diff options
Diffstat (limited to 'certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go')
-rw-r--r-- | certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go | 57 |
1 files changed, 42 insertions, 15 deletions
diff --git a/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go b/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go index 1a066657..39af8ec6 100644 --- a/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go +++ b/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go @@ -21,7 +21,6 @@ package cmpv2provisioner import ( - "context" "testing" "time" @@ -38,6 +37,7 @@ import ( const ISSUER_NAME = "cmpv2-issuer" const ISSUER_URL = "issuer/url" +const ISSUER_UPDATE_URL = "update-url" const ISSUER_NAMESPACE = "onap" func Test_shouldCreateCorrectCertServiceCA(t *testing.T) { @@ -77,19 +77,17 @@ func Test_shouldReturnCorrectSignedPemsWhenParametersAreCorrectForCertificateReq testdata.VerifyThatConditionIsTrue(ok, "Provisioner could not be loaded", t) - ctx := context.Background() request := createCertificateRequest() privateKeyBytes := getPrivateKeyBytes() signCertificateModel := model.SignCertificateModel{ - CertificateRequest: request, - PrivateKeyBytes: privateKeyBytes, - IsUpdateRevision: false, - OldCertificate: "", - OldPrivateKey: "", + CertificateRequest: request, + PrivateKeyBytes: privateKeyBytes, + OldCertificateBytes: []byte{}, + OldPrivateKeyBytes: []byte{}, } - signedPEM, trustedCAs, err := provisioner.Sign(ctx, signCertificateModel) + signedPEM, trustedCAs, err := provisioner.Sign(signCertificateModel) assert.Nil(t, err) @@ -108,19 +106,47 @@ func Test_shouldReturnCorrectSignedPemsWhenParametersAreCorrectForUpdateCertific testdata.VerifyThatConditionIsTrue(ok, "Provisioner could not be loaded", t) - ctx := context.Background() request := createCertificateRequest() privateKeyBytes := getPrivateKeyBytes() signCertificateModel := model.SignCertificateModel{ - CertificateRequest: request, - PrivateKeyBytes: privateKeyBytes, - IsUpdateRevision: true, - OldCertificate: testdata.OldCertificateEncoded, - OldPrivateKey: testdata.OldPrivateKeyEncoded, + CertificateRequest: request, + PrivateKeyBytes: privateKeyBytes, + OldCertificateBytes: testdata.OldCertificateBytes, + OldPrivateKeyBytes: testdata.OldPrivateKeyBytes, } - signedPEM, trustedCAs, err := provisioner.Sign(ctx, signCertificateModel) + signedPEM, trustedCAs, err := provisioner.Sign(signCertificateModel) + + assert.Nil(t, err) + + testdata.VerifyCertsAreEqualToExpected(t, signedPEM, trustedCAs) +} + +func Test_shouldReturnCorrectSignedPemForCertificateRequestWhenUpdateEndpointConfigurationIsMissing(t *testing.T) { + issuer := createIssuerAndCerts(ISSUER_NAME, ISSUER_URL) + issuer.Spec.UpdateEndpoint = "" + provisionerFactory := ProvisionerFactoryMock{} + provisioner, err := provisionerFactory.CreateProvisioner(&issuer, apiv1.Secret{}) + + issuerNamespaceName := testdata.CreateIssuerNamespaceName(ISSUER_NAMESPACE, ISSUER_NAME) + Store(issuerNamespaceName, provisioner) + + provisioner, ok := Load(issuerNamespaceName) + + testdata.VerifyThatConditionIsTrue(ok, "Provisioner could not be loaded", t) + + request := createCertificateRequest() + privateKeyBytes := getPrivateKeyBytes() + + signCertificateModel := model.SignCertificateModel{ + CertificateRequest: request, + PrivateKeyBytes: privateKeyBytes, + OldCertificateBytes: testdata.OldCertificateBytes, + OldPrivateKeyBytes: testdata.OldPrivateKeyBytes, + } + + signedPEM, trustedCAs, err := provisioner.Sign(signCertificateModel) assert.Nil(t, err) @@ -131,6 +157,7 @@ func createIssuerAndCerts(name string, url string) cmpv2api.CMPv2Issuer { issuer := cmpv2api.CMPv2Issuer{} issuer.Name = name issuer.Spec.URL = url + issuer.Spec.UpdateEndpoint = ISSUER_UPDATE_URL return issuer } |