diff options
Diffstat (limited to 'src/test/java/org')
9 files changed, 85 insertions, 226 deletions
diff --git a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/AuthorizationProviderFactoryTest.java b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/AuthorizationProviderFactoryTest.java index 7f441f0..bf7890e 100644 --- a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/AuthorizationProviderFactoryTest.java +++ b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/AuthorizationProviderFactoryTest.java @@ -20,6 +20,8 @@ *******************************************************************************/ package org.onap.dmaap.commonauth.kafka.base.authorization; +import static org.junit.Assert.assertNotNull; + import org.junit.Test; import org.junit.runner.RunWith; import org.powermock.core.classloader.annotations.PowerMockIgnore; @@ -31,8 +33,7 @@ public class AuthorizationProviderFactoryTest { @Test public void testFactory() { - AuthorizationProviderFactory.getProviderFactory().getProvider(); - + assertNotNull(AuthorizationProviderFactory.getProviderFactory().getProvider()); } } diff --git a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java index 1a2bd95..4f9de3d 100644 --- a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java +++ b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java @@ -3,6 +3,7 @@ * org.onap.dmaap * ================================================================================ * Copyright © 2017 AT&T Intellectual Property. All rights reserved. + * Modification copyright (C) 2021 Nordix Foundation. * ================================================================================ * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -24,6 +25,7 @@ import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertNull; +import static org.junit.Assert.assertTrue; import static org.mockito.Mockito.when; import org.junit.Before; @@ -31,11 +33,7 @@ import org.junit.Test; import org.junit.runner.RunWith; import org.mockito.Mock; import org.mockito.MockitoAnnotations; -import org.onap.aaf.cadi.PropAccess; -import org.onap.aaf.cadi.aaf.AAFPermission; import org.onap.aaf.cadi.aaf.v2_0.AAFAuthn; -import org.onap.aaf.cadi.aaf.v2_0.AAFConHttp; -import org.onap.aaf.cadi.aaf.v2_0.AbsAAFLur; import org.powermock.core.classloader.annotations.PowerMockIgnore; import org.powermock.modules.junit4.PowerMockRunner; @@ -48,21 +46,15 @@ public class Cadi3AAFProviderTest { @Mock private static AAFAuthn<?> aafAuthn; - - @Mock - private static AAFConHttp aafCon; - - @Mock - private static AbsAAFLur<AAFPermission> aafLur; - @Mock - private static PropAccess access; + static { + System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties"); + System.setProperty("enableCadi", "true"); + } @Before - public void setUp() throws Exception { + public void setUp() { MockitoAnnotations.initMocks(this); - System.setProperty("enableCadi", "true"); - System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties"); cadi3AAFProvider = new Cadi3AAFProvider(); } @@ -73,14 +65,12 @@ public class Cadi3AAFProviderTest { @Test public void testHasAdminPermission() { - assertEquals(cadi3AAFProvider.hasPermission("admin", "permission", "instance", "action"), true); + assertTrue(cadi3AAFProvider.hasPermission("admin", "permission", "instance", "action")); } - @Test(expected = NullPointerException.class) public void tesAuthenticate() throws Exception { - System.setProperty("enableCadi", "true"); when(aafAuthn.validate("userId", "password")).thenReturn("valid"); - assertEquals(cadi3AAFProvider.authenticate("userId", "password"), "valid"); + assertEquals("valid", cadi3AAFProvider.authenticate("userId", "password")); } @Test @@ -92,5 +82,4 @@ public class Cadi3AAFProviderTest { public void tesAuthenticateAdminwtWrongCred() throws Exception { assertNotNull(cadi3AAFProvider.authenticate("kafkaUsername", "api")); } - } diff --git a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/JUnitTestSuite.java b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/JUnitTestSuite.java deleted file mode 100644 index e9b52d1..0000000 --- a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/JUnitTestSuite.java +++ /dev/null @@ -1,41 +0,0 @@ -/*- - * ============LICENSE_START======================================================= - * ONAP Policy Engine - * ================================================================================ - * Copyright (C) 2017 AT&T Intellectual Property. All rights reserved. - * ================================================================================ - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - * ============LICENSE_END========================================================= - */ - -package org.onap.dmaap.commonauth.kafka.base.authorization; - -import junit.framework.TestSuite; -import org.junit.runner.RunWith; -import org.junit.runners.Suite; -import org.junit.runners.Suite.SuiteClasses; -import org.apache.log4j.Logger; - -@RunWith(Suite.class) -@SuiteClasses({ AuthorizationProviderFactoryTest.class, Cadi3AAFProviderTest.class }) -public class JUnitTestSuite { - private static final Logger LOGGER = Logger.getLogger(JUnitTestSuite.class); - - public static void main(String[] args) { - LOGGER.info("Running the test suite"); - - TestSuite tstSuite = new TestSuite(); - LOGGER.info("Total Test Counts " + tstSuite.countTestCases()); - } - -} diff --git a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/TestRunner.java b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/TestRunner.java deleted file mode 100644 index 7f7ea11..0000000 --- a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/TestRunner.java +++ /dev/null @@ -1,41 +0,0 @@ -/*- - * ============LICENSE_START======================================================= - * ONAP Policy Engine - * ================================================================================ - * Copyright (C) 2017 AT&T Intellectual Property. All rights reserved. - * ================================================================================ - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - * ============LICENSE_END========================================================= - */ - -package org.onap.dmaap.commonauth.kafka.base.authorization; - -import org.junit.runner.JUnitCore; -import org.junit.runner.Result; -import org.junit.runner.notification.Failure; -import org.apache.log4j.Logger; - -public class TestRunner { - private static final Logger LOGGER = Logger.getLogger(TestRunner.class); - - public static void main(String[] args) { - // TODO Auto-generated method stub - Result result = JUnitCore.runClasses(JUnitTestSuite.class); - for (Failure failure : result.getFailures()) { - LOGGER.info(failure.toString()); - - } - LOGGER.info(result.wasSuccessful()); - } - -} diff --git a/src/test/java/org/onap/dmaap/kafkaAuthorize/JUnitTestSuite.java b/src/test/java/org/onap/dmaap/kafkaAuthorize/JUnitTestSuite.java deleted file mode 100644 index 9486662..0000000 --- a/src/test/java/org/onap/dmaap/kafkaAuthorize/JUnitTestSuite.java +++ /dev/null @@ -1,41 +0,0 @@ -/*- - * ============LICENSE_START======================================================= - * ONAP Policy Engine - * ================================================================================ - * Copyright (C) 2017 AT&T Intellectual Property. All rights reserved. - * ================================================================================ - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - * ============LICENSE_END========================================================= - */ - -package org.onap.dmaap.kafkaAuthorize; - -import junit.framework.TestSuite; -import org.junit.runner.RunWith; -import org.junit.runners.Suite; -import org.junit.runners.Suite.SuiteClasses; -import org.apache.log4j.Logger; - -@RunWith(Suite.class) -@SuiteClasses({ KafkaCustomAuthorizerTest.class, PlainSaslServer1Test.class, PlainLoginModule1Test.class }) -public class JUnitTestSuite { - private static final Logger LOGGER = Logger.getLogger(JUnitTestSuite.class); - - public static void main(String[] args) { - LOGGER.info("Running the test suite"); - - TestSuite tstSuite = new TestSuite(); - LOGGER.info("Total Test Counts " + tstSuite.countTestCases()); - } - -} diff --git a/src/test/java/org/onap/dmaap/kafkaAuthorize/TestRunner.java b/src/test/java/org/onap/dmaap/kafkaAuthorize/TestRunner.java deleted file mode 100644 index 829d18d..0000000 --- a/src/test/java/org/onap/dmaap/kafkaAuthorize/TestRunner.java +++ /dev/null @@ -1,41 +0,0 @@ -/*- - * ============LICENSE_START======================================================= - * ONAP Policy Engine - * ================================================================================ - * Copyright (C) 2017 AT&T Intellectual Property. All rights reserved. - * ================================================================================ - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - * ============LICENSE_END========================================================= - */ - -package org.onap.dmaap.kafkaAuthorize; - -import org.junit.runner.JUnitCore; -import org.junit.runner.Result; -import org.junit.runner.notification.Failure; -import org.apache.log4j.Logger; - -public class TestRunner { - private static final Logger LOGGER = Logger.getLogger(TestRunner.class); - - public static void main(String[] args) { - // TODO Auto-generated method stub - Result result = JUnitCore.runClasses(JUnitTestSuite.class); - for (Failure failure : result.getFailures()) { - LOGGER.info(failure.toString()); - - } - LOGGER.info(result.wasSuccessful()); - } - -} diff --git a/src/test/java/org/onap/dmaap/kafkaAuthorize/KafkaCustomAuthorizerTest.java b/src/test/java/org/onap/dmaap/kafkaauthorize/KafkaCustomAuthorizerTest.java index 7f01be4..098d472 100644 --- a/src/test/java/org/onap/dmaap/kafkaAuthorize/KafkaCustomAuthorizerTest.java +++ b/src/test/java/org/onap/dmaap/kafkaauthorize/KafkaCustomAuthorizerTest.java @@ -3,6 +3,7 @@ * org.onap.dmaap * ================================================================================ * Copyright © 2017 AT&T Intellectual Property. All rights reserved. + * Modification copyright (C) 2021 Nordix Foundation. * ================================================================================ * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -18,7 +19,7 @@ * * *******************************************************************************/ -package org.onap.dmaap.kafkaAuthorize; +package org.onap.dmaap.kafkaauthorize; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertTrue; @@ -62,14 +63,14 @@ public class KafkaCustomAuthorizerTest { AuthorizationProvider provider; KafkaCustomAuthorizer authorizer; - + static { System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties"); + System.setProperty("enableCadi", "true"); } @Before - public void setUp() throws Exception { - + public void setUp() { MockitoAnnotations.initMocks(this); PowerMockito.when(principal.getName()).thenReturn("fullName"); PowerMockito.when(arg0.principal()).thenReturn(principal); @@ -85,13 +86,10 @@ public class KafkaCustomAuthorizerTest { @Test public void testAuthorizerSuccess() { - - PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub")) .thenReturn(true); authorizer = new KafkaCustomAuthorizer(); assertTrue(authorizer.authorize(arg0, arg1, arg2)); - } @Test diff --git a/src/test/java/org/onap/dmaap/kafkaAuthorize/PlainLoginModule1Test.java b/src/test/java/org/onap/dmaap/kafkaauthorize/PlainLoginModule1Test.java index 3fd9f0e..33a0708 100644 --- a/src/test/java/org/onap/dmaap/kafkaAuthorize/PlainLoginModule1Test.java +++ b/src/test/java/org/onap/dmaap/kafkaauthorize/PlainLoginModule1Test.java @@ -3,6 +3,7 @@ * org.onap.dmaap * ================================================================================ * Copyright © 2017 AT&T Intellectual Property. All rights reserved. + * Modification copyright (C) 2021 Nordix Foundation. * ================================================================================ * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -18,49 +19,62 @@ * * *******************************************************************************/ -package org.onap.dmaap.kafkaAuthorize; +package org.onap.dmaap.kafkaauthorize; -import javax.security.auth.login.LoginException; +import static org.junit.Assert.assertFalse; +import static org.junit.Assert.assertTrue; +import java.util.Map; +import javax.security.auth.Subject; +import javax.security.auth.callback.CallbackHandler; import org.junit.Before; import org.junit.Test; -import org.junit.runner.RunWith; +import org.mockito.Mock; import org.mockito.MockitoAnnotations; +import org.powermock.api.mockito.PowerMockito; import org.powermock.core.classloader.annotations.PowerMockIgnore; import org.powermock.core.classloader.annotations.PrepareForTest; -import org.powermock.modules.junit4.PowerMockRunner; -@RunWith(PowerMockRunner.class) @PowerMockIgnore({"jdk.internal.reflect.*"}) @PrepareForTest({ PlainLoginModule1.class }) public class PlainLoginModule1Test { - PlainLoginModule1 pLogin = new PlainLoginModule1(); - + static PlainLoginModule1 pLogin = new PlainLoginModule1(); + static Subject subject; + @Mock + static CallbackHandler callbackHandler; + + @Mock + static Map<String, String> mymap1; + + @Mock + static Map<String, ?> mymap2; + @Before - public void setUp() throws Exception { + public void setUp() { MockitoAnnotations.initMocks(this); + PowerMockito.when(mymap1.get("username")).thenReturn("user1"); + PowerMockito.when(mymap1.get("password")).thenReturn("pass1"); + pLogin.initialize(subject, callbackHandler, mymap1, mymap2); } @Test - public void testLogin() throws LoginException { - boolean b = pLogin.login(); - - assert(b==true); + public void testLogin() { + assertTrue(pLogin.login()); } @Test - public void testLogout() throws LoginException { - assert(pLogin.logout()==true); + public void testLogout() { + assertTrue(pLogin.logout()); } @Test - public void testCommit() throws LoginException { - assert(pLogin.commit()==true); + public void testCommit() { + assertTrue(pLogin.commit()); } @Test - public void testAbort() throws LoginException { - assert(pLogin.abort()==false); + public void testAbort() { + assertFalse(pLogin.abort()); } } diff --git a/src/test/java/org/onap/dmaap/kafkaAuthorize/PlainSaslServer1Test.java b/src/test/java/org/onap/dmaap/kafkaauthorize/PlainSaslServer1Test.java index c354378..6128978 100644 --- a/src/test/java/org/onap/dmaap/kafkaAuthorize/PlainSaslServer1Test.java +++ b/src/test/java/org/onap/dmaap/kafkaauthorize/PlainSaslServer1Test.java @@ -18,22 +18,27 @@ * * *******************************************************************************/ -package org.onap.dmaap.kafkaAuthorize; +package org.onap.dmaap.kafkaauthorize; +import static org.junit.Assert.assertEquals; +import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertTrue; +import java.util.Map; +import javax.security.auth.callback.CallbackHandler; +import javax.security.sasl.Sasl; import javax.security.sasl.SaslException; - import org.apache.kafka.common.errors.SaslAuthenticationException; -import org.apache.kafka.common.security.JaasContext; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import org.mockito.Mock; +import org.mockito.Mockito; import org.mockito.MockitoAnnotations; import org.onap.dmaap.commonauth.kafka.base.authorization.AuthorizationProvider; import org.onap.dmaap.commonauth.kafka.base.authorization.AuthorizationProviderFactory; +import org.onap.dmaap.kafkaauthorize.PlainSaslServer1.PlainSaslServerFactory1; import org.powermock.api.mockito.PowerMockito; import org.powermock.core.classloader.annotations.PowerMockIgnore; import org.powermock.core.classloader.annotations.PrepareForTest; @@ -45,16 +50,18 @@ import org.powermock.modules.junit4.PowerMockRunner; public class PlainSaslServer1Test { PlainSaslServer1 sslServer = new PlainSaslServer1(); - @Mock - JaasContext jaasContext; + @Mock AuthorizationProviderFactory factory; @Mock AuthorizationProvider provider; + @Mock + CallbackHandler callbackHandler; + @Mock + static Map<String, String> props; @Before - public void setUp() throws Exception { - + public void setUp() { MockitoAnnotations.initMocks(this); PowerMockito.mockStatic(AuthorizationProviderFactory.class); PowerMockito.when(AuthorizationProviderFactory.getProviderFactory()).thenReturn(factory); @@ -72,15 +79,13 @@ public class PlainSaslServer1Test { public void testAuthenticationEmptyAuth() throws Exception { String response = "\u0000username\u0000password"; PowerMockito.when(provider.authenticate("username", "password")).thenReturn(null); - sslServer.evaluateResponse(response.getBytes()); - assert(true); + assertNotNull(sslServer.evaluateResponse(response.getBytes())); } @Test public void testAuthenticationEmptyUser() throws Exception { String response = "authorizationID\u0000\u0000password"; PowerMockito.when(provider.authenticate("username", "password")).thenReturn(null); - try { sslServer.evaluateResponse(response.getBytes()); } @@ -88,6 +93,7 @@ public class PlainSaslServer1Test { assertNotNull(e); } } + @Test public void testAuthenticationEmptyPassword() throws Exception { String response = "authorizationID\u0000username\u0000"; @@ -102,7 +108,6 @@ public class PlainSaslServer1Test { @Test public void testGetAuthorizationIdWithException() { - try { sslServer.getAuthorizationID(); } @@ -113,7 +118,6 @@ public class PlainSaslServer1Test { @Test public void testGetNegotiatedPropertyWithException() { - try { sslServer.getNegotiatedProperty("test"); } @@ -124,7 +128,6 @@ public class PlainSaslServer1Test { @Test public void testIsComplete() { - try { sslServer.getNegotiatedProperty("test"); } @@ -134,7 +137,6 @@ public class PlainSaslServer1Test { assert(true); } - @Test public void testUnwrap() { try { @@ -159,5 +161,24 @@ public class PlainSaslServer1Test { e.printStackTrace(); } assert(true); - } + } + + @Test + public void testGetMech() { + assertEquals("PLAIN", sslServer.getMechanismName()); + } + + @Test + public void testIsCompleteBool() { + assertFalse(sslServer.isComplete()); + } + + @Test + public void testPlainSaslServer1() throws SaslException { + PlainSaslServerFactory1 plainSaslServerFactory1 = new PlainSaslServerFactory1(); + PlainSaslServer1 saslServer1 = (PlainSaslServer1) plainSaslServerFactory1.createSaslServer(PlainSaslServer1.PLAIN_MECHANISM, "https", "mySaslServer", props, callbackHandler); + assertNotNull(saslServer1); + Mockito.when(props.get(Sasl.POLICY_NOPLAINTEXT)).thenReturn("javax.security.sasl.policy.noplaintext"); + assertEquals(new String[]{"PLAIN"}, plainSaslServerFactory1.getMechanismNames(props)); + } } |