aboutsummaryrefslogtreecommitdiffstats
path: root/security/crypt-password/src/test/java
diff options
context:
space:
mode:
authorBogumil Zebek <bogumil.zebek@nokia.com>2021-02-19 08:36:45 +0100
committerBogumil Zebek <bogumil.zebek@nokia.com>2021-02-22 07:44:18 +0000
commitdff666365ea56fe9a0d6b89cdb85bb4bf7849122 (patch)
treeb645c97aba8cd630dfdb9f1c015d8c7a492443af /security/crypt-password/src/test/java
parent0f93dcadfdb93b8251009f84567652a4675dfd5b (diff)
Activate JUnits in project
- Fix project configuration: activate junits during project build - Increase code coverage Issue-ID: DCAEGEN2-1016 Signed-off-by: Zebek Bogumil <bogumil.zebek@nokia.com> Change-Id: I3d6d3462b4582c20c77577640deff8cece10d4d2
Diffstat (limited to 'security/crypt-password/src/test/java')
-rw-r--r--security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java87
1 files changed, 87 insertions, 0 deletions
diff --git a/security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java b/security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java
new file mode 100644
index 00000000..a899bb98
--- /dev/null
+++ b/security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java
@@ -0,0 +1,87 @@
+/*
+ * ============LICENSE_START====================================
+ * DCAEGEN2-SERVICES-SDK
+ * =========================================================
+ * Copyright (C) 2021 Nokia. All rights reserved.
+ * =========================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=====================================
+ */
+package org.onap.dcaegen2.services.sdk.security;
+
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+
+import java.io.IOException;
+
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.ArgumentMatchers.eq;
+import static org.mockito.Mockito.doNothing;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.spy;
+import static org.mockito.Mockito.verify;
+
+class EncodePasswordTest {
+
+ public static final String PASSWORD_CANNOT_BE_EMPTY = "Password cannot be empty";
+ public static final String PASSWORD_TO_ENCODE = "testPass";
+ public static final String EMPTY_PASSWORD = "";
+ private final CryptPassword cryptPassword = mock(CryptPassword.class);
+ private final CharsFromStreamReader charsFromStreamReader = mock(CharsFromStreamReader.class);
+ private final EncodePassword encodePassword = spy(new EncodePassword(cryptPassword, charsFromStreamReader));
+
+ @BeforeEach
+ void setUp() {
+ doNothing().when(encodePassword).printErrorAndExit(any(), any());
+ }
+
+ @Test
+ void shouldExitWithErrorCodeWhenPasswordIsNotAvailableInArgs() throws IOException {
+ // when
+ encodePassword.run(new String[]{});
+
+ // then
+ verify(charsFromStreamReader).readPasswordFromStdIn();
+ verify(encodePassword).printErrorAndExit(
+ eq(ExitCode.INVALID_PASSWORD),
+ eq(PASSWORD_CANNOT_BE_EMPTY)
+ );
+ }
+
+ @Test
+ void shouldExitWithErrorCodeWhenPasswordIsEmpty() {
+ // when
+ encodePassword.run(new String[]{EMPTY_PASSWORD});
+
+ // then
+ verify(encodePassword).printErrorAndExit(
+ eq(ExitCode.INVALID_PASSWORD),
+ eq(PASSWORD_CANNOT_BE_EMPTY)
+ );
+ }
+
+ @Test
+ void shouldEncodePasswordWhenPasswordIsAvailableInArgs() throws IOException {
+ // when
+ encodePassword.run(new String[]{PASSWORD_TO_ENCODE});
+
+ // then
+ verify(charsFromStreamReader, never()).readPasswordFromStdIn();
+ verify(cryptPassword).encode(eq(PASSWORD_TO_ENCODE));
+ verify(encodePassword, never()).printErrorAndExit(
+ eq(ExitCode.INVALID_PASSWORD),
+ eq(PASSWORD_CANNOT_BE_EMPTY)
+ );
+ }
+}