diff options
author | Tony Hansen <tony@att.com> | 2019-10-13 00:45:21 +0000 |
---|---|---|
committer | Gerrit Code Review <gerrit@onap.org> | 2019-10-13 00:45:21 +0000 |
commit | b9a91b3967a5b415d91bf00454b428bb93a567b6 (patch) | |
tree | 74f297ab20c75fd784b6d50d698b03aafbfe2c62 /src | |
parent | 4d4cd07c6f99a0db9e7cc69fbd43f50ef7e06942 (diff) | |
parent | 66a03964d15e5df6655f58a2450f60fb03dc717e (diff) |
Merge "Add tests for healthcheck port requests in ApiAuthInterception"
Diffstat (limited to 'src')
-rw-r--r-- | src/test/java/org/onap/dcae/restapi/ApiAuthInterceptionTest.java | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/src/test/java/org/onap/dcae/restapi/ApiAuthInterceptionTest.java b/src/test/java/org/onap/dcae/restapi/ApiAuthInterceptionTest.java index e6d67cf4..c80b56cb 100644 --- a/src/test/java/org/onap/dcae/restapi/ApiAuthInterceptionTest.java +++ b/src/test/java/org/onap/dcae/restapi/ApiAuthInterceptionTest.java @@ -174,4 +174,40 @@ public class ApiAuthInterceptionTest { verify(response).setStatus(HttpStatus.UNAUTHORIZED.value()); verify(writer).write(ApiException.UNAUTHORIZED_USER.toJSON().toString()); } + + @Test + public void shouldSucceedForHealthcheckOnHealthcheckPort() throws IOException { + // given + final HttpServletRequest request = + MockMvcRequestBuilders + .get("/healthcheck") + .buildRequest(null); + + when(settings.authMethod()).thenReturn(AuthMethodType.CERT_BASIC_AUTH.value()); + when(settings.httpPort()).thenReturn(request.getServerPort()); + + // when + final boolean isAuthorized = sut.preHandle(request, response, obj); + + // then + assertTrue(isAuthorized); + } + + @Test + public void shouldFailDueToNotPermittedOperationOnHealthcheckPort() throws IOException { + // given + final HttpServletRequest request = createEmptyRequest(); + + when(settings.authMethod()).thenReturn(AuthMethodType.CERT_BASIC_AUTH.value()); + when(settings.httpPort()).thenReturn(request.getServerPort()); + when(response.getWriter()).thenReturn(writer); + + // when + final boolean isAuthorized = sut.preHandle(request, response, obj); + + // then + assertFalse(isAuthorized); + verify(response).setStatus(HttpStatus.BAD_REQUEST.value()); + } + } |