diff --git a/internal/service/signer/service_test.go b/internal/service/signer/service_test.go index 0d954e4e63ff2a4c17dfccd4c3c9947e4bb08156..6ca0667c8089b8e78214f7fce9394559a72f4883 100644 --- a/internal/service/signer/service_test.go +++ b/internal/service/signer/service_test.go @@ -8,6 +8,7 @@ import ( "encoding/json" "net/http" "testing" + "time" "github.com/hyperledger/aries-framework-go/pkg/doc/verifiable" "github.com/square/go-jose/v3" @@ -322,19 +323,6 @@ func TestService_CredentialProof(t *testing.T) { errkind: errors.Internal, errtext: "error getting signing key", }, - { - name: "valid credential but signer returns internal error", - namespace: "transit", - keyname: "key2", - credential: []byte(validCredential), - signer: &signerfakes.FakeVault{ - KeyStub: func(ctx context.Context, namespace, key string) (*signer.VaultKey, error) { - return nil, errors.New(errors.Internal) - }, - }, - errkind: errors.Internal, - errtext: "error getting signing key", - }, { name: "valid credential but signer returns unsupported key type", namespace: "transit", @@ -452,6 +440,12 @@ func TestService_CredentialProof(t *testing.T) { assert.NotEmpty(t, vc.Proofs[0]["jws"]) } }) + + // Wait after each test case, because W3C domain has + // rate limiter, and resolving of VC base JSONLD contexts + // (i.e. https://www.w3.org/2018/credentials/v1) + // fails, which makes the tests fail. + time.Sleep(2 * time.Second) } }