diff options
author | 2020-02-19 11:48:59 +0100 | |
---|---|---|
committer | 2020-02-24 10:56:18 +0100 | |
commit | 2edef3c2aaafba49439e20aa13eb647c67c781d5 (patch) | |
tree | bf1dd67aab8a2ed19260fb270321ccb746841f20 /certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations | |
parent | 1e81a4ebe5141878b054e72d000ac0e7f6bc3d71 (diff) |
Added validation of configuration
Fields are being validated right after reading servers details from JSON (when application starts).
Created own annotation to validate server URL with proper requirements.
When invalid details are given application closes.
Signed-off-by: Michal Banka <michal.banka@nokia.com>
Change-Id: I3e476266056ec0fb637f01f9d4d4c63b1f0d1c6a
Issue-ID: AAF-997
Diffstat (limited to 'certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations')
2 files changed, 130 insertions, 0 deletions
diff --git a/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/PortNumberViolationTest.java b/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/PortNumberViolationTest.java new file mode 100644 index 00000000..8ae4cd88 --- /dev/null +++ b/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/PortNumberViolationTest.java @@ -0,0 +1,76 @@ +/* + * ============LICENSE_START======================================================= + * PROJECT + * ================================================================================ + * Copyright (C) 2020 Nokia. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ + + +package org.onap.aaf.certservice.certification.configuration.validation.constraints.violations; + +import org.junit.jupiter.api.Test; + +import static org.junit.jupiter.api.Assertions.*; + +class PortNumberViolationTest { + + private PortNumberViolation violation = new PortNumberViolation(); + + @Test + public void givenValidPortShouldReturnTrue() { + //given + String validURL1 = "http://127.0.0.1:8080/ejbca/publicweb/cmp/cmp"; + String validURL2 = "http://127.0.0.1:1/ejbca/publicweb/cmp/cmp"; + String validURL3 = "http://127.0.0.1:65535/ejbca/publicweb/cmp/cmp"; + + //when + boolean result1 = violation.validate(validURL1); + boolean result2 = violation.validate(validURL2); + boolean result3 = violation.validate(validURL3); + + //then + assertTrue(result1); + assertTrue(result2); + assertTrue(result3); + } + + @Test + public void givenEmptyPortShouldReturnTrue() { + //given + String validURL = "http://127.0.0.1/ejbca/publicweb/cmp/cmp"; + + //when + boolean result = violation.validate(validURL); + + //then + assertTrue(result); + } + + @Test + public void givenInvalidPortShouldReturnFalse() { + //given + String invalidURL1 = "http://127.0.0.1:0/ejbca/publicweb/cmp/cmp"; + String invalidURL2 = "http://127.0.0.1:65536/ejbca/publicweb/cmp/cmp"; + + //when + boolean result1 = violation.validate(invalidURL1); + boolean result2 = violation.validate(invalidURL2); + + //then + assertFalse(result1); + assertFalse(result2); + } +}
\ No newline at end of file diff --git a/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java b/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java new file mode 100644 index 00000000..9e220560 --- /dev/null +++ b/certService/src/test/java/org/onap/aaf/certservice/certification/configuration/validation/constraints/violations/RequestTypeViolationTest.java @@ -0,0 +1,54 @@ +/* + * ============LICENSE_START======================================================= + * PROJECT + * ================================================================================ + * Copyright (C) 2020 Nokia. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ + +package org.onap.aaf.certservice.certification.configuration.validation.constraints.violations; + +import org.junit.jupiter.api.Test; + +import static org.junit.jupiter.api.Assertions.*; + +class RequestTypeViolationTest { + + private RequestTypeViolation violation = new RequestTypeViolation(); + + @Test + public void givenValidRequestTypeShouldReturnTrue() { + //given + String validURL = "http://127.0.0.1/ejbca/publicweb/cmp/cmp"; + + //when + boolean result = violation.validate(validURL); + + //then + assertTrue(result); + } + + @Test + public void givenInvalidRequestTypeShouldReturnFalse() { + //given + String invalidURL = "htestps://127.0.0.1/ejbca/publicweb/cmp/cmp"; + + //when + boolean result = violation.validate(invalidURL); + + //then + assertFalse(result); + } +}
\ No newline at end of file |