@Mock
private UserPermissionsDao userPermissionsDao; // do not delete. needed for permissionService
@Mock
- private PermissionsRules permissionsRules;
+ private PermissionsRules permissionsRulesMock;
@InjectMocks
@Spy
private PermissionsServicesImpl permissionsServices;
@Test
public void testExecute() {
- Mockito.doNothing().when(permissionsRules).executeAction(anyString(), anyString(), anyString());
+ Mockito.doNothing().when(permissionsRulesMock).executeAction(anyString(), anyString(), anyString());
permissionsServices.execute(ITEM1_ID, USER1_ID, PERMISSION);
- Mockito.verify(permissionsRules, times(1)).executeAction(anyString(), anyString(), anyString());
+ Mockito.verify(permissionsRulesMock, times(1)).executeAction(anyString(), anyString(), anyString());
}
@Test
@Test
public void testIsAllowed() {
when(permissionsDaoMock.getUserItemPermission(ITEM1_ID, USER1_ID)).thenReturn(Optional.of(PERMISSION));
- when(permissionsRules.isAllowed(PERMISSION, ACTION_SUBMIT)).thenReturn(true);
+ when(permissionsRulesMock.isAllowed(PERMISSION, ACTION_SUBMIT)).thenReturn(true);
boolean result = permissionsServices.isAllowed(ITEM1_ID, USER1_ID, ACTION_SUBMIT);
Assert.assertTrue(result);
- }
+ }
- @Test
- public void testUpdatePermissions() {
+ @Test
+ public void shouldUpdatePermissions(){
Set<String> addedUsers = new HashSet<>();
addedUsers.add(USER2_ID);
permissionsServices.updateItemPermissions(ITEM1_ID, PERMISSION, addedUsers, new HashSet<>());
- verify(permissionsRules).executeAction(ITEM1_ID, USER1_ID, CHANGE_PERMISSIONS);
- verify(permissionsRules).updatePermission(ITEM1_ID, USER1_ID, PERMISSION, addedUsers, new HashSet<>());
+ verify(permissionsRulesMock).executeAction(ITEM1_ID, USER1_ID, CHANGE_PERMISSIONS);
+ verify(permissionsRulesMock).updatePermission(ITEM1_ID, USER1_ID, PERMISSION, addedUsers, new HashSet<>());
verify(permissionsDaoMock).updateItemPermissions(ITEM1_ID, PERMISSION, addedUsers, new
HashSet<>());
}
+ @Test
+ public void shouldExecutePermissionRules(){
+ permissionsServices.execute(ITEM1_ID,USER1_ID,ACTION_SUBMIT);
+ verify(permissionsRulesMock).executeAction(ITEM1_ID,USER1_ID,ACTION_SUBMIT);
+ }
+
+ @Test
+ public void shouldReturnUserItemPermission(){
+ doReturn(Optional.of(PERMISSION)).when(permissionsDaoMock).getUserItemPermission(ITEM1_ID, USER1_ID);
+ Optional<String> actual = permissionsServices.getUserItemPermission(ITEM1_ID, USER1_ID);
+ Assert.assertTrue(actual.isPresent());
+ Assert.assertEquals(actual.get(), PERMISSION);
+ }
+
+ @Test
+ public void shouldDeleteItemPermissions(){
+ permissionsServices.deleteItemPermissions(ITEM1_ID);
+ verify(permissionsDaoMock).deleteItemPermissions(ITEM1_ID);
+ }
+
private static ItemPermissionsEntity createPermissionEntity(String itemId, String
userId, String permission) {
--- /dev/null
+package org.openecomp.sdc.vendorsoftwareproduct.dao.errors;
+
+import static org.openecomp.sdc.vendorsoftwareproduct.errors.VendorSoftwareProductErrorCodes.INVALID_EXTENSION;
+
+import org.junit.Before;
+import org.junit.Test;
+import org.openecomp.sdc.common.errors.ErrorCategory;
+import org.openecomp.sdc.common.errors.ErrorCode;
+import org.testng.Assert;
+
+public class OrchestrationTemplateFileExtensionErrorBuilderTest {
+
+ private OrchestrationTemplateFileExtensionErrorBuilder orchestrationTemplateFileExtensionErrorBuilder;
+
+ @Before
+ public void setUp() {
+ orchestrationTemplateFileExtensionErrorBuilder = new OrchestrationTemplateFileExtensionErrorBuilder();
+ }
+
+ @Test
+ public void shouldReturnInvalidExtentionErrorCode(){
+ ErrorCode actual = orchestrationTemplateFileExtensionErrorBuilder.build();
+ Assert.assertEquals(actual.category(), ErrorCategory.APPLICATION);
+ Assert.assertEquals(actual.id(), INVALID_EXTENSION);
+ }
+}
--- /dev/null
+package org.openecomp.sdc.vendorsoftwareproduct.dao.errors;
+
+import static org.openecomp.sdc.vendorsoftwareproduct.errors.VendorSoftwareProductErrorCodes.FAILED_TO_CREATE_VSP;
+
+import org.junit.Before;
+import org.junit.Test;
+import org.openecomp.sdc.common.errors.ErrorCategory;
+import org.openecomp.sdc.common.errors.ErrorCode;
+import org.testng.Assert;
+
+public class VendorSoftwareProductCreationFailedBuilderTest {
+
+ private static final String VSP_ID = "testVsp1";
+ private VendorSoftwareProductCreationFailedBuilder vendorSoftwareProductCreationFailedBuilder;
+
+ @Before
+ public void setUp() {
+ vendorSoftwareProductCreationFailedBuilder = new VendorSoftwareProductCreationFailedBuilder(VSP_ID);
+ }
+
+ @Test
+ public void shouldReturnVspNotFoundErrorCode(){
+ ErrorCode actual = vendorSoftwareProductCreationFailedBuilder.build();
+ Assert.assertEquals(actual.category(), ErrorCategory.APPLICATION);
+ Assert.assertEquals(actual.id(), FAILED_TO_CREATE_VSP);
+ }
+}
--- /dev/null
+package org.openecomp.sdc.vendorsoftwareproduct.dao.errors;
+
+import static org.openecomp.sdc.vendorsoftwareproduct.errors.VendorSoftwareProductErrorCodes.VSP_NOT_FOUND;
+
+import org.junit.Before;
+import org.junit.Test;
+import org.openecomp.sdc.common.errors.ErrorCategory;
+import org.openecomp.sdc.common.errors.ErrorCode;
+import org.testng.Assert;
+
+public class VendorSoftwareProductNotFoundErrorBuilderTest {
+
+ private static final String VSP_ID = "testVsp1";
+ private VendorSoftwareProductNotFoundErrorBuilder vendorSoftwareProductNotFoundErrorBuilder;
+
+ @Before
+ public void setUp() {
+ vendorSoftwareProductNotFoundErrorBuilder = new VendorSoftwareProductNotFoundErrorBuilder(VSP_ID);
+ }
+
+ @Test
+ public void shouldReturnVspNotFoundErrorCode(){
+ ErrorCode actual = vendorSoftwareProductNotFoundErrorBuilder.build();
+ Assert.assertEquals(actual.category(), ErrorCategory.APPLICATION);
+ Assert.assertEquals(actual.id(), VSP_NOT_FOUND);
+ }
+}