|
+
done(error);
|
|
1178
|
+
}
|
|
1179
|
+
}).timeout(attemptTimeout);
|
|
1180
|
+
});
|
|
1181
|
+
|
|
1182
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceAssociateSoftwareTokenAssociateSoftwareTokenBodyParam = {};
|
|
1183
|
+
describe('#associateSoftwareToken - errors', () => {
|
|
1184
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1185
|
+
try {
|
|
1186
|
+
a.associateSoftwareToken(xAmzTargetAWSCognitoIdentityProviderServiceAssociateSoftwareTokenAssociateSoftwareTokenBodyParam, null, (data, error) => {
|
|
1187
|
+
try {
|
|
1188
|
+
if (stub) {
|
|
1189
|
+
const displayE = 'Error 400 received on request';
|
|
1190
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1191
|
+
} else {
|
|
1192
|
+
runCommonAsserts(data, error);
|
|
1193
|
+
}
|
|
1194
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceAssociateSoftwareToken', 'associateSoftwareToken', 'default', data);
|
|
1195
|
+
done();
|
|
1196
|
+
} catch (err) {
|
|
1197
|
+
log.error(`Test Failure: ${err}`);
|
|
1198
|
+
done(err);
|
|
1199
|
+
}
|
|
1200
|
+
});
|
|
1201
|
+
} catch (error) {
|
|
1202
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1203
|
+
done(error);
|
|
1204
|
+
}
|
|
1205
|
+
}).timeout(attemptTimeout);
|
|
1206
|
+
});
|
|
1207
|
+
|
|
1208
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceChangePasswordChangePasswordBodyParam = {};
|
|
1209
|
+
describe('#changePassword - errors', () => {
|
|
1210
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1211
|
+
try {
|
|
1212
|
+
a.changePassword(xAmzTargetAWSCognitoIdentityProviderServiceChangePasswordChangePasswordBodyParam, null, (data, error) => {
|
|
1213
|
+
try {
|
|
1214
|
+
if (stub) {
|
|
1215
|
+
const displayE = 'Error 400 received on request';
|
|
1216
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1217
|
+
} else {
|
|
1218
|
+
runCommonAsserts(data, error);
|
|
1219
|
+
}
|
|
1220
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceChangePassword', 'changePassword', 'default', data);
|
|
1221
|
+
done();
|
|
1222
|
+
} catch (err) {
|
|
1223
|
+
log.error(`Test Failure: ${err}`);
|
|
1224
|
+
done(err);
|
|
1225
|
+
}
|
|
1226
|
+
});
|
|
1227
|
+
} catch (error) {
|
|
1228
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1229
|
+
done(error);
|
|
1230
|
+
}
|
|
1231
|
+
}).timeout(attemptTimeout);
|
|
1232
|
+
});
|
|
1233
|
+
|
|
1234
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceConfirmDeviceConfirmDeviceBodyParam = {};
|
|
1235
|
+
describe('#confirmDevice - errors', () => {
|
|
1236
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1237
|
+
try {
|
|
1238
|
+
a.confirmDevice(xAmzTargetAWSCognitoIdentityProviderServiceConfirmDeviceConfirmDeviceBodyParam, null, (data, error) => {
|
|
1239
|
+
try {
|
|
1240
|
+
if (stub) {
|
|
1241
|
+
const displayE = 'Error 400 received on request';
|
|
1242
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1243
|
+
} else {
|
|
1244
|
+
runCommonAsserts(data, error);
|
|
1245
|
+
}
|
|
1246
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceConfirmDevice', 'confirmDevice', 'default', data);
|
|
1247
|
+
done();
|
|
1248
|
+
} catch (err) {
|
|
1249
|
+
log.error(`Test Failure: ${err}`);
|
|
1250
|
+
done(err);
|
|
1251
|
+
}
|
|
1252
|
+
});
|
|
1253
|
+
} catch (error) {
|
|
1254
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1255
|
+
done(error);
|
|
1256
|
+
}
|
|
1257
|
+
}).timeout(attemptTimeout);
|
|
1258
|
+
});
|
|
1259
|
+
|
|
1260
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceConfirmForgotPasswordConfirmForgotPasswordBodyParam = {};
|
|
1261
|
+
describe('#confirmForgotPassword - errors', () => {
|
|
1262
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1263
|
+
try {
|
|
1264
|
+
a.confirmForgotPassword(xAmzTargetAWSCognitoIdentityProviderServiceConfirmForgotPasswordConfirmForgotPasswordBodyParam, null, (data, error) => {
|
|
1265
|
+
try {
|
|
1266
|
+
if (stub) {
|
|
1267
|
+
const displayE = 'Error 400 received on request';
|
|
1268
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1269
|
+
} else {
|
|
1270
|
+
runCommonAsserts(data, error);
|
|
1271
|
+
}
|
|
1272
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceConfirmForgotPassword', 'confirmForgotPassword', 'default', data);
|
|
1273
|
+
done();
|
|
1274
|
+
} catch (err) {
|
|
1275
|
+
log.error(`Test Failure: ${err}`);
|
|
1276
|
+
done(err);
|
|
1277
|
+
}
|
|
1278
|
+
});
|
|
1279
|
+
} catch (error) {
|
|
1280
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1281
|
+
done(error);
|
|
1282
|
+
}
|
|
1283
|
+
}).timeout(attemptTimeout);
|
|
1284
|
+
});
|
|
1285
|
+
|
|
1286
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceConfirmSignUpConfirmSignUpBodyParam = {};
|
|
1287
|
+
describe('#confirmSignUp - errors', () => {
|
|
1288
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1289
|
+
try {
|
|
1290
|
+
a.confirmSignUp(xAmzTargetAWSCognitoIdentityProviderServiceConfirmSignUpConfirmSignUpBodyParam, null, (data, error) => {
|
|
1291
|
+
try {
|
|
1292
|
+
if (stub) {
|
|
1293
|
+
const displayE = 'Error 400 received on request';
|
|
1294
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1295
|
+
} else {
|
|
1296
|
+
runCommonAsserts(data, error);
|
|
1297
|
+
}
|
|
1298
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceConfirmSignUp', 'confirmSignUp', 'default', data);
|
|
1299
|
+
done();
|
|
1300
|
+
} catch (err) {
|
|
1301
|
+
log.error(`Test Failure: ${err}`);
|
|
1302
|
+
done(err);
|
|
1303
|
+
}
|
|
1304
|
+
});
|
|
1305
|
+
} catch (error) {
|
|
1306
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1307
|
+
done(error);
|
|
1308
|
+
}
|
|
1309
|
+
}).timeout(attemptTimeout);
|
|
1310
|
+
});
|
|
1311
|
+
|
|
1312
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateGroupCreateGroupBodyParam = {};
|
|
1313
|
+
describe('#createGroup - errors', () => {
|
|
1314
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1315
|
+
try {
|
|
1316
|
+
a.createGroup(xAmzTargetAWSCognitoIdentityProviderServiceCreateGroupCreateGroupBodyParam, null, (data, error) => {
|
|
1317
|
+
try {
|
|
1318
|
+
if (stub) {
|
|
1319
|
+
const displayE = 'Error 400 received on request';
|
|
1320
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1321
|
+
} else {
|
|
1322
|
+
runCommonAsserts(data, error);
|
|
1323
|
+
}
|
|
1324
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateGroup', 'createGroup', 'default', data);
|
|
1325
|
+
done();
|
|
1326
|
+
} catch (err) {
|
|
1327
|
+
log.error(`Test Failure: ${err}`);
|
|
1328
|
+
done(err);
|
|
1329
|
+
}
|
|
1330
|
+
});
|
|
1331
|
+
} catch (error) {
|
|
1332
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1333
|
+
done(error);
|
|
1334
|
+
}
|
|
1335
|
+
}).timeout(attemptTimeout);
|
|
1336
|
+
});
|
|
1337
|
+
|
|
1338
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateIdentityProviderCreateIdentityProviderBodyParam = {};
|
|
1339
|
+
describe('#createIdentityProvider - errors', () => {
|
|
1340
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1341
|
+
try {
|
|
1342
|
+
a.createIdentityProvider(xAmzTargetAWSCognitoIdentityProviderServiceCreateIdentityProviderCreateIdentityProviderBodyParam, null, (data, error) => {
|
|
1343
|
+
try {
|
|
1344
|
+
if (stub) {
|
|
1345
|
+
const displayE = 'Error 400 received on request';
|
|
1346
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1347
|
+
} else {
|
|
1348
|
+
runCommonAsserts(data, error);
|
|
1349
|
+
}
|
|
1350
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateIdentityProvider', 'createIdentityProvider', 'default', data);
|
|
1351
|
+
done();
|
|
1352
|
+
} catch (err) {
|
|
1353
|
+
log.error(`Test Failure: ${err}`);
|
|
1354
|
+
done(err);
|
|
1355
|
+
}
|
|
1356
|
+
});
|
|
1357
|
+
} catch (error) {
|
|
1358
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1359
|
+
done(error);
|
|
1360
|
+
}
|
|
1361
|
+
}).timeout(attemptTimeout);
|
|
1362
|
+
});
|
|
1363
|
+
|
|
1364
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateResourceServerCreateResourceServerBodyParam = {};
|
|
1365
|
+
describe('#createResourceServer - errors', () => {
|
|
1366
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1367
|
+
try {
|
|
1368
|
+
a.createResourceServer(xAmzTargetAWSCognitoIdentityProviderServiceCreateResourceServerCreateResourceServerBodyParam, null, (data, error) => {
|
|
1369
|
+
try {
|
|
1370
|
+
if (stub) {
|
|
1371
|
+
const displayE = 'Error 400 received on request';
|
|
1372
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1373
|
+
} else {
|
|
1374
|
+
runCommonAsserts(data, error);
|
|
1375
|
+
}
|
|
1376
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateResourceServer', 'createResourceServer', 'default', data);
|
|
1377
|
+
done();
|
|
1378
|
+
} catch (err) {
|
|
1379
|
+
log.error(`Test Failure: ${err}`);
|
|
1380
|
+
done(err);
|
|
1381
|
+
}
|
|
1382
|
+
});
|
|
1383
|
+
} catch (error) {
|
|
1384
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1385
|
+
done(error);
|
|
1386
|
+
}
|
|
1387
|
+
}).timeout(attemptTimeout);
|
|
1388
|
+
});
|
|
1389
|
+
|
|
1390
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateUserImportJobCreateUserImportJobBodyParam = {};
|
|
1391
|
+
describe('#createUserImportJob - errors', () => {
|
|
1392
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1393
|
+
try {
|
|
1394
|
+
a.createUserImportJob(xAmzTargetAWSCognitoIdentityProviderServiceCreateUserImportJobCreateUserImportJobBodyParam, null, (data, error) => {
|
|
1395
|
+
try {
|
|
1396
|
+
if (stub) {
|
|
1397
|
+
const displayE = 'Error 400 received on request';
|
|
1398
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1399
|
+
} else {
|
|
1400
|
+
runCommonAsserts(data, error);
|
|
1401
|
+
}
|
|
1402
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateUserImportJob', 'createUserImportJob', 'default', data);
|
|
1403
|
+
done();
|
|
1404
|
+
} catch (err) {
|
|
1405
|
+
log.error(`Test Failure: ${err}`);
|
|
1406
|
+
done(err);
|
|
1407
|
+
}
|
|
1408
|
+
});
|
|
1409
|
+
} catch (error) {
|
|
1410
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1411
|
+
done(error);
|
|
1412
|
+
}
|
|
1413
|
+
}).timeout(attemptTimeout);
|
|
1414
|
+
});
|
|
1415
|
+
|
|
1416
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolCreateUserPoolBodyParam = {};
|
|
1417
|
+
describe('#createUserPool - errors', () => {
|
|
1418
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1419
|
+
try {
|
|
1420
|
+
a.createUserPool(xAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolCreateUserPoolBodyParam, null, (data, error) => {
|
|
1421
|
+
try {
|
|
1422
|
+
if (stub) {
|
|
1423
|
+
const displayE = 'Error 400 received on request';
|
|
1424
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1425
|
+
} else {
|
|
1426
|
+
runCommonAsserts(data, error);
|
|
1427
|
+
}
|
|
1428
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPool', 'createUserPool', 'default', data);
|
|
1429
|
+
done();
|
|
1430
|
+
} catch (err) {
|
|
1431
|
+
log.error(`Test Failure: ${err}`);
|
|
1432
|
+
done(err);
|
|
1433
|
+
}
|
|
1434
|
+
});
|
|
1435
|
+
} catch (error) {
|
|
1436
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1437
|
+
done(error);
|
|
1438
|
+
}
|
|
1439
|
+
}).timeout(attemptTimeout);
|
|
1440
|
+
});
|
|
1441
|
+
|
|
1442
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolClientCreateUserPoolClientBodyParam = {};
|
|
1443
|
+
describe('#createUserPoolClient - errors', () => {
|
|
1444
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1445
|
+
try {
|
|
1446
|
+
a.createUserPoolClient(xAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolClientCreateUserPoolClientBodyParam, null, (data, error) => {
|
|
1447
|
+
try {
|
|
1448
|
+
if (stub) {
|
|
1449
|
+
const displayE = 'Error 400 received on request';
|
|
1450
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1451
|
+
} else {
|
|
1452
|
+
runCommonAsserts(data, error);
|
|
1453
|
+
}
|
|
1454
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolClient', 'createUserPoolClient', 'default', data);
|
|
1455
|
+
done();
|
|
1456
|
+
} catch (err) {
|
|
1457
|
+
log.error(`Test Failure: ${err}`);
|
|
1458
|
+
done(err);
|
|
1459
|
+
}
|
|
1460
|
+
});
|
|
1461
|
+
} catch (error) {
|
|
1462
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1463
|
+
done(error);
|
|
1464
|
+
}
|
|
1465
|
+
}).timeout(attemptTimeout);
|
|
1466
|
+
});
|
|
1467
|
+
|
|
1468
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolDomainCreateUserPoolDomainBodyParam = {};
|
|
1469
|
+
describe('#createUserPoolDomain - errors', () => {
|
|
1470
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1471
|
+
try {
|
|
1472
|
+
a.createUserPoolDomain(xAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolDomainCreateUserPoolDomainBodyParam, null, (data, error) => {
|
|
1473
|
+
try {
|
|
1474
|
+
if (stub) {
|
|
1475
|
+
const displayE = 'Error 400 received on request';
|
|
1476
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1477
|
+
} else {
|
|
1478
|
+
runCommonAsserts(data, error);
|
|
1479
|
+
}
|
|
1480
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceCreateUserPoolDomain', 'createUserPoolDomain', 'default', data);
|
|
1481
|
+
done();
|
|
1482
|
+
} catch (err) {
|
|
1483
|
+
log.error(`Test Failure: ${err}`);
|
|
1484
|
+
done(err);
|
|
1485
|
+
}
|
|
1486
|
+
});
|
|
1487
|
+
} catch (error) {
|
|
1488
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1489
|
+
done(error);
|
|
1490
|
+
}
|
|
1491
|
+
}).timeout(attemptTimeout);
|
|
1492
|
+
});
|
|
1493
|
+
|
|
1494
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteGroupDeleteGroupBodyParam = {};
|
|
1495
|
+
describe('#deleteGroup - errors', () => {
|
|
1496
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1497
|
+
try {
|
|
1498
|
+
a.deleteGroup(xAmzTargetAWSCognitoIdentityProviderServiceDeleteGroupDeleteGroupBodyParam, null, (data, error) => {
|
|
1499
|
+
try {
|
|
1500
|
+
if (stub) {
|
|
1501
|
+
const displayE = 'Error 400 received on request';
|
|
1502
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1503
|
+
} else {
|
|
1504
|
+
runCommonAsserts(data, error);
|
|
1505
|
+
}
|
|
1506
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteGroup', 'deleteGroup', 'default', data);
|
|
1507
|
+
done();
|
|
1508
|
+
} catch (err) {
|
|
1509
|
+
log.error(`Test Failure: ${err}`);
|
|
1510
|
+
done(err);
|
|
1511
|
+
}
|
|
1512
|
+
});
|
|
1513
|
+
} catch (error) {
|
|
1514
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1515
|
+
done(error);
|
|
1516
|
+
}
|
|
1517
|
+
}).timeout(attemptTimeout);
|
|
1518
|
+
});
|
|
1519
|
+
|
|
1520
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteIdentityProviderDeleteIdentityProviderBodyParam = {};
|
|
1521
|
+
describe('#deleteIdentityProvider - errors', () => {
|
|
1522
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1523
|
+
try {
|
|
1524
|
+
a.deleteIdentityProvider(xAmzTargetAWSCognitoIdentityProviderServiceDeleteIdentityProviderDeleteIdentityProviderBodyParam, null, (data, error) => {
|
|
1525
|
+
try {
|
|
1526
|
+
if (stub) {
|
|
1527
|
+
const displayE = 'Error 400 received on request';
|
|
1528
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1529
|
+
} else {
|
|
1530
|
+
runCommonAsserts(data, error);
|
|
1531
|
+
}
|
|
1532
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteIdentityProvider', 'deleteIdentityProvider', 'default', data);
|
|
1533
|
+
done();
|
|
1534
|
+
} catch (err) {
|
|
1535
|
+
log.error(`Test Failure: ${err}`);
|
|
1536
|
+
done(err);
|
|
1537
|
+
}
|
|
1538
|
+
});
|
|
1539
|
+
} catch (error) {
|
|
1540
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1541
|
+
done(error);
|
|
1542
|
+
}
|
|
1543
|
+
}).timeout(attemptTimeout);
|
|
1544
|
+
});
|
|
1545
|
+
|
|
1546
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteResourceServerDeleteResourceServerBodyParam = {};
|
|
1547
|
+
describe('#deleteResourceServer - errors', () => {
|
|
1548
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1549
|
+
try {
|
|
1550
|
+
a.deleteResourceServer(xAmzTargetAWSCognitoIdentityProviderServiceDeleteResourceServerDeleteResourceServerBodyParam, null, (data, error) => {
|
|
1551
|
+
try {
|
|
1552
|
+
if (stub) {
|
|
1553
|
+
const displayE = 'Error 400 received on request';
|
|
1554
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1555
|
+
} else {
|
|
1556
|
+
runCommonAsserts(data, error);
|
|
1557
|
+
}
|
|
1558
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteResourceServer', 'deleteResourceServer', 'default', data);
|
|
1559
|
+
done();
|
|
1560
|
+
} catch (err) {
|
|
1561
|
+
log.error(`Test Failure: ${err}`);
|
|
1562
|
+
done(err);
|
|
1563
|
+
}
|
|
1564
|
+
});
|
|
1565
|
+
} catch (error) {
|
|
1566
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1567
|
+
done(error);
|
|
1568
|
+
}
|
|
1569
|
+
}).timeout(attemptTimeout);
|
|
1570
|
+
});
|
|
1571
|
+
|
|
1572
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserDeleteUserBodyParam = {};
|
|
1573
|
+
describe('#deleteUser - errors', () => {
|
|
1574
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1575
|
+
try {
|
|
1576
|
+
a.deleteUser(xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserDeleteUserBodyParam, null, (data, error) => {
|
|
1577
|
+
try {
|
|
1578
|
+
if (stub) {
|
|
1579
|
+
const displayE = 'Error 400 received on request';
|
|
1580
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1581
|
+
} else {
|
|
1582
|
+
runCommonAsserts(data, error);
|
|
1583
|
+
}
|
|
1584
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteUser', 'deleteUser', 'default', data);
|
|
1585
|
+
done();
|
|
1586
|
+
} catch (err) {
|
|
1587
|
+
log.error(`Test Failure: ${err}`);
|
|
1588
|
+
done(err);
|
|
1589
|
+
}
|
|
1590
|
+
});
|
|
1591
|
+
} catch (error) {
|
|
1592
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1593
|
+
done(error);
|
|
1594
|
+
}
|
|
1595
|
+
}).timeout(attemptTimeout);
|
|
1596
|
+
});
|
|
1597
|
+
|
|
1598
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserAttributesDeleteUserAttributesBodyParam = {};
|
|
1599
|
+
describe('#deleteUserAttributes - errors', () => {
|
|
1600
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1601
|
+
try {
|
|
1602
|
+
a.deleteUserAttributes(xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserAttributesDeleteUserAttributesBodyParam, null, (data, error) => {
|
|
1603
|
+
try {
|
|
1604
|
+
if (stub) {
|
|
1605
|
+
const displayE = 'Error 400 received on request';
|
|
1606
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1607
|
+
} else {
|
|
1608
|
+
runCommonAsserts(data, error);
|
|
1609
|
+
}
|
|
1610
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserAttributes', 'deleteUserAttributes', 'default', data);
|
|
1611
|
+
done();
|
|
1612
|
+
} catch (err) {
|
|
1613
|
+
log.error(`Test Failure: ${err}`);
|
|
1614
|
+
done(err);
|
|
1615
|
+
}
|
|
1616
|
+
});
|
|
1617
|
+
} catch (error) {
|
|
1618
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1619
|
+
done(error);
|
|
1620
|
+
}
|
|
1621
|
+
}).timeout(attemptTimeout);
|
|
1622
|
+
});
|
|
1623
|
+
|
|
1624
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDeleteUserPoolBodyParam = {};
|
|
1625
|
+
describe('#deleteUserPool - errors', () => {
|
|
1626
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1627
|
+
try {
|
|
1628
|
+
a.deleteUserPool(xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDeleteUserPoolBodyParam, null, (data, error) => {
|
|
1629
|
+
try {
|
|
1630
|
+
if (stub) {
|
|
1631
|
+
const displayE = 'Error 400 received on request';
|
|
1632
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1633
|
+
} else {
|
|
1634
|
+
runCommonAsserts(data, error);
|
|
1635
|
+
}
|
|
1636
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPool', 'deleteUserPool', 'default', data);
|
|
1637
|
+
done();
|
|
1638
|
+
} catch (err) {
|
|
1639
|
+
log.error(`Test Failure: ${err}`);
|
|
1640
|
+
done(err);
|
|
1641
|
+
}
|
|
1642
|
+
});
|
|
1643
|
+
} catch (error) {
|
|
1644
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1645
|
+
done(error);
|
|
1646
|
+
}
|
|
1647
|
+
}).timeout(attemptTimeout);
|
|
1648
|
+
});
|
|
1649
|
+
|
|
1650
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolClientDeleteUserPoolClientBodyParam = {};
|
|
1651
|
+
describe('#deleteUserPoolClient - errors', () => {
|
|
1652
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1653
|
+
try {
|
|
1654
|
+
a.deleteUserPoolClient(xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolClientDeleteUserPoolClientBodyParam, null, (data, error) => {
|
|
1655
|
+
try {
|
|
1656
|
+
if (stub) {
|
|
1657
|
+
const displayE = 'Error 400 received on request';
|
|
1658
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1659
|
+
} else {
|
|
1660
|
+
runCommonAsserts(data, error);
|
|
1661
|
+
}
|
|
1662
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolClient', 'deleteUserPoolClient', 'default', data);
|
|
1663
|
+
done();
|
|
1664
|
+
} catch (err) {
|
|
1665
|
+
log.error(`Test Failure: ${err}`);
|
|
1666
|
+
done(err);
|
|
1667
|
+
}
|
|
1668
|
+
});
|
|
1669
|
+
} catch (error) {
|
|
1670
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1671
|
+
done(error);
|
|
1672
|
+
}
|
|
1673
|
+
}).timeout(attemptTimeout);
|
|
1674
|
+
});
|
|
1675
|
+
|
|
1676
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDomainDeleteUserPoolDomainBodyParam = {};
|
|
1677
|
+
describe('#deleteUserPoolDomain - errors', () => {
|
|
1678
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1679
|
+
try {
|
|
1680
|
+
a.deleteUserPoolDomain(xAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDomainDeleteUserPoolDomainBodyParam, null, (data, error) => {
|
|
1681
|
+
try {
|
|
1682
|
+
if (stub) {
|
|
1683
|
+
const displayE = 'Error 400 received on request';
|
|
1684
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1685
|
+
} else {
|
|
1686
|
+
runCommonAsserts(data, error);
|
|
1687
|
+
}
|
|
1688
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDeleteUserPoolDomain', 'deleteUserPoolDomain', 'default', data);
|
|
1689
|
+
done();
|
|
1690
|
+
} catch (err) {
|
|
1691
|
+
log.error(`Test Failure: ${err}`);
|
|
1692
|
+
done(err);
|
|
1693
|
+
}
|
|
1694
|
+
});
|
|
1695
|
+
} catch (error) {
|
|
1696
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1697
|
+
done(error);
|
|
1698
|
+
}
|
|
1699
|
+
}).timeout(attemptTimeout);
|
|
1700
|
+
});
|
|
1701
|
+
|
|
1702
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeIdentityProviderDescribeIdentityProviderBodyParam = {};
|
|
1703
|
+
describe('#describeIdentityProvider - errors', () => {
|
|
1704
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1705
|
+
try {
|
|
1706
|
+
a.describeIdentityProvider(xAmzTargetAWSCognitoIdentityProviderServiceDescribeIdentityProviderDescribeIdentityProviderBodyParam, null, (data, error) => {
|
|
1707
|
+
try {
|
|
1708
|
+
if (stub) {
|
|
1709
|
+
const displayE = 'Error 400 received on request';
|
|
1710
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1711
|
+
} else {
|
|
1712
|
+
runCommonAsserts(data, error);
|
|
1713
|
+
}
|
|
1714
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeIdentityProvider', 'describeIdentityProvider', 'default', data);
|
|
1715
|
+
done();
|
|
1716
|
+
} catch (err) {
|
|
1717
|
+
log.error(`Test Failure: ${err}`);
|
|
1718
|
+
done(err);
|
|
1719
|
+
}
|
|
1720
|
+
});
|
|
1721
|
+
} catch (error) {
|
|
1722
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1723
|
+
done(error);
|
|
1724
|
+
}
|
|
1725
|
+
}).timeout(attemptTimeout);
|
|
1726
|
+
});
|
|
1727
|
+
|
|
1728
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeResourceServerDescribeResourceServerBodyParam = {};
|
|
1729
|
+
describe('#describeResourceServer - errors', () => {
|
|
1730
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1731
|
+
try {
|
|
1732
|
+
a.describeResourceServer(xAmzTargetAWSCognitoIdentityProviderServiceDescribeResourceServerDescribeResourceServerBodyParam, null, (data, error) => {
|
|
1733
|
+
try {
|
|
1734
|
+
if (stub) {
|
|
1735
|
+
const displayE = 'Error 400 received on request';
|
|
1736
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1737
|
+
} else {
|
|
1738
|
+
runCommonAsserts(data, error);
|
|
1739
|
+
}
|
|
1740
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeResourceServer', 'describeResourceServer', 'default', data);
|
|
1741
|
+
done();
|
|
1742
|
+
} catch (err) {
|
|
1743
|
+
log.error(`Test Failure: ${err}`);
|
|
1744
|
+
done(err);
|
|
1745
|
+
}
|
|
1746
|
+
});
|
|
1747
|
+
} catch (error) {
|
|
1748
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1749
|
+
done(error);
|
|
1750
|
+
}
|
|
1751
|
+
}).timeout(attemptTimeout);
|
|
1752
|
+
});
|
|
1753
|
+
|
|
1754
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeRiskConfigurationDescribeRiskConfigurationBodyParam = {};
|
|
1755
|
+
describe('#describeRiskConfiguration - errors', () => {
|
|
1756
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1757
|
+
try {
|
|
1758
|
+
a.describeRiskConfiguration(xAmzTargetAWSCognitoIdentityProviderServiceDescribeRiskConfigurationDescribeRiskConfigurationBodyParam, null, (data, error) => {
|
|
1759
|
+
try {
|
|
1760
|
+
if (stub) {
|
|
1761
|
+
const displayE = 'Error 400 received on request';
|
|
1762
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1763
|
+
} else {
|
|
1764
|
+
runCommonAsserts(data, error);
|
|
1765
|
+
}
|
|
1766
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeRiskConfiguration', 'describeRiskConfiguration', 'default', data);
|
|
1767
|
+
done();
|
|
1768
|
+
} catch (err) {
|
|
1769
|
+
log.error(`Test Failure: ${err}`);
|
|
1770
|
+
done(err);
|
|
1771
|
+
}
|
|
1772
|
+
});
|
|
1773
|
+
} catch (error) {
|
|
1774
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1775
|
+
done(error);
|
|
1776
|
+
}
|
|
1777
|
+
}).timeout(attemptTimeout);
|
|
1778
|
+
});
|
|
1779
|
+
|
|
1780
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserImportJobDescribeUserImportJobBodyParam = {};
|
|
1781
|
+
describe('#describeUserImportJob - errors', () => {
|
|
1782
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1783
|
+
try {
|
|
1784
|
+
a.describeUserImportJob(xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserImportJobDescribeUserImportJobBodyParam, null, (data, error) => {
|
|
1785
|
+
try {
|
|
1786
|
+
if (stub) {
|
|
1787
|
+
const displayE = 'Error 400 received on request';
|
|
1788
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1789
|
+
} else {
|
|
1790
|
+
runCommonAsserts(data, error);
|
|
1791
|
+
}
|
|
1792
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserImportJob', 'describeUserImportJob', 'default', data);
|
|
1793
|
+
done();
|
|
1794
|
+
} catch (err) {
|
|
1795
|
+
log.error(`Test Failure: ${err}`);
|
|
1796
|
+
done(err);
|
|
1797
|
+
}
|
|
1798
|
+
});
|
|
1799
|
+
} catch (error) {
|
|
1800
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1801
|
+
done(error);
|
|
1802
|
+
}
|
|
1803
|
+
}).timeout(attemptTimeout);
|
|
1804
|
+
});
|
|
1805
|
+
|
|
1806
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDescribeUserPoolBodyParam = {};
|
|
1807
|
+
describe('#describeUserPool - errors', () => {
|
|
1808
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1809
|
+
try {
|
|
1810
|
+
a.describeUserPool(xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDescribeUserPoolBodyParam, null, (data, error) => {
|
|
1811
|
+
try {
|
|
1812
|
+
if (stub) {
|
|
1813
|
+
const displayE = 'Error 400 received on request';
|
|
1814
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1815
|
+
} else {
|
|
1816
|
+
runCommonAsserts(data, error);
|
|
1817
|
+
}
|
|
1818
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPool', 'describeUserPool', 'default', data);
|
|
1819
|
+
done();
|
|
1820
|
+
} catch (err) {
|
|
1821
|
+
log.error(`Test Failure: ${err}`);
|
|
1822
|
+
done(err);
|
|
1823
|
+
}
|
|
1824
|
+
});
|
|
1825
|
+
} catch (error) {
|
|
1826
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1827
|
+
done(error);
|
|
1828
|
+
}
|
|
1829
|
+
}).timeout(attemptTimeout);
|
|
1830
|
+
});
|
|
1831
|
+
|
|
1832
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolClientDescribeUserPoolClientBodyParam = {};
|
|
1833
|
+
describe('#describeUserPoolClient - errors', () => {
|
|
1834
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1835
|
+
try {
|
|
1836
|
+
a.describeUserPoolClient(xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolClientDescribeUserPoolClientBodyParam, null, (data, error) => {
|
|
1837
|
+
try {
|
|
1838
|
+
if (stub) {
|
|
1839
|
+
const displayE = 'Error 400 received on request';
|
|
1840
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1841
|
+
} else {
|
|
1842
|
+
runCommonAsserts(data, error);
|
|
1843
|
+
}
|
|
1844
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolClient', 'describeUserPoolClient', 'default', data);
|
|
1845
|
+
done();
|
|
1846
|
+
} catch (err) {
|
|
1847
|
+
log.error(`Test Failure: ${err}`);
|
|
1848
|
+
done(err);
|
|
1849
|
+
}
|
|
1850
|
+
});
|
|
1851
|
+
} catch (error) {
|
|
1852
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1853
|
+
done(error);
|
|
1854
|
+
}
|
|
1855
|
+
}).timeout(attemptTimeout);
|
|
1856
|
+
});
|
|
1857
|
+
|
|
1858
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDomainDescribeUserPoolDomainBodyParam = {};
|
|
1859
|
+
describe('#describeUserPoolDomain - errors', () => {
|
|
1860
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1861
|
+
try {
|
|
1862
|
+
a.describeUserPoolDomain(xAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDomainDescribeUserPoolDomainBodyParam, null, (data, error) => {
|
|
1863
|
+
try {
|
|
1864
|
+
if (stub) {
|
|
1865
|
+
const displayE = 'Error 400 received on request';
|
|
1866
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1867
|
+
} else {
|
|
1868
|
+
runCommonAsserts(data, error);
|
|
1869
|
+
}
|
|
1870
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceDescribeUserPoolDomain', 'describeUserPoolDomain', 'default', data);
|
|
1871
|
+
done();
|
|
1872
|
+
} catch (err) {
|
|
1873
|
+
log.error(`Test Failure: ${err}`);
|
|
1874
|
+
done(err);
|
|
1875
|
+
}
|
|
1876
|
+
});
|
|
1877
|
+
} catch (error) {
|
|
1878
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1879
|
+
done(error);
|
|
1880
|
+
}
|
|
1881
|
+
}).timeout(attemptTimeout);
|
|
1882
|
+
});
|
|
1883
|
+
|
|
1884
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceForgetDeviceForgetDeviceBodyParam = {};
|
|
1885
|
+
describe('#forgetDevice - errors', () => {
|
|
1886
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1887
|
+
try {
|
|
1888
|
+
a.forgetDevice(xAmzTargetAWSCognitoIdentityProviderServiceForgetDeviceForgetDeviceBodyParam, null, (data, error) => {
|
|
1889
|
+
try {
|
|
1890
|
+
if (stub) {
|
|
1891
|
+
const displayE = 'Error 400 received on request';
|
|
1892
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1893
|
+
} else {
|
|
1894
|
+
runCommonAsserts(data, error);
|
|
1895
|
+
}
|
|
1896
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceForgetDevice', 'forgetDevice', 'default', data);
|
|
1897
|
+
done();
|
|
1898
|
+
} catch (err) {
|
|
1899
|
+
log.error(`Test Failure: ${err}`);
|
|
1900
|
+
done(err);
|
|
1901
|
+
}
|
|
1902
|
+
});
|
|
1903
|
+
} catch (error) {
|
|
1904
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1905
|
+
done(error);
|
|
1906
|
+
}
|
|
1907
|
+
}).timeout(attemptTimeout);
|
|
1908
|
+
});
|
|
1909
|
+
|
|
1910
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceForgotPasswordForgotPasswordBodyParam = {};
|
|
1911
|
+
describe('#forgotPassword - errors', () => {
|
|
1912
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1913
|
+
try {
|
|
1914
|
+
a.forgotPassword(xAmzTargetAWSCognitoIdentityProviderServiceForgotPasswordForgotPasswordBodyParam, null, (data, error) => {
|
|
1915
|
+
try {
|
|
1916
|
+
if (stub) {
|
|
1917
|
+
const displayE = 'Error 400 received on request';
|
|
1918
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1919
|
+
} else {
|
|
1920
|
+
runCommonAsserts(data, error);
|
|
1921
|
+
}
|
|
1922
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceForgotPassword', 'forgotPassword', 'default', data);
|
|
1923
|
+
done();
|
|
1924
|
+
} catch (err) {
|
|
1925
|
+
log.error(`Test Failure: ${err}`);
|
|
1926
|
+
done(err);
|
|
1927
|
+
}
|
|
1928
|
+
});
|
|
1929
|
+
} catch (error) {
|
|
1930
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1931
|
+
done(error);
|
|
1932
|
+
}
|
|
1933
|
+
}).timeout(attemptTimeout);
|
|
1934
|
+
});
|
|
1935
|
+
|
|
1936
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetCSVHeaderGetCSVHeaderBodyParam = {};
|
|
1937
|
+
describe('#getCSVHeader - errors', () => {
|
|
1938
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1939
|
+
try {
|
|
1940
|
+
a.getCSVHeader(xAmzTargetAWSCognitoIdentityProviderServiceGetCSVHeaderGetCSVHeaderBodyParam, null, (data, error) => {
|
|
1941
|
+
try {
|
|
1942
|
+
if (stub) {
|
|
1943
|
+
const displayE = 'Error 400 received on request';
|
|
1944
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1945
|
+
} else {
|
|
1946
|
+
runCommonAsserts(data, error);
|
|
1947
|
+
}
|
|
1948
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetCSVHeader', 'getCSVHeader', 'default', data);
|
|
1949
|
+
done();
|
|
1950
|
+
} catch (err) {
|
|
1951
|
+
log.error(`Test Failure: ${err}`);
|
|
1952
|
+
done(err);
|
|
1953
|
+
}
|
|
1954
|
+
});
|
|
1955
|
+
} catch (error) {
|
|
1956
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1957
|
+
done(error);
|
|
1958
|
+
}
|
|
1959
|
+
}).timeout(attemptTimeout);
|
|
1960
|
+
});
|
|
1961
|
+
|
|
1962
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetDeviceGetDeviceBodyParam = {};
|
|
1963
|
+
describe('#getCognitoDevice - errors', () => {
|
|
1964
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1965
|
+
try {
|
|
1966
|
+
a.getCognitoDevice(xAmzTargetAWSCognitoIdentityProviderServiceGetDeviceGetDeviceBodyParam, null, (data, error) => {
|
|
1967
|
+
try {
|
|
1968
|
+
if (stub) {
|
|
1969
|
+
const displayE = 'Error 400 received on request';
|
|
1970
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1971
|
+
} else {
|
|
1972
|
+
runCommonAsserts(data, error);
|
|
1973
|
+
}
|
|
1974
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetDevice', 'getDevice', 'default', data);
|
|
1975
|
+
done();
|
|
1976
|
+
} catch (err) {
|
|
1977
|
+
log.error(`Test Failure: ${err}`);
|
|
1978
|
+
done(err);
|
|
1979
|
+
}
|
|
1980
|
+
});
|
|
1981
|
+
} catch (error) {
|
|
1982
|
+
log.error(`Adapter Exception: ${error}`);
|
|
1983
|
+
done(error);
|
|
1984
|
+
}
|
|
1985
|
+
}).timeout(attemptTimeout);
|
|
1986
|
+
});
|
|
1987
|
+
|
|
1988
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetGroupGetGroupBodyParam = {};
|
|
1989
|
+
describe('#getGroup - errors', () => {
|
|
1990
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
1991
|
+
try {
|
|
1992
|
+
a.getGroup(xAmzTargetAWSCognitoIdentityProviderServiceGetGroupGetGroupBodyParam, null, (data, error) => {
|
|
1993
|
+
try {
|
|
1994
|
+
if (stub) {
|
|
1995
|
+
const displayE = 'Error 400 received on request';
|
|
1996
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
1997
|
+
} else {
|
|
1998
|
+
runCommonAsserts(data, error);
|
|
1999
|
+
}
|
|
2000
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetGroup', 'getGroup', 'default', data);
|
|
2001
|
+
done();
|
|
2002
|
+
} catch (err) {
|
|
2003
|
+
log.error(`Test Failure: ${err}`);
|
|
2004
|
+
done(err);
|
|
2005
|
+
}
|
|
2006
|
+
});
|
|
2007
|
+
} catch (error) {
|
|
2008
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2009
|
+
done(error);
|
|
2010
|
+
}
|
|
2011
|
+
}).timeout(attemptTimeout);
|
|
2012
|
+
});
|
|
2013
|
+
|
|
2014
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetIdentityProviderByIdentifierGetIdentityProviderByIdentifierBodyParam = {};
|
|
2015
|
+
describe('#getIdentityProviderByIdentifier - errors', () => {
|
|
2016
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2017
|
+
try {
|
|
2018
|
+
a.getIdentityProviderByIdentifier(xAmzTargetAWSCognitoIdentityProviderServiceGetIdentityProviderByIdentifierGetIdentityProviderByIdentifierBodyParam, null, (data, error) => {
|
|
2019
|
+
try {
|
|
2020
|
+
if (stub) {
|
|
2021
|
+
const displayE = 'Error 400 received on request';
|
|
2022
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2023
|
+
} else {
|
|
2024
|
+
runCommonAsserts(data, error);
|
|
2025
|
+
}
|
|
2026
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetIdentityProviderByIdentifier', 'getIdentityProviderByIdentifier', 'default', data);
|
|
2027
|
+
done();
|
|
2028
|
+
} catch (err) {
|
|
2029
|
+
log.error(`Test Failure: ${err}`);
|
|
2030
|
+
done(err);
|
|
2031
|
+
}
|
|
2032
|
+
});
|
|
2033
|
+
} catch (error) {
|
|
2034
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2035
|
+
done(error);
|
|
2036
|
+
}
|
|
2037
|
+
}).timeout(attemptTimeout);
|
|
2038
|
+
});
|
|
2039
|
+
|
|
2040
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetSigningCertificateGetSigningCertificateBodyParam = {};
|
|
2041
|
+
describe('#getSigningCertificate - errors', () => {
|
|
2042
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2043
|
+
try {
|
|
2044
|
+
a.getSigningCertificate(xAmzTargetAWSCognitoIdentityProviderServiceGetSigningCertificateGetSigningCertificateBodyParam, null, (data, error) => {
|
|
2045
|
+
try {
|
|
2046
|
+
if (stub) {
|
|
2047
|
+
const displayE = 'Error 400 received on request';
|
|
2048
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2049
|
+
} else {
|
|
2050
|
+
runCommonAsserts(data, error);
|
|
2051
|
+
}
|
|
2052
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetSigningCertificate', 'getSigningCertificate', 'default', data);
|
|
2053
|
+
done();
|
|
2054
|
+
} catch (err) {
|
|
2055
|
+
log.error(`Test Failure: ${err}`);
|
|
2056
|
+
done(err);
|
|
2057
|
+
}
|
|
2058
|
+
});
|
|
2059
|
+
} catch (error) {
|
|
2060
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2061
|
+
done(error);
|
|
2062
|
+
}
|
|
2063
|
+
}).timeout(attemptTimeout);
|
|
2064
|
+
});
|
|
2065
|
+
|
|
2066
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetUICustomizationGetUICustomizationBodyParam = {};
|
|
2067
|
+
describe('#getUICustomization - errors', () => {
|
|
2068
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2069
|
+
try {
|
|
2070
|
+
a.getUICustomization(xAmzTargetAWSCognitoIdentityProviderServiceGetUICustomizationGetUICustomizationBodyParam, null, (data, error) => {
|
|
2071
|
+
try {
|
|
2072
|
+
if (stub) {
|
|
2073
|
+
const displayE = 'Error 400 received on request';
|
|
2074
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2075
|
+
} else {
|
|
2076
|
+
runCommonAsserts(data, error);
|
|
2077
|
+
}
|
|
2078
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetUICustomization', 'getUICustomization', 'default', data);
|
|
2079
|
+
done();
|
|
2080
|
+
} catch (err) {
|
|
2081
|
+
log.error(`Test Failure: ${err}`);
|
|
2082
|
+
done(err);
|
|
2083
|
+
}
|
|
2084
|
+
});
|
|
2085
|
+
} catch (error) {
|
|
2086
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2087
|
+
done(error);
|
|
2088
|
+
}
|
|
2089
|
+
}).timeout(attemptTimeout);
|
|
2090
|
+
});
|
|
2091
|
+
|
|
2092
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetUserGetUserBodyParam = {};
|
|
2093
|
+
describe('#getUser - errors', () => {
|
|
2094
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2095
|
+
try {
|
|
2096
|
+
a.getUser(xAmzTargetAWSCognitoIdentityProviderServiceGetUserGetUserBodyParam, null, (data, error) => {
|
|
2097
|
+
try {
|
|
2098
|
+
if (stub) {
|
|
2099
|
+
const displayE = 'Error 400 received on request';
|
|
2100
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2101
|
+
} else {
|
|
2102
|
+
runCommonAsserts(data, error);
|
|
2103
|
+
}
|
|
2104
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetUser', 'getUser', 'default', data);
|
|
2105
|
+
done();
|
|
2106
|
+
} catch (err) {
|
|
2107
|
+
log.error(`Test Failure: ${err}`);
|
|
2108
|
+
done(err);
|
|
2109
|
+
}
|
|
2110
|
+
});
|
|
2111
|
+
} catch (error) {
|
|
2112
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2113
|
+
done(error);
|
|
2114
|
+
}
|
|
2115
|
+
}).timeout(attemptTimeout);
|
|
2116
|
+
});
|
|
2117
|
+
|
|
2118
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetUserAttributeVerificationCodeGetUserAttributeVerificationCodeBodyParam = {};
|
|
2119
|
+
describe('#getUserAttributeVerificationCode - errors', () => {
|
|
2120
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2121
|
+
try {
|
|
2122
|
+
a.getUserAttributeVerificationCode(xAmzTargetAWSCognitoIdentityProviderServiceGetUserAttributeVerificationCodeGetUserAttributeVerificationCodeBodyParam, null, (data, error) => {
|
|
2123
|
+
try {
|
|
2124
|
+
if (stub) {
|
|
2125
|
+
const displayE = 'Error 400 received on request';
|
|
2126
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2127
|
+
} else {
|
|
2128
|
+
runCommonAsserts(data, error);
|
|
2129
|
+
}
|
|
2130
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetUserAttributeVerificationCode', 'getUserAttributeVerificationCode', 'default', data);
|
|
2131
|
+
done();
|
|
2132
|
+
} catch (err) {
|
|
2133
|
+
log.error(`Test Failure: ${err}`);
|
|
2134
|
+
done(err);
|
|
2135
|
+
}
|
|
2136
|
+
});
|
|
2137
|
+
} catch (error) {
|
|
2138
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2139
|
+
done(error);
|
|
2140
|
+
}
|
|
2141
|
+
}).timeout(attemptTimeout);
|
|
2142
|
+
});
|
|
2143
|
+
|
|
2144
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGetUserPoolMfaConfigGetUserPoolMfaConfigBodyParam = {};
|
|
2145
|
+
describe('#getUserPoolMfaConfig - errors', () => {
|
|
2146
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2147
|
+
try {
|
|
2148
|
+
a.getUserPoolMfaConfig(xAmzTargetAWSCognitoIdentityProviderServiceGetUserPoolMfaConfigGetUserPoolMfaConfigBodyParam, null, (data, error) => {
|
|
2149
|
+
try {
|
|
2150
|
+
if (stub) {
|
|
2151
|
+
const displayE = 'Error 400 received on request';
|
|
2152
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2153
|
+
} else {
|
|
2154
|
+
runCommonAsserts(data, error);
|
|
2155
|
+
}
|
|
2156
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGetUserPoolMfaConfig', 'getUserPoolMfaConfig', 'default', data);
|
|
2157
|
+
done();
|
|
2158
|
+
} catch (err) {
|
|
2159
|
+
log.error(`Test Failure: ${err}`);
|
|
2160
|
+
done(err);
|
|
2161
|
+
}
|
|
2162
|
+
});
|
|
2163
|
+
} catch (error) {
|
|
2164
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2165
|
+
done(error);
|
|
2166
|
+
}
|
|
2167
|
+
}).timeout(attemptTimeout);
|
|
2168
|
+
});
|
|
2169
|
+
|
|
2170
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceGlobalSignOutGlobalSignOutBodyParam = {};
|
|
2171
|
+
describe('#globalSignOut - errors', () => {
|
|
2172
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2173
|
+
try {
|
|
2174
|
+
a.globalSignOut(xAmzTargetAWSCognitoIdentityProviderServiceGlobalSignOutGlobalSignOutBodyParam, null, (data, error) => {
|
|
2175
|
+
try {
|
|
2176
|
+
if (stub) {
|
|
2177
|
+
const displayE = 'Error 400 received on request';
|
|
2178
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2179
|
+
} else {
|
|
2180
|
+
runCommonAsserts(data, error);
|
|
2181
|
+
}
|
|
2182
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceGlobalSignOut', 'globalSignOut', 'default', data);
|
|
2183
|
+
done();
|
|
2184
|
+
} catch (err) {
|
|
2185
|
+
log.error(`Test Failure: ${err}`);
|
|
2186
|
+
done(err);
|
|
2187
|
+
}
|
|
2188
|
+
});
|
|
2189
|
+
} catch (error) {
|
|
2190
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2191
|
+
done(error);
|
|
2192
|
+
}
|
|
2193
|
+
}).timeout(attemptTimeout);
|
|
2194
|
+
});
|
|
2195
|
+
|
|
2196
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceInitiateAuthInitiateAuthBodyParam = {};
|
|
2197
|
+
describe('#initiateAuth - errors', () => {
|
|
2198
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2199
|
+
try {
|
|
2200
|
+
a.initiateAuth(xAmzTargetAWSCognitoIdentityProviderServiceInitiateAuthInitiateAuthBodyParam, null, (data, error) => {
|
|
2201
|
+
try {
|
|
2202
|
+
if (stub) {
|
|
2203
|
+
const displayE = 'Error 400 received on request';
|
|
2204
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2205
|
+
} else {
|
|
2206
|
+
runCommonAsserts(data, error);
|
|
2207
|
+
}
|
|
2208
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceInitiateAuth', 'initiateAuth', 'default', data);
|
|
2209
|
+
done();
|
|
2210
|
+
} catch (err) {
|
|
2211
|
+
log.error(`Test Failure: ${err}`);
|
|
2212
|
+
done(err);
|
|
2213
|
+
}
|
|
2214
|
+
});
|
|
2215
|
+
} catch (error) {
|
|
2216
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2217
|
+
done(error);
|
|
2218
|
+
}
|
|
2219
|
+
}).timeout(attemptTimeout);
|
|
2220
|
+
});
|
|
2221
|
+
|
|
2222
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListDevicesListDevicesBodyParam = {};
|
|
2223
|
+
describe('#listDevices - errors', () => {
|
|
2224
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2225
|
+
try {
|
|
2226
|
+
a.listDevices(xAmzTargetAWSCognitoIdentityProviderServiceListDevicesListDevicesBodyParam, null, (data, error) => {
|
|
2227
|
+
try {
|
|
2228
|
+
if (stub) {
|
|
2229
|
+
const displayE = 'Error 400 received on request';
|
|
2230
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2231
|
+
} else {
|
|
2232
|
+
runCommonAsserts(data, error);
|
|
2233
|
+
}
|
|
2234
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListDevices', 'listDevices', 'default', data);
|
|
2235
|
+
done();
|
|
2236
|
+
} catch (err) {
|
|
2237
|
+
log.error(`Test Failure: ${err}`);
|
|
2238
|
+
done(err);
|
|
2239
|
+
}
|
|
2240
|
+
});
|
|
2241
|
+
} catch (error) {
|
|
2242
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2243
|
+
done(error);
|
|
2244
|
+
}
|
|
2245
|
+
}).timeout(attemptTimeout);
|
|
2246
|
+
});
|
|
2247
|
+
|
|
2248
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListGroupsListGroupsBodyParam = {};
|
|
2249
|
+
describe('#listGroups - errors', () => {
|
|
2250
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2251
|
+
try {
|
|
2252
|
+
a.listGroups(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListGroupsListGroupsBodyParam, null, (data, error) => {
|
|
2253
|
+
try {
|
|
2254
|
+
if (stub) {
|
|
2255
|
+
const displayE = 'Error 400 received on request';
|
|
2256
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2257
|
+
} else {
|
|
2258
|
+
runCommonAsserts(data, error);
|
|
2259
|
+
}
|
|
2260
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListGroups', 'listGroups', 'default', data);
|
|
2261
|
+
done();
|
|
2262
|
+
} catch (err) {
|
|
2263
|
+
log.error(`Test Failure: ${err}`);
|
|
2264
|
+
done(err);
|
|
2265
|
+
}
|
|
2266
|
+
});
|
|
2267
|
+
} catch (error) {
|
|
2268
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2269
|
+
done(error);
|
|
2270
|
+
}
|
|
2271
|
+
}).timeout(attemptTimeout);
|
|
2272
|
+
});
|
|
2273
|
+
|
|
2274
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListIdentityProvidersListIdentityProvidersBodyParam = {};
|
|
2275
|
+
describe('#listIdentityProviders - errors', () => {
|
|
2276
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2277
|
+
try {
|
|
2278
|
+
a.listIdentityProviders(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListIdentityProvidersListIdentityProvidersBodyParam, null, (data, error) => {
|
|
2279
|
+
try {
|
|
2280
|
+
if (stub) {
|
|
2281
|
+
const displayE = 'Error 400 received on request';
|
|
2282
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2283
|
+
} else {
|
|
2284
|
+
runCommonAsserts(data, error);
|
|
2285
|
+
}
|
|
2286
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListIdentityProviders', 'listIdentityProviders', 'default', data);
|
|
2287
|
+
done();
|
|
2288
|
+
} catch (err) {
|
|
2289
|
+
log.error(`Test Failure: ${err}`);
|
|
2290
|
+
done(err);
|
|
2291
|
+
}
|
|
2292
|
+
});
|
|
2293
|
+
} catch (error) {
|
|
2294
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2295
|
+
done(error);
|
|
2296
|
+
}
|
|
2297
|
+
}).timeout(attemptTimeout);
|
|
2298
|
+
});
|
|
2299
|
+
|
|
2300
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListResourceServersListResourceServersBodyParam = {};
|
|
2301
|
+
describe('#listResourceServers - errors', () => {
|
|
2302
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2303
|
+
try {
|
|
2304
|
+
a.listResourceServers(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListResourceServersListResourceServersBodyParam, null, (data, error) => {
|
|
2305
|
+
try {
|
|
2306
|
+
if (stub) {
|
|
2307
|
+
const displayE = 'Error 400 received on request';
|
|
2308
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2309
|
+
} else {
|
|
2310
|
+
runCommonAsserts(data, error);
|
|
2311
|
+
}
|
|
2312
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListResourceServers', 'listResourceServers', 'default', data);
|
|
2313
|
+
done();
|
|
2314
|
+
} catch (err) {
|
|
2315
|
+
log.error(`Test Failure: ${err}`);
|
|
2316
|
+
done(err);
|
|
2317
|
+
}
|
|
2318
|
+
});
|
|
2319
|
+
} catch (error) {
|
|
2320
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2321
|
+
done(error);
|
|
2322
|
+
}
|
|
2323
|
+
}).timeout(attemptTimeout);
|
|
2324
|
+
});
|
|
2325
|
+
|
|
2326
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListTagsForResourceListTagsForResourceBodyParam = {};
|
|
2327
|
+
describe('#listTagsForResource - errors', () => {
|
|
2328
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2329
|
+
try {
|
|
2330
|
+
a.listTagsForResource(xAmzTargetAWSCognitoIdentityProviderServiceListTagsForResourceListTagsForResourceBodyParam, null, (data, error) => {
|
|
2331
|
+
try {
|
|
2332
|
+
if (stub) {
|
|
2333
|
+
const displayE = 'Error 400 received on request';
|
|
2334
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2335
|
+
} else {
|
|
2336
|
+
runCommonAsserts(data, error);
|
|
2337
|
+
}
|
|
2338
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListTagsForResource', 'listTagsForResource', 'default', data);
|
|
2339
|
+
done();
|
|
2340
|
+
} catch (err) {
|
|
2341
|
+
log.error(`Test Failure: ${err}`);
|
|
2342
|
+
done(err);
|
|
2343
|
+
}
|
|
2344
|
+
});
|
|
2345
|
+
} catch (error) {
|
|
2346
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2347
|
+
done(error);
|
|
2348
|
+
}
|
|
2349
|
+
}).timeout(attemptTimeout);
|
|
2350
|
+
});
|
|
2351
|
+
|
|
2352
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListUserImportJobsListUserImportJobsBodyParam = {};
|
|
2353
|
+
describe('#listUserImportJobs - errors', () => {
|
|
2354
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2355
|
+
try {
|
|
2356
|
+
a.listUserImportJobs(xAmzTargetAWSCognitoIdentityProviderServiceListUserImportJobsListUserImportJobsBodyParam, null, (data, error) => {
|
|
2357
|
+
try {
|
|
2358
|
+
if (stub) {
|
|
2359
|
+
const displayE = 'Error 400 received on request';
|
|
2360
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2361
|
+
} else {
|
|
2362
|
+
runCommonAsserts(data, error);
|
|
2363
|
+
}
|
|
2364
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListUserImportJobs', 'listUserImportJobs', 'default', data);
|
|
2365
|
+
done();
|
|
2366
|
+
} catch (err) {
|
|
2367
|
+
log.error(`Test Failure: ${err}`);
|
|
2368
|
+
done(err);
|
|
2369
|
+
}
|
|
2370
|
+
});
|
|
2371
|
+
} catch (error) {
|
|
2372
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2373
|
+
done(error);
|
|
2374
|
+
}
|
|
2375
|
+
}).timeout(attemptTimeout);
|
|
2376
|
+
});
|
|
2377
|
+
|
|
2378
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListUserPoolClientsListUserPoolClientsBodyParam = {};
|
|
2379
|
+
describe('#listUserPoolClients - errors', () => {
|
|
2380
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2381
|
+
try {
|
|
2382
|
+
a.listUserPoolClients(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListUserPoolClientsListUserPoolClientsBodyParam, null, (data, error) => {
|
|
2383
|
+
try {
|
|
2384
|
+
if (stub) {
|
|
2385
|
+
const displayE = 'Error 400 received on request';
|
|
2386
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2387
|
+
} else {
|
|
2388
|
+
runCommonAsserts(data, error);
|
|
2389
|
+
}
|
|
2390
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListUserPoolClients', 'listUserPoolClients', 'default', data);
|
|
2391
|
+
done();
|
|
2392
|
+
} catch (err) {
|
|
2393
|
+
log.error(`Test Failure: ${err}`);
|
|
2394
|
+
done(err);
|
|
2395
|
+
}
|
|
2396
|
+
});
|
|
2397
|
+
} catch (error) {
|
|
2398
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2399
|
+
done(error);
|
|
2400
|
+
}
|
|
2401
|
+
}).timeout(attemptTimeout);
|
|
2402
|
+
});
|
|
2403
|
+
|
|
2404
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListUserPoolsListUserPoolsBodyParam = {};
|
|
2405
|
+
describe('#listUserPools - errors', () => {
|
|
2406
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2407
|
+
try {
|
|
2408
|
+
a.listUserPools(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListUserPoolsListUserPoolsBodyParam, null, (data, error) => {
|
|
2409
|
+
try {
|
|
2410
|
+
if (stub) {
|
|
2411
|
+
const displayE = 'Error 400 received on request';
|
|
2412
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2413
|
+
} else {
|
|
2414
|
+
runCommonAsserts(data, error);
|
|
2415
|
+
}
|
|
2416
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListUserPools', 'listUserPools', 'default', data);
|
|
2417
|
+
done();
|
|
2418
|
+
} catch (err) {
|
|
2419
|
+
log.error(`Test Failure: ${err}`);
|
|
2420
|
+
done(err);
|
|
2421
|
+
}
|
|
2422
|
+
});
|
|
2423
|
+
} catch (error) {
|
|
2424
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2425
|
+
done(error);
|
|
2426
|
+
}
|
|
2427
|
+
}).timeout(attemptTimeout);
|
|
2428
|
+
});
|
|
2429
|
+
|
|
2430
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListUsersListUsersBodyParam = {};
|
|
2431
|
+
describe('#listUsers - errors', () => {
|
|
2432
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2433
|
+
try {
|
|
2434
|
+
a.listUsers(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListUsersListUsersBodyParam, null, (data, error) => {
|
|
2435
|
+
try {
|
|
2436
|
+
if (stub) {
|
|
2437
|
+
const displayE = 'Error 400 received on request';
|
|
2438
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2439
|
+
} else {
|
|
2440
|
+
runCommonAsserts(data, error);
|
|
2441
|
+
}
|
|
2442
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListUsers', 'listUsers', 'default', data);
|
|
2443
|
+
done();
|
|
2444
|
+
} catch (err) {
|
|
2445
|
+
log.error(`Test Failure: ${err}`);
|
|
2446
|
+
done(err);
|
|
2447
|
+
}
|
|
2448
|
+
});
|
|
2449
|
+
} catch (error) {
|
|
2450
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2451
|
+
done(error);
|
|
2452
|
+
}
|
|
2453
|
+
}).timeout(attemptTimeout);
|
|
2454
|
+
});
|
|
2455
|
+
|
|
2456
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceListUsersInGroupListUsersInGroupBodyParam = {};
|
|
2457
|
+
describe('#listUsersInGroup - errors', () => {
|
|
2458
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2459
|
+
try {
|
|
2460
|
+
a.listUsersInGroup(null, null, xAmzTargetAWSCognitoIdentityProviderServiceListUsersInGroupListUsersInGroupBodyParam, null, (data, error) => {
|
|
2461
|
+
try {
|
|
2462
|
+
if (stub) {
|
|
2463
|
+
const displayE = 'Error 400 received on request';
|
|
2464
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2465
|
+
} else {
|
|
2466
|
+
runCommonAsserts(data, error);
|
|
2467
|
+
}
|
|
2468
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceListUsersInGroup', 'listUsersInGroup', 'default', data);
|
|
2469
|
+
done();
|
|
2470
|
+
} catch (err) {
|
|
2471
|
+
log.error(`Test Failure: ${err}`);
|
|
2472
|
+
done(err);
|
|
2473
|
+
}
|
|
2474
|
+
});
|
|
2475
|
+
} catch (error) {
|
|
2476
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2477
|
+
done(error);
|
|
2478
|
+
}
|
|
2479
|
+
}).timeout(attemptTimeout);
|
|
2480
|
+
});
|
|
2481
|
+
|
|
2482
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceResendConfirmationCodeResendConfirmationCodeBodyParam = {};
|
|
2483
|
+
describe('#resendConfirmationCode - errors', () => {
|
|
2484
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2485
|
+
try {
|
|
2486
|
+
a.resendConfirmationCode(xAmzTargetAWSCognitoIdentityProviderServiceResendConfirmationCodeResendConfirmationCodeBodyParam, null, (data, error) => {
|
|
2487
|
+
try {
|
|
2488
|
+
if (stub) {
|
|
2489
|
+
const displayE = 'Error 400 received on request';
|
|
2490
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2491
|
+
} else {
|
|
2492
|
+
runCommonAsserts(data, error);
|
|
2493
|
+
}
|
|
2494
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceResendConfirmationCode', 'resendConfirmationCode', 'default', data);
|
|
2495
|
+
done();
|
|
2496
|
+
} catch (err) {
|
|
2497
|
+
log.error(`Test Failure: ${err}`);
|
|
2498
|
+
done(err);
|
|
2499
|
+
}
|
|
2500
|
+
});
|
|
2501
|
+
} catch (error) {
|
|
2502
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2503
|
+
done(error);
|
|
2504
|
+
}
|
|
2505
|
+
}).timeout(attemptTimeout);
|
|
2506
|
+
});
|
|
2507
|
+
|
|
2508
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceRespondToAuthChallengeRespondToAuthChallengeBodyParam = {};
|
|
2509
|
+
describe('#respondToAuthChallenge - errors', () => {
|
|
2510
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2511
|
+
try {
|
|
2512
|
+
a.respondToAuthChallenge(xAmzTargetAWSCognitoIdentityProviderServiceRespondToAuthChallengeRespondToAuthChallengeBodyParam, null, (data, error) => {
|
|
2513
|
+
try {
|
|
2514
|
+
if (stub) {
|
|
2515
|
+
const displayE = 'Error 400 received on request';
|
|
2516
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2517
|
+
} else {
|
|
2518
|
+
runCommonAsserts(data, error);
|
|
2519
|
+
}
|
|
2520
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceRespondToAuthChallenge', 'respondToAuthChallenge', 'default', data);
|
|
2521
|
+
done();
|
|
2522
|
+
} catch (err) {
|
|
2523
|
+
log.error(`Test Failure: ${err}`);
|
|
2524
|
+
done(err);
|
|
2525
|
+
}
|
|
2526
|
+
});
|
|
2527
|
+
} catch (error) {
|
|
2528
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2529
|
+
done(error);
|
|
2530
|
+
}
|
|
2531
|
+
}).timeout(attemptTimeout);
|
|
2532
|
+
});
|
|
2533
|
+
|
|
2534
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceRevokeTokenRevokeTokenBodyParam = {};
|
|
2535
|
+
describe('#revokeToken - errors', () => {
|
|
2536
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2537
|
+
try {
|
|
2538
|
+
a.revokeToken(xAmzTargetAWSCognitoIdentityProviderServiceRevokeTokenRevokeTokenBodyParam, null, (data, error) => {
|
|
2539
|
+
try {
|
|
2540
|
+
if (stub) {
|
|
2541
|
+
const displayE = 'Error 400 received on request';
|
|
2542
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2543
|
+
} else {
|
|
2544
|
+
runCommonAsserts(data, error);
|
|
2545
|
+
}
|
|
2546
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceRevokeToken', 'revokeToken', 'default', data);
|
|
2547
|
+
done();
|
|
2548
|
+
} catch (err) {
|
|
2549
|
+
log.error(`Test Failure: ${err}`);
|
|
2550
|
+
done(err);
|
|
2551
|
+
}
|
|
2552
|
+
});
|
|
2553
|
+
} catch (error) {
|
|
2554
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2555
|
+
done(error);
|
|
2556
|
+
}
|
|
2557
|
+
}).timeout(attemptTimeout);
|
|
2558
|
+
});
|
|
2559
|
+
|
|
2560
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceSetRiskConfigurationSetRiskConfigurationBodyParam = {};
|
|
2561
|
+
describe('#setRiskConfiguration - errors', () => {
|
|
2562
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2563
|
+
try {
|
|
2564
|
+
a.setRiskConfiguration(xAmzTargetAWSCognitoIdentityProviderServiceSetRiskConfigurationSetRiskConfigurationBodyParam, null, (data, error) => {
|
|
2565
|
+
try {
|
|
2566
|
+
if (stub) {
|
|
2567
|
+
const displayE = 'Error 400 received on request';
|
|
2568
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2569
|
+
} else {
|
|
2570
|
+
runCommonAsserts(data, error);
|
|
2571
|
+
}
|
|
2572
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceSetRiskConfiguration', 'setRiskConfiguration', 'default', data);
|
|
2573
|
+
done();
|
|
2574
|
+
} catch (err) {
|
|
2575
|
+
log.error(`Test Failure: ${err}`);
|
|
2576
|
+
done(err);
|
|
2577
|
+
}
|
|
2578
|
+
});
|
|
2579
|
+
} catch (error) {
|
|
2580
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2581
|
+
done(error);
|
|
2582
|
+
}
|
|
2583
|
+
}).timeout(attemptTimeout);
|
|
2584
|
+
});
|
|
2585
|
+
|
|
2586
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceSetUICustomizationSetUICustomizationBodyParam = {};
|
|
2587
|
+
describe('#setUICustomization - errors', () => {
|
|
2588
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2589
|
+
try {
|
|
2590
|
+
a.setUICustomization(xAmzTargetAWSCognitoIdentityProviderServiceSetUICustomizationSetUICustomizationBodyParam, null, (data, error) => {
|
|
2591
|
+
try {
|
|
2592
|
+
if (stub) {
|
|
2593
|
+
const displayE = 'Error 400 received on request';
|
|
2594
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2595
|
+
} else {
|
|
2596
|
+
runCommonAsserts(data, error);
|
|
2597
|
+
}
|
|
2598
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceSetUICustomization', 'setUICustomization', 'default', data);
|
|
2599
|
+
done();
|
|
2600
|
+
} catch (err) {
|
|
2601
|
+
log.error(`Test Failure: ${err}`);
|
|
2602
|
+
done(err);
|
|
2603
|
+
}
|
|
2604
|
+
});
|
|
2605
|
+
} catch (error) {
|
|
2606
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2607
|
+
done(error);
|
|
2608
|
+
}
|
|
2609
|
+
}).timeout(attemptTimeout);
|
|
2610
|
+
});
|
|
2611
|
+
|
|
2612
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceSetUserMFAPreferenceSetUserMFAPreferenceBodyParam = {};
|
|
2613
|
+
describe('#setUserMFAPreference - errors', () => {
|
|
2614
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2615
|
+
try {
|
|
2616
|
+
a.setUserMFAPreference(xAmzTargetAWSCognitoIdentityProviderServiceSetUserMFAPreferenceSetUserMFAPreferenceBodyParam, null, (data, error) => {
|
|
2617
|
+
try {
|
|
2618
|
+
if (stub) {
|
|
2619
|
+
const displayE = 'Error 400 received on request';
|
|
2620
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2621
|
+
} else {
|
|
2622
|
+
runCommonAsserts(data, error);
|
|
2623
|
+
}
|
|
2624
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceSetUserMFAPreference', 'setUserMFAPreference', 'default', data);
|
|
2625
|
+
done();
|
|
2626
|
+
} catch (err) {
|
|
2627
|
+
log.error(`Test Failure: ${err}`);
|
|
2628
|
+
done(err);
|
|
2629
|
+
}
|
|
2630
|
+
});
|
|
2631
|
+
} catch (error) {
|
|
2632
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2633
|
+
done(error);
|
|
2634
|
+
}
|
|
2635
|
+
}).timeout(attemptTimeout);
|
|
2636
|
+
});
|
|
2637
|
+
|
|
2638
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceSetUserPoolMfaConfigSetUserPoolMfaConfigBodyParam = {};
|
|
2639
|
+
describe('#setUserPoolMfaConfig - errors', () => {
|
|
2640
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2641
|
+
try {
|
|
2642
|
+
a.setUserPoolMfaConfig(xAmzTargetAWSCognitoIdentityProviderServiceSetUserPoolMfaConfigSetUserPoolMfaConfigBodyParam, null, (data, error) => {
|
|
2643
|
+
try {
|
|
2644
|
+
if (stub) {
|
|
2645
|
+
const displayE = 'Error 400 received on request';
|
|
2646
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2647
|
+
} else {
|
|
2648
|
+
runCommonAsserts(data, error);
|
|
2649
|
+
}
|
|
2650
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceSetUserPoolMfaConfig', 'setUserPoolMfaConfig', 'default', data);
|
|
2651
|
+
done();
|
|
2652
|
+
} catch (err) {
|
|
2653
|
+
log.error(`Test Failure: ${err}`);
|
|
2654
|
+
done(err);
|
|
2655
|
+
}
|
|
2656
|
+
});
|
|
2657
|
+
} catch (error) {
|
|
2658
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2659
|
+
done(error);
|
|
2660
|
+
}
|
|
2661
|
+
}).timeout(attemptTimeout);
|
|
2662
|
+
});
|
|
2663
|
+
|
|
2664
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceSetUserSettingsSetUserSettingsBodyParam = {};
|
|
2665
|
+
describe('#setUserSettings - errors', () => {
|
|
2666
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2667
|
+
try {
|
|
2668
|
+
a.setUserSettings(xAmzTargetAWSCognitoIdentityProviderServiceSetUserSettingsSetUserSettingsBodyParam, null, (data, error) => {
|
|
2669
|
+
try {
|
|
2670
|
+
if (stub) {
|
|
2671
|
+
const displayE = 'Error 400 received on request';
|
|
2672
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2673
|
+
} else {
|
|
2674
|
+
runCommonAsserts(data, error);
|
|
2675
|
+
}
|
|
2676
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceSetUserSettings', 'setUserSettings', 'default', data);
|
|
2677
|
+
done();
|
|
2678
|
+
} catch (err) {
|
|
2679
|
+
log.error(`Test Failure: ${err}`);
|
|
2680
|
+
done(err);
|
|
2681
|
+
}
|
|
2682
|
+
});
|
|
2683
|
+
} catch (error) {
|
|
2684
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2685
|
+
done(error);
|
|
2686
|
+
}
|
|
2687
|
+
}).timeout(attemptTimeout);
|
|
2688
|
+
});
|
|
2689
|
+
|
|
2690
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceSignUpSignUpBodyParam = {};
|
|
2691
|
+
describe('#signUp - errors', () => {
|
|
2692
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2693
|
+
try {
|
|
2694
|
+
a.signUp(xAmzTargetAWSCognitoIdentityProviderServiceSignUpSignUpBodyParam, null, (data, error) => {
|
|
2695
|
+
try {
|
|
2696
|
+
if (stub) {
|
|
2697
|
+
const displayE = 'Error 400 received on request';
|
|
2698
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2699
|
+
} else {
|
|
2700
|
+
runCommonAsserts(data, error);
|
|
2701
|
+
}
|
|
2702
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceSignUp', 'signUp', 'default', data);
|
|
2703
|
+
done();
|
|
2704
|
+
} catch (err) {
|
|
2705
|
+
log.error(`Test Failure: ${err}`);
|
|
2706
|
+
done(err);
|
|
2707
|
+
}
|
|
2708
|
+
});
|
|
2709
|
+
} catch (error) {
|
|
2710
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2711
|
+
done(error);
|
|
2712
|
+
}
|
|
2713
|
+
}).timeout(attemptTimeout);
|
|
2714
|
+
});
|
|
2715
|
+
|
|
2716
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceStartUserImportJobStartUserImportJobBodyParam = {};
|
|
2717
|
+
describe('#startUserImportJob - errors', () => {
|
|
2718
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2719
|
+
try {
|
|
2720
|
+
a.startUserImportJob(xAmzTargetAWSCognitoIdentityProviderServiceStartUserImportJobStartUserImportJobBodyParam, null, (data, error) => {
|
|
2721
|
+
try {
|
|
2722
|
+
if (stub) {
|
|
2723
|
+
const displayE = 'Error 400 received on request';
|
|
2724
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2725
|
+
} else {
|
|
2726
|
+
runCommonAsserts(data, error);
|
|
2727
|
+
}
|
|
2728
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceStartUserImportJob', 'startUserImportJob', 'default', data);
|
|
2729
|
+
done();
|
|
2730
|
+
} catch (err) {
|
|
2731
|
+
log.error(`Test Failure: ${err}`);
|
|
2732
|
+
done(err);
|
|
2733
|
+
}
|
|
2734
|
+
});
|
|
2735
|
+
} catch (error) {
|
|
2736
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2737
|
+
done(error);
|
|
2738
|
+
}
|
|
2739
|
+
}).timeout(attemptTimeout);
|
|
2740
|
+
});
|
|
2741
|
+
|
|
2742
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceStopUserImportJobStopUserImportJobBodyParam = {};
|
|
2743
|
+
describe('#stopUserImportJob - errors', () => {
|
|
2744
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2745
|
+
try {
|
|
2746
|
+
a.stopUserImportJob(xAmzTargetAWSCognitoIdentityProviderServiceStopUserImportJobStopUserImportJobBodyParam, null, (data, error) => {
|
|
2747
|
+
try {
|
|
2748
|
+
if (stub) {
|
|
2749
|
+
const displayE = 'Error 400 received on request';
|
|
2750
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2751
|
+
} else {
|
|
2752
|
+
runCommonAsserts(data, error);
|
|
2753
|
+
}
|
|
2754
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceStopUserImportJob', 'stopUserImportJob', 'default', data);
|
|
2755
|
+
done();
|
|
2756
|
+
} catch (err) {
|
|
2757
|
+
log.error(`Test Failure: ${err}`);
|
|
2758
|
+
done(err);
|
|
2759
|
+
}
|
|
2760
|
+
});
|
|
2761
|
+
} catch (error) {
|
|
2762
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2763
|
+
done(error);
|
|
2764
|
+
}
|
|
2765
|
+
}).timeout(attemptTimeout);
|
|
2766
|
+
});
|
|
2767
|
+
|
|
2768
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceTagResourceTagResourceBodyParam = {};
|
|
2769
|
+
describe('#tagResource - errors', () => {
|
|
2770
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2771
|
+
try {
|
|
2772
|
+
a.tagResource(xAmzTargetAWSCognitoIdentityProviderServiceTagResourceTagResourceBodyParam, null, (data, error) => {
|
|
2773
|
+
try {
|
|
2774
|
+
if (stub) {
|
|
2775
|
+
const displayE = 'Error 400 received on request';
|
|
2776
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2777
|
+
} else {
|
|
2778
|
+
runCommonAsserts(data, error);
|
|
2779
|
+
}
|
|
2780
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceTagResource', 'tagResource', 'default', data);
|
|
2781
|
+
done();
|
|
2782
|
+
} catch (err) {
|
|
2783
|
+
log.error(`Test Failure: ${err}`);
|
|
2784
|
+
done(err);
|
|
2785
|
+
}
|
|
2786
|
+
});
|
|
2787
|
+
} catch (error) {
|
|
2788
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2789
|
+
done(error);
|
|
2790
|
+
}
|
|
2791
|
+
}).timeout(attemptTimeout);
|
|
2792
|
+
});
|
|
2793
|
+
|
|
2794
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUntagResourceUntagResourceBodyParam = {};
|
|
2795
|
+
describe('#untagResource - errors', () => {
|
|
2796
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2797
|
+
try {
|
|
2798
|
+
a.untagResource(xAmzTargetAWSCognitoIdentityProviderServiceUntagResourceUntagResourceBodyParam, null, (data, error) => {
|
|
2799
|
+
try {
|
|
2800
|
+
if (stub) {
|
|
2801
|
+
const displayE = 'Error 400 received on request';
|
|
2802
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2803
|
+
} else {
|
|
2804
|
+
runCommonAsserts(data, error);
|
|
2805
|
+
}
|
|
2806
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUntagResource', 'untagResource', 'default', data);
|
|
2807
|
+
done();
|
|
2808
|
+
} catch (err) {
|
|
2809
|
+
log.error(`Test Failure: ${err}`);
|
|
2810
|
+
done(err);
|
|
2811
|
+
}
|
|
2812
|
+
});
|
|
2813
|
+
} catch (error) {
|
|
2814
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2815
|
+
done(error);
|
|
2816
|
+
}
|
|
2817
|
+
}).timeout(attemptTimeout);
|
|
2818
|
+
});
|
|
2819
|
+
|
|
2820
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateAuthEventFeedbackUpdateAuthEventFeedbackBodyParam = {};
|
|
2821
|
+
describe('#updateAuthEventFeedback - errors', () => {
|
|
2822
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2823
|
+
try {
|
|
2824
|
+
a.updateAuthEventFeedback(xAmzTargetAWSCognitoIdentityProviderServiceUpdateAuthEventFeedbackUpdateAuthEventFeedbackBodyParam, null, (data, error) => {
|
|
2825
|
+
try {
|
|
2826
|
+
if (stub) {
|
|
2827
|
+
const displayE = 'Error 400 received on request';
|
|
2828
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2829
|
+
} else {
|
|
2830
|
+
runCommonAsserts(data, error);
|
|
2831
|
+
}
|
|
2832
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateAuthEventFeedback', 'updateAuthEventFeedback', 'default', data);
|
|
2833
|
+
done();
|
|
2834
|
+
} catch (err) {
|
|
2835
|
+
log.error(`Test Failure: ${err}`);
|
|
2836
|
+
done(err);
|
|
2837
|
+
}
|
|
2838
|
+
});
|
|
2839
|
+
} catch (error) {
|
|
2840
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2841
|
+
done(error);
|
|
2842
|
+
}
|
|
2843
|
+
}).timeout(attemptTimeout);
|
|
2844
|
+
});
|
|
2845
|
+
|
|
2846
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateDeviceStatusUpdateDeviceStatusBodyParam = {};
|
|
2847
|
+
describe('#updateDeviceStatus - errors', () => {
|
|
2848
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2849
|
+
try {
|
|
2850
|
+
a.updateDeviceStatus(xAmzTargetAWSCognitoIdentityProviderServiceUpdateDeviceStatusUpdateDeviceStatusBodyParam, null, (data, error) => {
|
|
2851
|
+
try {
|
|
2852
|
+
if (stub) {
|
|
2853
|
+
const displayE = 'Error 400 received on request';
|
|
2854
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2855
|
+
} else {
|
|
2856
|
+
runCommonAsserts(data, error);
|
|
2857
|
+
}
|
|
2858
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateDeviceStatus', 'updateDeviceStatus', 'default', data);
|
|
2859
|
+
done();
|
|
2860
|
+
} catch (err) {
|
|
2861
|
+
log.error(`Test Failure: ${err}`);
|
|
2862
|
+
done(err);
|
|
2863
|
+
}
|
|
2864
|
+
});
|
|
2865
|
+
} catch (error) {
|
|
2866
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2867
|
+
done(error);
|
|
2868
|
+
}
|
|
2869
|
+
}).timeout(attemptTimeout);
|
|
2870
|
+
});
|
|
2871
|
+
|
|
2872
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateGroupUpdateGroupBodyParam = {};
|
|
2873
|
+
describe('#updateGroup - errors', () => {
|
|
2874
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2875
|
+
try {
|
|
2876
|
+
a.updateGroup(xAmzTargetAWSCognitoIdentityProviderServiceUpdateGroupUpdateGroupBodyParam, null, (data, error) => {
|
|
2877
|
+
try {
|
|
2878
|
+
if (stub) {
|
|
2879
|
+
const displayE = 'Error 400 received on request';
|
|
2880
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2881
|
+
} else {
|
|
2882
|
+
runCommonAsserts(data, error);
|
|
2883
|
+
}
|
|
2884
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateGroup', 'updateGroup', 'default', data);
|
|
2885
|
+
done();
|
|
2886
|
+
} catch (err) {
|
|
2887
|
+
log.error(`Test Failure: ${err}`);
|
|
2888
|
+
done(err);
|
|
2889
|
+
}
|
|
2890
|
+
});
|
|
2891
|
+
} catch (error) {
|
|
2892
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2893
|
+
done(error);
|
|
2894
|
+
}
|
|
2895
|
+
}).timeout(attemptTimeout);
|
|
2896
|
+
});
|
|
2897
|
+
|
|
2898
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateIdentityProviderUpdateIdentityProviderBodyParam = {};
|
|
2899
|
+
describe('#updateIdentityProvider - errors', () => {
|
|
2900
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2901
|
+
try {
|
|
2902
|
+
a.updateIdentityProvider(xAmzTargetAWSCognitoIdentityProviderServiceUpdateIdentityProviderUpdateIdentityProviderBodyParam, null, (data, error) => {
|
|
2903
|
+
try {
|
|
2904
|
+
if (stub) {
|
|
2905
|
+
const displayE = 'Error 400 received on request';
|
|
2906
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2907
|
+
} else {
|
|
2908
|
+
runCommonAsserts(data, error);
|
|
2909
|
+
}
|
|
2910
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateIdentityProvider', 'updateIdentityProvider', 'default', data);
|
|
2911
|
+
done();
|
|
2912
|
+
} catch (err) {
|
|
2913
|
+
log.error(`Test Failure: ${err}`);
|
|
2914
|
+
done(err);
|
|
2915
|
+
}
|
|
2916
|
+
});
|
|
2917
|
+
} catch (error) {
|
|
2918
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2919
|
+
done(error);
|
|
2920
|
+
}
|
|
2921
|
+
}).timeout(attemptTimeout);
|
|
2922
|
+
});
|
|
2923
|
+
|
|
2924
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateResourceServerUpdateResourceServerBodyParam = {};
|
|
2925
|
+
describe('#updateResourceServer - errors', () => {
|
|
2926
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2927
|
+
try {
|
|
2928
|
+
a.updateResourceServer(xAmzTargetAWSCognitoIdentityProviderServiceUpdateResourceServerUpdateResourceServerBodyParam, null, (data, error) => {
|
|
2929
|
+
try {
|
|
2930
|
+
if (stub) {
|
|
2931
|
+
const displayE = 'Error 400 received on request';
|
|
2932
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2933
|
+
} else {
|
|
2934
|
+
runCommonAsserts(data, error);
|
|
2935
|
+
}
|
|
2936
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateResourceServer', 'updateResourceServer', 'default', data);
|
|
2937
|
+
done();
|
|
2938
|
+
} catch (err) {
|
|
2939
|
+
log.error(`Test Failure: ${err}`);
|
|
2940
|
+
done(err);
|
|
2941
|
+
}
|
|
2942
|
+
});
|
|
2943
|
+
} catch (error) {
|
|
2944
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2945
|
+
done(error);
|
|
2946
|
+
}
|
|
2947
|
+
}).timeout(attemptTimeout);
|
|
2948
|
+
});
|
|
2949
|
+
|
|
2950
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserAttributesUpdateUserAttributesBodyParam = {};
|
|
2951
|
+
describe('#updateUserAttributes - errors', () => {
|
|
2952
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2953
|
+
try {
|
|
2954
|
+
a.updateUserAttributes(xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserAttributesUpdateUserAttributesBodyParam, null, (data, error) => {
|
|
2955
|
+
try {
|
|
2956
|
+
if (stub) {
|
|
2957
|
+
const displayE = 'Error 400 received on request';
|
|
2958
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2959
|
+
} else {
|
|
2960
|
+
runCommonAsserts(data, error);
|
|
2961
|
+
}
|
|
2962
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserAttributes', 'updateUserAttributes', 'default', data);
|
|
2963
|
+
done();
|
|
2964
|
+
} catch (err) {
|
|
2965
|
+
log.error(`Test Failure: ${err}`);
|
|
2966
|
+
done(err);
|
|
2967
|
+
}
|
|
2968
|
+
});
|
|
2969
|
+
} catch (error) {
|
|
2970
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2971
|
+
done(error);
|
|
2972
|
+
}
|
|
2973
|
+
}).timeout(attemptTimeout);
|
|
2974
|
+
});
|
|
2975
|
+
|
|
2976
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolUpdateUserPoolBodyParam = {};
|
|
2977
|
+
describe('#updateUserPool - errors', () => {
|
|
2978
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
2979
|
+
try {
|
|
2980
|
+
a.updateUserPool(xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolUpdateUserPoolBodyParam, null, (data, error) => {
|
|
2981
|
+
try {
|
|
2982
|
+
if (stub) {
|
|
2983
|
+
const displayE = 'Error 400 received on request';
|
|
2984
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
2985
|
+
} else {
|
|
2986
|
+
runCommonAsserts(data, error);
|
|
2987
|
+
}
|
|
2988
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPool', 'updateUserPool', 'default', data);
|
|
2989
|
+
done();
|
|
2990
|
+
} catch (err) {
|
|
2991
|
+
log.error(`Test Failure: ${err}`);
|
|
2992
|
+
done(err);
|
|
2993
|
+
}
|
|
2994
|
+
});
|
|
2995
|
+
} catch (error) {
|
|
2996
|
+
log.error(`Adapter Exception: ${error}`);
|
|
2997
|
+
done(error);
|
|
2998
|
+
}
|
|
2999
|
+
}).timeout(attemptTimeout);
|
|
3000
|
+
});
|
|
3001
|
+
|
|
3002
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolClientUpdateUserPoolClientBodyParam = {};
|
|
3003
|
+
describe('#updateUserPoolClient - errors', () => {
|
|
3004
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
3005
|
+
try {
|
|
3006
|
+
a.updateUserPoolClient(xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolClientUpdateUserPoolClientBodyParam, null, (data, error) => {
|
|
3007
|
+
try {
|
|
3008
|
+
if (stub) {
|
|
3009
|
+
const displayE = 'Error 400 received on request';
|
|
3010
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
3011
|
+
} else {
|
|
3012
|
+
runCommonAsserts(data, error);
|
|
3013
|
+
}
|
|
3014
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolClient', 'updateUserPoolClient', 'default', data);
|
|
3015
|
+
done();
|
|
3016
|
+
} catch (err) {
|
|
3017
|
+
log.error(`Test Failure: ${err}`);
|
|
3018
|
+
done(err);
|
|
3019
|
+
}
|
|
3020
|
+
});
|
|
3021
|
+
} catch (error) {
|
|
3022
|
+
log.error(`Adapter Exception: ${error}`);
|
|
3023
|
+
done(error);
|
|
3024
|
+
}
|
|
3025
|
+
}).timeout(attemptTimeout);
|
|
3026
|
+
});
|
|
3027
|
+
|
|
3028
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolDomainUpdateUserPoolDomainBodyParam = {};
|
|
3029
|
+
describe('#updateUserPoolDomain - errors', () => {
|
|
3030
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
3031
|
+
try {
|
|
3032
|
+
a.updateUserPoolDomain(xAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolDomainUpdateUserPoolDomainBodyParam, null, (data, error) => {
|
|
3033
|
+
try {
|
|
3034
|
+
if (stub) {
|
|
3035
|
+
const displayE = 'Error 400 received on request';
|
|
3036
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
3037
|
+
} else {
|
|
3038
|
+
runCommonAsserts(data, error);
|
|
3039
|
+
}
|
|
3040
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceUpdateUserPoolDomain', 'updateUserPoolDomain', 'default', data);
|
|
3041
|
+
done();
|
|
3042
|
+
} catch (err) {
|
|
3043
|
+
log.error(`Test Failure: ${err}`);
|
|
3044
|
+
done(err);
|
|
3045
|
+
}
|
|
3046
|
+
});
|
|
3047
|
+
} catch (error) {
|
|
3048
|
+
log.error(`Adapter Exception: ${error}`);
|
|
3049
|
+
done(error);
|
|
3050
|
+
}
|
|
3051
|
+
}).timeout(attemptTimeout);
|
|
3052
|
+
});
|
|
3053
|
+
|
|
3054
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceVerifySoftwareTokenVerifySoftwareTokenBodyParam = {};
|
|
3055
|
+
describe('#verifySoftwareToken - errors', () => {
|
|
3056
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
3057
|
+
try {
|
|
3058
|
+
a.verifySoftwareToken(xAmzTargetAWSCognitoIdentityProviderServiceVerifySoftwareTokenVerifySoftwareTokenBodyParam, null, (data, error) => {
|
|
3059
|
+
try {
|
|
3060
|
+
if (stub) {
|
|
3061
|
+
const displayE = 'Error 400 received on request';
|
|
3062
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
3063
|
+
} else {
|
|
3064
|
+
runCommonAsserts(data, error);
|
|
3065
|
+
}
|
|
3066
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceVerifySoftwareToken', 'verifySoftwareToken', 'default', data);
|
|
3067
|
+
done();
|
|
3068
|
+
} catch (err) {
|
|
3069
|
+
log.error(`Test Failure: ${err}`);
|
|
3070
|
+
done(err);
|
|
3071
|
+
}
|
|
3072
|
+
});
|
|
3073
|
+
} catch (error) {
|
|
3074
|
+
log.error(`Adapter Exception: ${error}`);
|
|
3075
|
+
done(error);
|
|
3076
|
+
}
|
|
3077
|
+
}).timeout(attemptTimeout);
|
|
3078
|
+
});
|
|
3079
|
+
|
|
3080
|
+
const xAmzTargetAWSCognitoIdentityProviderServiceVerifyUserAttributeVerifyUserAttributeBodyParam = {};
|
|
3081
|
+
describe('#verifyUserAttribute - errors', () => {
|
|
3082
|
+
it('should work if integrated but since no mockdata should error when run standalone', (done) => {
|
|
3083
|
+
try {
|
|
3084
|
+
a.verifyUserAttribute(xAmzTargetAWSCognitoIdentityProviderServiceVerifyUserAttributeVerifyUserAttributeBodyParam, null, (data, error) => {
|
|
3085
|
+
try {
|
|
3086
|
+
if (stub) {
|
|
3087
|
+
const displayE = 'Error 400 received on request';
|
|
3088
|
+
runErrorAsserts(data, error, 'AD.500', 'Test-aws_cognito_identity_provider-connectorRest-handleEndResponse', displayE);
|
|
3089
|
+
} else {
|
|
3090
|
+
runCommonAsserts(data, error);
|
|
3091
|
+
}
|
|
3092
|
+
saveMockData('XAmzTargetAWSCognitoIdentityProviderServiceVerifyUserAttribute', 'verifyUserAttribute', 'default', data);
|
|
3093
|
+
done();
|
|
3094
|
+
} catch (err) {
|
|
3095
|
+
log.error(`Test Failure: ${err}`);
|
|
3096
|
+
done(err);
|
|
3097
|
+
}
|
|
3098
|
+
});
|
|
3099
|
+
} catch (error) {
|
|
3100
|
+
log.error(`Adapter Exception: ${error}`);
|
|
3101
|
+
done(error);
|
|
3102
|
+
}
|
|
3103
|
+
}).timeout(attemptTimeout);
|
|
3104
|
+
});
|
|
3105
|
+
});
|
|
3106
|
+
});
|