aboutsummaryrefslogtreecommitdiffstats
path: root/certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java
diff options
context:
space:
mode:
authorawudzins <adam.wudzinski@nokia.com>2020-03-03 14:51:21 +0100
committerawudzins <adam.wudzinski@nokia.com>2020-03-04 13:44:52 +0100
commit09128196b16368651e8fa2a20140216e086700f2 (patch)
treef66c560d95b2140448b7414c1a34b7d0594cd9a5 /certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java
parent552f87238fbc04b63a992645217dcfded40cb122 (diff)
Fix reload endpoint to return status
Signed-off-by: Adam Wudzinski <adam.wudzinski@nokia.com> Issue-ID: AAF-997 wChange-Id: I4563428ef407b4dc8c84c3efc8ec213145806b32 Change-Id: Iee33a26feb5cc1acd39d91ee9f34a49183040e06
Diffstat (limited to 'certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java')
-rw-r--r--certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java133
1 files changed, 133 insertions, 0 deletions
diff --git a/certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java b/certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java
new file mode 100644
index 00000000..2fc6d665
--- /dev/null
+++ b/certService/src/test/java/org/onap/aaf/certservice/api/CertificationControllerTest.java
@@ -0,0 +1,133 @@
+/*
+ * ============LICENSE_START=======================================================
+ * PROJECT
+ * ================================================================================
+ * Copyright (C) 2020 Nokia. All rights reserved.
+ * ================================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=========================================================
+ */
+
+package org.onap.aaf.certservice.api;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertThrows;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+import com.google.gson.Gson;
+import java.io.IOException;
+import java.util.Arrays;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.ExtendWith;
+import org.mockito.Mock;
+import org.mockito.junit.jupiter.MockitoExtension;
+import org.onap.aaf.certservice.certification.CertificationModelFactory;
+import org.onap.aaf.certservice.certification.CsrModelFactory;
+import org.onap.aaf.certservice.certification.CsrModelFactory.StringBase64;
+import org.onap.aaf.certservice.certification.exception.CsrDecryptionException;
+import org.onap.aaf.certservice.certification.exception.DecryptionException;
+import org.onap.aaf.certservice.certification.exception.KeyDecryptionException;
+import org.onap.aaf.certservice.certification.model.CertificationModel;
+import org.onap.aaf.certservice.certification.model.CsrModel;
+import org.springframework.http.HttpStatus;
+import org.springframework.http.ResponseEntity;
+
+
+@ExtendWith(MockitoExtension.class)
+class CertificationControllerTest {
+
+ private CertificationController certificationController;
+
+ @Mock
+ private CsrModelFactory csrModelFactory;
+
+ @Mock
+ private CertificationModelFactory certificationModelFactory;
+
+ @BeforeEach
+ void setUp() {
+ certificationController = new CertificationController(csrModelFactory, certificationModelFactory);
+ }
+
+ @Test
+ void shouldReturnDataAboutCsrBaseOnEncodedParameters() throws DecryptionException {
+ // given
+ final String testStringCsr = "testData";
+ final String testCaName = "TestCa";
+ CsrModel mockedCsrModel = mock(CsrModel.class);
+ CertificationModel testCertificationModel = new CertificationModel(
+ Arrays.asList("ENTITY_CERT", "INTERMEDIATE_CERT"),
+ Arrays.asList("CA_CERT", "EXTRA_CA_CERT")
+ );
+ when(mockedCsrModel.toString()).thenReturn(testStringCsr);
+ when(csrModelFactory.createCsrModel(any(StringBase64.class), any(StringBase64.class)))
+ .thenReturn(mockedCsrModel);
+ when(certificationModelFactory.createCertificationModel(mockedCsrModel, testCaName))
+ .thenReturn(testCertificationModel);
+
+ // when
+ ResponseEntity<String> testResponse =
+ certificationController.signCertificate(testCaName, "encryptedCSR", "encryptedPK");
+
+ CertificationModel responseCertificationModel = new Gson().fromJson(testResponse.getBody(), CertificationModel.class);
+
+ // then
+ assertEquals(HttpStatus.OK, testResponse.getStatusCode());
+ assertThat(responseCertificationModel
+ ).isEqualToComparingFieldByField(testCertificationModel);
+
+ }
+
+ @Test
+ void shouldThrowCsrDecryptionExceptionWhenCreatingCsrModelFails() throws DecryptionException {
+ // given
+ String expectedMessage = "Incorrect CSR, decryption failed";
+ when(csrModelFactory.createCsrModel(any(StringBase64.class), any(StringBase64.class)))
+ .thenThrow(new CsrDecryptionException(expectedMessage,new IOException()));
+
+ // when
+ Exception exception = assertThrows(
+ CsrDecryptionException.class, () -> certificationController.
+ signCertificate("TestCa", "encryptedCSR", "encryptedPK")
+ );
+
+ String actualMessage = exception.getMessage();
+
+ // then
+ assertEquals(expectedMessage, actualMessage);
+ }
+
+ @Test
+ void shouldThrowPemDecryptionExceptionWhenCreatingPemModelFails() throws DecryptionException {
+ // given
+ String expectedMessage = "Incorrect PEM, decryption failed";
+ when(csrModelFactory.createCsrModel(any(StringBase64.class), any(StringBase64.class)))
+ .thenThrow(new KeyDecryptionException(expectedMessage,new IOException()));
+
+ // when
+ Exception exception = assertThrows(
+ KeyDecryptionException.class, () -> certificationController.
+ signCertificate("TestCa", "encryptedCSR", "encryptedPK")
+ );
+
+ String actualMessage = exception.getMessage();
+
+ // then
+ assertEquals(expectedMessage, actualMessage);
+ }
+
+}