aboutsummaryrefslogtreecommitdiffstats
path: root/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go')
-rw-r--r--certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go57
1 files changed, 42 insertions, 15 deletions
diff --git a/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go b/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go
index 1a066657..39af8ec6 100644
--- a/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go
+++ b/certServiceK8sExternalProvider/src/cmpv2provisioner/cmpv2_provisioner_test.go
@@ -21,7 +21,6 @@
package cmpv2provisioner
import (
- "context"
"testing"
"time"
@@ -38,6 +37,7 @@ import (
const ISSUER_NAME = "cmpv2-issuer"
const ISSUER_URL = "issuer/url"
+const ISSUER_UPDATE_URL = "update-url"
const ISSUER_NAMESPACE = "onap"
func Test_shouldCreateCorrectCertServiceCA(t *testing.T) {
@@ -77,19 +77,17 @@ func Test_shouldReturnCorrectSignedPemsWhenParametersAreCorrectForCertificateReq
testdata.VerifyThatConditionIsTrue(ok, "Provisioner could not be loaded", t)
- ctx := context.Background()
request := createCertificateRequest()
privateKeyBytes := getPrivateKeyBytes()
signCertificateModel := model.SignCertificateModel{
- CertificateRequest: request,
- PrivateKeyBytes: privateKeyBytes,
- IsUpdateRevision: false,
- OldCertificate: "",
- OldPrivateKey: "",
+ CertificateRequest: request,
+ PrivateKeyBytes: privateKeyBytes,
+ OldCertificateBytes: []byte{},
+ OldPrivateKeyBytes: []byte{},
}
- signedPEM, trustedCAs, err := provisioner.Sign(ctx, signCertificateModel)
+ signedPEM, trustedCAs, err := provisioner.Sign(signCertificateModel)
assert.Nil(t, err)
@@ -108,19 +106,47 @@ func Test_shouldReturnCorrectSignedPemsWhenParametersAreCorrectForUpdateCertific
testdata.VerifyThatConditionIsTrue(ok, "Provisioner could not be loaded", t)
- ctx := context.Background()
request := createCertificateRequest()
privateKeyBytes := getPrivateKeyBytes()
signCertificateModel := model.SignCertificateModel{
- CertificateRequest: request,
- PrivateKeyBytes: privateKeyBytes,
- IsUpdateRevision: true,
- OldCertificate: testdata.OldCertificateEncoded,
- OldPrivateKey: testdata.OldPrivateKeyEncoded,
+ CertificateRequest: request,
+ PrivateKeyBytes: privateKeyBytes,
+ OldCertificateBytes: testdata.OldCertificateBytes,
+ OldPrivateKeyBytes: testdata.OldPrivateKeyBytes,
}
- signedPEM, trustedCAs, err := provisioner.Sign(ctx, signCertificateModel)
+ signedPEM, trustedCAs, err := provisioner.Sign(signCertificateModel)
+
+ assert.Nil(t, err)
+
+ testdata.VerifyCertsAreEqualToExpected(t, signedPEM, trustedCAs)
+}
+
+func Test_shouldReturnCorrectSignedPemForCertificateRequestWhenUpdateEndpointConfigurationIsMissing(t *testing.T) {
+ issuer := createIssuerAndCerts(ISSUER_NAME, ISSUER_URL)
+ issuer.Spec.UpdateEndpoint = ""
+ provisionerFactory := ProvisionerFactoryMock{}
+ provisioner, err := provisionerFactory.CreateProvisioner(&issuer, apiv1.Secret{})
+
+ issuerNamespaceName := testdata.CreateIssuerNamespaceName(ISSUER_NAMESPACE, ISSUER_NAME)
+ Store(issuerNamespaceName, provisioner)
+
+ provisioner, ok := Load(issuerNamespaceName)
+
+ testdata.VerifyThatConditionIsTrue(ok, "Provisioner could not be loaded", t)
+
+ request := createCertificateRequest()
+ privateKeyBytes := getPrivateKeyBytes()
+
+ signCertificateModel := model.SignCertificateModel{
+ CertificateRequest: request,
+ PrivateKeyBytes: privateKeyBytes,
+ OldCertificateBytes: testdata.OldCertificateBytes,
+ OldPrivateKeyBytes: testdata.OldPrivateKeyBytes,
+ }
+
+ signedPEM, trustedCAs, err := provisioner.Sign(signCertificateModel)
assert.Nil(t, err)
@@ -131,6 +157,7 @@ func createIssuerAndCerts(name string, url string) cmpv2api.CMPv2Issuer {
issuer := cmpv2api.CMPv2Issuer{}
issuer.Name = name
issuer.Spec.URL = url
+ issuer.Spec.UpdateEndpoint = ISSUER_UPDATE_URL
return issuer
}