Expect(payload).To(MatchJSON(`[ { "guid": "bad25cff-9332-48a6-8603-b619858e7992", "name": "default_tcp", "features": [ "tcp" ] }]`)) }) It("checks for routing.router_groups.read scope", func() { var err error request, err = http.NewRequest("GET", routing_api.ListRouterGroups, nil) Expect(err).NotTo(HaveOccurred()) routerGroupHandler.ListRouterGroups(responseRecorder, request) _, permission := token.DecodeTokenArgsForCall(0) Expect(permission).To(ConsistOf(handlers.RouterGroupsReadScope)) }) Context("when authorization token is invalid", func() { BeforeEach(func() { token.DecodeTokenReturns(errors.New("kaboom")) }) It("returns Unauthorized error", func() { var err error request, err = http.NewRequest("GET", routing_api.ListRouterGroups, nil) Expect(err).NotTo(HaveOccurred()) routerGroupHandler.ListRouterGroups(responseRecorder, request) Expect(responseRecorder.Code).To(Equal(http.StatusUnauthorized)) })