From b5985fb5667b3ee9b6a4a0675fb57f55e7a288b7 Mon Sep 17 00:00:00 2001 From: sg481n Date: Sun, 1 Oct 2017 21:06:52 +0000 Subject: Improve code coverage for aaf cadi modules Updated few testcases. Issue-ID: AAF-79 Change-Id: If0760b6f3e74d52fa5132224bf1e6f5e3099f0e4 Signed-off-by: sg481n --- .../org/onap/aaf/cadi/aaf/v2_0/AAFAuthnTest.java | 155 +++++++++++++++++++++ 1 file changed, 155 insertions(+) create mode 100644 aaf/src/test/java/org/onap/aaf/cadi/aaf/v2_0/AAFAuthnTest.java (limited to 'aaf/src/test/java/org/onap/aaf/cadi/aaf/v2_0/AAFAuthnTest.java') diff --git a/aaf/src/test/java/org/onap/aaf/cadi/aaf/v2_0/AAFAuthnTest.java b/aaf/src/test/java/org/onap/aaf/cadi/aaf/v2_0/AAFAuthnTest.java new file mode 100644 index 0000000..961418c --- /dev/null +++ b/aaf/src/test/java/org/onap/aaf/cadi/aaf/v2_0/AAFAuthnTest.java @@ -0,0 +1,155 @@ +/******************************************************************************* + * ============LICENSE_START==================================================== + * * org.onap.aaf + * * =========================================================================== + * * Copyright © 2017 AT&T Intellectual Property. All rights reserved. + * * =========================================================================== + * * Licensed under the Apache License, Version 2.0 (the "License"); + * * you may not use this file except in compliance with the License. + * * You may obtain a copy of the License at + * * + * * http://www.apache.org/licenses/LICENSE-2.0 + * * + * * Unless required by applicable law or agreed to in writing, software + * * distributed under the License is distributed on an "AS IS" BASIS, + * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * * See the License for the specific language governing permissions and + * * limitations under the License. + * * ============LICENSE_END==================================================== + * * + * * ECOMP is a trademark and service mark of AT&T Intellectual Property. + * * + ******************************************************************************/ +package org.onap.aaf.cadi.aaf.v2_0; +import static org.junit.Assert.*; + +import org.junit.Test; + + + +import static org.junit.Assert.*; +import static org.mockito.Matchers.anyInt; +import static org.mockito.Mockito.when; + + +import org.junit.Before; +import org.junit.Test; +import org.mockito.Answers; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.onap.aaf.cadi.AbsUserCache; +import org.onap.aaf.cadi.CadiException; +import org.onap.aaf.cadi.aaf.AAFPermission; +import org.onap.aaf.cadi.client.Future; +import org.onap.aaf.inno.env.APIException; + +import com.att.aft.dme2.internal.jersey.api.client.Client; + +public class AAFAuthnTest { + + @Mock(answer = Answers.RETURNS_DEEP_STUBS) + private AAFCon con; + + @Mock(answer = Answers.RETURNS_DEEP_STUBS) + private Future fp; + + @Mock(answer = Answers.RETURNS_DEEP_STUBS) + private AbsUserCache cache; + + + @Before + public void setup() throws APIException, CadiException { + MockitoAnnotations.initMocks(this); + when(con.client(AAFCon.AAF_LATEST_VERSION).read("/authn/basicAuth", "text/plain")).thenReturn(fp); + } + + @Test + public void testAAFAuthnAAFConOfCLIENT() throws Exception { + when(fp.get(anyInt())).thenReturn(false); + when(fp.code()).thenReturn(401); + when(fp.header("WWW-Authenticate")).thenReturn("Basic realm=\"Value\""); + AAFAuthn auth = new AAFAuthn(con); + + assertNotNull(auth.validate("NewUser", "New Password"));; + } + + @Test + public void testAAFAuthnAAFConOfCLIENTAbsUserCacheOfAAFPermission() throws Exception { + AAFAuthn auth = new AAFAuthn(con,cache); + } + + @Test + public void testAAFAuthnAAFConOfCLIENT1() throws Exception { + when(fp.get(anyInt())).thenReturn(false); + when(fp.code()).thenReturn(401); + when(fp.header("WWW-Authenticate")).thenReturn("Basic realm=\"Value\""); + AAFAuthn auth = new AAFAuthn(con); + + assertNotNull(auth.validate("NewUser1", "New Password1"));; + } + + @Test + public void testAAFAuthnAAFConOfCLIENTAbsUserCacheOfAAFPermission1() throws Exception { + AAFAuthn auth = new AAFAuthn(con,cache); + } + + @Test + public void testAAFAuthnAAFConOfCLIENT2() throws Exception { + when(fp.get(anyInt())).thenReturn(false); + when(fp.code()).thenReturn(401); + when(fp.header("WWW-Authenticate")).thenReturn("Basic realm=\"Value\""); + AAFAuthn auth = new AAFAuthn(con); + + assertNotNull(auth.validate("NewUser2", "New Password2"));; + } + + @Test + public void testAAFAuthnAAFConOfCLIENTAbsUserCacheOfAAFPermission2() throws Exception { + AAFAuthn auth = new AAFAuthn(con,cache); + } + + @Test + public void testAAFAuthnAAFConOfCLIENT3() throws Exception { + when(fp.get(anyInt())).thenReturn(false); + when(fp.code()).thenReturn(401); + when(fp.header("WWW-Authenticate")).thenReturn("Basic realm=\"Value\""); + AAFAuthn auth = new AAFAuthn(con); + + assertNotNull(auth.validate("NewUser3", "New Password3"));; + } + + @Test + public void testAAFAuthnAAFConOfCLIENTAbsUserCacheOfAAFPermission3() throws Exception { + AAFAuthn auth = new AAFAuthn(con,cache); + } + + @Test + public void testAAFAuthnAAFConOfCLIENT4() throws Exception { + when(fp.get(anyInt())).thenReturn(false); + when(fp.code()).thenReturn(401); + when(fp.header("WWW-Authenticate")).thenReturn("Basic realm=\"Value\""); + AAFAuthn auth = new AAFAuthn(con); + + assertNotNull(auth.validate("NewUser4", "New Password4"));; + } + + @Test + public void testAAFAuthnAAFConOfCLIENTAbsUserCacheOfAAFPermission4() throws Exception { + AAFAuthn auth = new AAFAuthn(con,cache); + } + + @Test + public void testAAFAuthnAAFConOfCLIENT5() throws Exception { + when(fp.get(anyInt())).thenReturn(false); + when(fp.code()).thenReturn(401); + when(fp.header("WWW-Authenticate")).thenReturn("Basic realm=\"Value\""); + AAFAuthn auth = new AAFAuthn(con); + + assertNotNull(auth.validate("NewUser5", "New Password5"));; + } + + @Test + public void testAAFAuthnAAFConOfCLIENTAbsUserCacheOfAAFPermission5() throws Exception { + AAFAuthn auth = new AAFAuthn(con,cache); + } +} -- cgit 1.2.3-korg