diff options
author | Bogumil Zebek <bogumil.zebek@nokia.com> | 2021-02-19 08:36:45 +0100 |
---|---|---|
committer | Bogumil Zebek <bogumil.zebek@nokia.com> | 2021-02-22 07:44:18 +0000 |
commit | dff666365ea56fe9a0d6b89cdb85bb4bf7849122 (patch) | |
tree | b645c97aba8cd630dfdb9f1c015d8c7a492443af /security/crypt-password/src/test/java | |
parent | 0f93dcadfdb93b8251009f84567652a4675dfd5b (diff) |
Activate JUnits in project
- Fix project configuration: activate junits during project build
- Increase code coverage
Issue-ID: DCAEGEN2-1016
Signed-off-by: Zebek Bogumil <bogumil.zebek@nokia.com>
Change-Id: I3d6d3462b4582c20c77577640deff8cece10d4d2
Diffstat (limited to 'security/crypt-password/src/test/java')
-rw-r--r-- | security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java b/security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java new file mode 100644 index 00000000..a899bb98 --- /dev/null +++ b/security/crypt-password/src/test/java/org/onap/dcaegen2/services/sdk/security/EncodePasswordTest.java @@ -0,0 +1,87 @@ +/* + * ============LICENSE_START==================================== + * DCAEGEN2-SERVICES-SDK + * ========================================================= + * Copyright (C) 2021 Nokia. All rights reserved. + * ========================================================= + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END===================================== + */ +package org.onap.dcaegen2.services.sdk.security; + +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; + +import java.io.IOException; + +import static org.mockito.ArgumentMatchers.any; +import static org.mockito.ArgumentMatchers.eq; +import static org.mockito.Mockito.doNothing; +import static org.mockito.Mockito.mock; +import static org.mockito.Mockito.never; +import static org.mockito.Mockito.spy; +import static org.mockito.Mockito.verify; + +class EncodePasswordTest { + + public static final String PASSWORD_CANNOT_BE_EMPTY = "Password cannot be empty"; + public static final String PASSWORD_TO_ENCODE = "testPass"; + public static final String EMPTY_PASSWORD = ""; + private final CryptPassword cryptPassword = mock(CryptPassword.class); + private final CharsFromStreamReader charsFromStreamReader = mock(CharsFromStreamReader.class); + private final EncodePassword encodePassword = spy(new EncodePassword(cryptPassword, charsFromStreamReader)); + + @BeforeEach + void setUp() { + doNothing().when(encodePassword).printErrorAndExit(any(), any()); + } + + @Test + void shouldExitWithErrorCodeWhenPasswordIsNotAvailableInArgs() throws IOException { + // when + encodePassword.run(new String[]{}); + + // then + verify(charsFromStreamReader).readPasswordFromStdIn(); + verify(encodePassword).printErrorAndExit( + eq(ExitCode.INVALID_PASSWORD), + eq(PASSWORD_CANNOT_BE_EMPTY) + ); + } + + @Test + void shouldExitWithErrorCodeWhenPasswordIsEmpty() { + // when + encodePassword.run(new String[]{EMPTY_PASSWORD}); + + // then + verify(encodePassword).printErrorAndExit( + eq(ExitCode.INVALID_PASSWORD), + eq(PASSWORD_CANNOT_BE_EMPTY) + ); + } + + @Test + void shouldEncodePasswordWhenPasswordIsAvailableInArgs() throws IOException { + // when + encodePassword.run(new String[]{PASSWORD_TO_ENCODE}); + + // then + verify(charsFromStreamReader, never()).readPasswordFromStdIn(); + verify(cryptPassword).encode(eq(PASSWORD_TO_ENCODE)); + verify(encodePassword, never()).printErrorAndExit( + eq(ExitCode.INVALID_PASSWORD), + eq(PASSWORD_CANNOT_BE_EMPTY) + ); + } +} |