aboutsummaryrefslogtreecommitdiffstats
path: root/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java
diff options
context:
space:
mode:
authorMichal Banka <michal.banka@nokia.com>2020-02-19 11:48:59 +0100
committerMichal Banka <michal.banka@nokia.com>2020-02-24 10:56:18 +0100
commit2edef3c2aaafba49439e20aa13eb647c67c781d5 (patch)
treebf1dd67aab8a2ed19260fb270321ccb746841f20 /certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java
parent1e81a4ebe5141878b054e72d000ac0e7f6bc3d71 (diff)
Added validation of configuration
Fields are being validated right after reading servers details from JSON (when application starts). Created own annotation to validate server URL with proper requirements. When invalid details are given application closes. Signed-off-by: Michal Banka <michal.banka@nokia.com> Change-Id: I3e476266056ec0fb637f01f9d4d4c63b1f0d1c6a Issue-ID: AAF-997
Diffstat (limited to 'certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java')
-rw-r--r--certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java54
1 files changed, 54 insertions, 0 deletions
diff --git a/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java b/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java
new file mode 100644
index 00000000..9e220560
--- /dev/null
+++ b/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java
@@ -0,0 +1,54 @@
+/*
+ * ============LICENSE_START=======================================================
+ * PROJECT
+ * ================================================================================
+ * Copyright (C) 2020 Nokia. All rights reserved.
+ * ================================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=========================================================
+ */
+
+package org.onap.aaf.certservice.certification.configuration.validation.constraints.violations;
+
+import org.junit.jupiter.api.Test;
+
+import static org.junit.jupiter.api.Assertions.*;
+
+class RequestTypeViolationTest {
+
+ private RequestTypeViolation violation = new RequestTypeViolation();
+
+ @Test
+ public void givenValidRequestTypeShouldReturnTrue() {
+ //given
+ String validURL = "http://127.0.0.1/ejbca/publicweb/cmp/cmp";
+
+ //when
+ boolean result = violation.validate(validURL);
+
+ //then
+ assertTrue(result);
+ }
+
+ @Test
+ public void givenInvalidRequestTypeShouldReturnFalse() {
+ //given
+ String invalidURL = "htestps://127.0.0.1/ejbca/publicweb/cmp/cmp";
+
+ //when
+ boolean result = violation.validate(invalidURL);
+
+ //then
+ assertFalse(result);
+ }
+} \ No newline at end of file