Improve coverage of cadi-aaf 91/46291/1
authorIanHowell <ian.howell@att.com>
Fri, 4 May 2018 19:47:07 +0000 (14:47 -0500)
committerIanHowell <ian.howell@att.com>
Fri, 4 May 2018 19:47:11 +0000 (14:47 -0500)
Issue-ID: AAF-223
Change-Id: I35e96f91c32df3d2b14a6edc796d71a31a86872e
Signed-off-by: IanHowell <ian.howell@att.com>
cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_ArtifactDir.java
cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactInFiles.java [new file with mode: 0644]
cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactInKeystore.java [new file with mode: 0644]
cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactOnStream.java [new file with mode: 0644]
cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactScripts.java [new file with mode: 0644]
cadi/aaf/src/test/resources/cert.pem [new file with mode: 0644]
cadi/aaf/src/test/resources/key.pem [new file with mode: 0644]

index 1f68cf6..855c26f 100644 (file)
@@ -69,6 +69,7 @@ public class JU_ArtifactDir {
        @AfterClass
        public static void tearDownOnce() {
                cleanup();
+               ArtifactDir.clear();
        }
 
        @Test
diff --git a/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactInFiles.java b/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactInFiles.java
new file mode 100644 (file)
index 0000000..3c83112
--- /dev/null
@@ -0,0 +1,100 @@
+/**
+ * ============LICENSE_START====================================================
+ * org.onap.aaf
+ * ===========================================================================
+ * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
+ * ===========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END====================================================
+ *
+ */
+
+package org.onap.aaf.cadi.cm.test;
+
+import static org.junit.Assert.*;
+import static org.hamcrest.CoreMatchers.*;
+import static org.mockito.Mockito.*;
+
+import java.io.File;
+import java.util.ArrayList;
+import java.util.List;
+
+import org.junit.*;
+import org.mockito.*;
+import org.onap.aaf.cadi.CadiException;
+import org.onap.aaf.cadi.cm.PlaceArtifactInFiles;
+import org.onap.aaf.misc.env.Trans;
+
+import certman.v1_0.Artifacts.Artifact;
+import certman.v1_0.CertInfo;
+
+public class JU_PlaceArtifactInFiles {
+
+       @Mock private Trans transMock;
+       @Mock private CertInfo certInfoMock;
+       @Mock private Artifact artiMock;
+
+       private static final String dirName = "src/test/resources/artifacts";
+       private static final String nsName = "org.onap.test";
+       private static final String luggagePassword = "12345";  // That's the stupidest combination I've ever heard in my life
+
+       private List<String> certs;
+
+       @Before
+       public void setup() {
+               MockitoAnnotations.initMocks(this);
+
+               certs = new ArrayList<>();
+               certs.add("cert1");
+               certs.add("cert2");
+
+               when(certInfoMock.getChallenge()).thenReturn(luggagePassword);
+               when(certInfoMock.getCerts()).thenReturn(certs);
+
+               when(artiMock.getDir()).thenReturn(dirName);
+               when(artiMock.getNs()).thenReturn(nsName);
+       }
+
+       @AfterClass
+       public static void tearDownOnce() {
+               cleanup();
+               PlaceArtifactInFiles.clear();
+       }
+
+       @Test
+       public void test() throws CadiException {
+               PlaceArtifactInFiles placer = new PlaceArtifactInFiles();
+               placer.place(transMock, certInfoMock, artiMock, "machine");
+               assertThat(placer._place(transMock, certInfoMock, artiMock), is(true));
+               assertThat(new File(dirName + '/' + nsName + ".crt").exists(), is(true));
+               assertThat(new File(dirName + '/' + nsName + ".key").exists(), is(true));
+               
+               when(certInfoMock.getCerts()).thenReturn(null);
+               try {
+                       placer._place(transMock, certInfoMock, artiMock);
+                       fail("Should've thrown an exception");
+               } catch (Exception e) {
+               }
+       }
+
+       private static void cleanup() {
+               File dir = new File(dirName);
+               if (dir.exists()) {
+                       for (File f : dir.listFiles()) {
+                               f.delete();
+                       }
+                       dir.delete();
+               }
+       }
+
+}
diff --git a/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactInKeystore.java b/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactInKeystore.java
new file mode 100644 (file)
index 0000000..02054cb
--- /dev/null
@@ -0,0 +1,144 @@
+/**
+ * ============LICENSE_START====================================================
+ * org.onap.aaf
+ * ===========================================================================
+ * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
+ * ===========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END====================================================
+ *
+ */
+
+package org.onap.aaf.cadi.cm.test;
+
+import static org.junit.Assert.*;
+import static org.hamcrest.CoreMatchers.*;
+import static org.mockito.Mockito.*;
+
+import java.io.BufferedReader;
+import java.io.ByteArrayOutputStream;
+import java.io.File;
+import java.io.FileNotFoundException;
+import java.io.FileReader;
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+import java.security.cert.CertificateException;
+
+import org.junit.*;
+import org.mockito.*;
+import org.onap.aaf.cadi.CadiException;
+import org.onap.aaf.cadi.cm.PlaceArtifactInKeystore;
+import org.onap.aaf.misc.env.Env;
+import org.onap.aaf.misc.env.TimeTaken;
+import org.onap.aaf.misc.env.Trans;
+
+import certman.v1_0.Artifacts.Artifact;
+import certman.v1_0.CertInfo;
+
+public class JU_PlaceArtifactInKeystore {
+
+       @Mock private Trans transMock;
+       @Mock private CertInfo certInfoMock;
+       @Mock private Artifact artiMock;
+
+       private static final String dirName = "src/test/resources/artifacts";
+       private static final String nsName = "org.onap.test";
+       private static final String mechID = "m12345";
+       private static final String luggagePassword = "12345";  // That's the stupidest combination I've ever heard in my life
+
+       private static String privateKeyString;
+       private static String x509Chain;
+       private static String x509String;
+
+       private List<String> certs;
+
+       @Before
+       public void setup() throws FileNotFoundException, IOException, CertificateException {
+               MockitoAnnotations.initMocks(this);
+
+               x509Chain = fromFile(new File("src/test/resources/cert.pem"));
+               x509String = fromFile(new File("src/test/resources/exampleCertificate.cer"));
+               privateKeyString = fromFile(new File("src/test/resources/key.pem"));
+
+               certs = new ArrayList<>();
+
+               when(certInfoMock.getChallenge()).thenReturn(luggagePassword);
+               when(certInfoMock.getCerts()).thenReturn(certs);
+
+               when(artiMock.getDir()).thenReturn(dirName);
+               when(artiMock.getNs()).thenReturn(nsName);
+               when(artiMock.getMechid()).thenReturn(mechID);
+
+               when(certInfoMock.getPrivatekey()).thenReturn(privateKeyString);
+
+               when(transMock.start("Reconstitute Private Key", Env.SUB)).thenReturn(mock(TimeTaken.class));
+       }
+
+       @AfterClass
+       public static void tearDownOnce() {
+               cleanup();
+               PlaceArtifactInKeystore.clear();
+       }
+
+       @Test
+       public void test() throws CadiException {
+               PlaceArtifactInKeystore placer = new PlaceArtifactInKeystore("pkcs12");
+
+               certs.add(x509String);
+               certs.add(x509Chain);
+               assertThat(placer.place(transMock, certInfoMock, artiMock, "machine"), is(true));
+               for (String ext : new String[] {"chal", "keyfile", "pkcs12", "props", "trust.pkcs12"}) {
+                       assertThat(new File(dirName + '/' + nsName + '.' + ext).exists(), is(true));
+               }
+
+               // coverage
+               assertThat(placer.place(transMock, certInfoMock, artiMock, "machine"), is(true));
+               
+               when(certInfoMock.getCerts()).thenReturn(null);
+               try {
+                       placer._place(transMock, certInfoMock, artiMock);
+                       fail("Should've thrown an exception");
+               } catch (Exception e) {
+               }
+
+       }
+
+       private static void cleanup() {
+               File dir = new File(dirName);
+               if (dir.exists()) {
+                       for (File f : dir.listFiles()) {
+                               f.delete();
+                       }
+                       dir.delete();
+               }
+       }
+
+       public String fromFile(File file) throws IOException {
+               BufferedReader br = new BufferedReader(new FileReader(file));
+               ByteArrayOutputStream baos = new ByteArrayOutputStream();
+               String line;
+               baos.write(br.readLine().getBytes());
+               // Here comes the hacky part
+               baos.write("\n".getBytes());
+               while((line=br.readLine())!=null) {
+                       if(line.length()>0) {
+                               baos.write(line.getBytes());
+                               baos.write("\n".getBytes());
+                       }
+               }
+               br.close();
+               return baos.toString();
+       }
+}
diff --git a/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactOnStream.java b/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactOnStream.java
new file mode 100644 (file)
index 0000000..6e390be
--- /dev/null
@@ -0,0 +1,101 @@
+/**
+ * ============LICENSE_START====================================================
+ * org.onap.aaf
+ * ===========================================================================
+ * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
+ * ===========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END====================================================
+ *
+ */
+
+package org.onap.aaf.cadi.cm.test;
+
+import static org.junit.Assert.*;
+import static org.hamcrest.CoreMatchers.*;
+import static org.mockito.Mockito.*;
+
+import java.io.ByteArrayOutputStream;
+import java.io.PrintStream;
+import java.util.ArrayList;
+import java.util.List;
+
+import org.junit.*;
+import org.mockito.*;
+
+import org.onap.aaf.cadi.cm.PlaceArtifactOnStream;
+import org.onap.aaf.misc.env.LogTarget;
+import org.onap.aaf.misc.env.Trans;
+
+import certman.v1_0.Artifacts.Artifact;
+import certman.v1_0.CertInfo;
+
+public class JU_PlaceArtifactOnStream {
+
+       @Mock private Trans transMock;
+       @Mock private CertInfo certInfoMock;
+       @Mock private Artifact artiMock;
+
+       private static final String luggagePassword = "12345";  // That's the stupidest combination I've ever heard in my life
+       private static final String privateKeyString = "I'm a private key!";
+       
+       private ByteArrayOutputStream outStream;
+
+       private List<String> certs;
+
+       @Before
+       public void setup() {
+               MockitoAnnotations.initMocks(this);
+
+               certs = new ArrayList<>();
+               certs.add("cert1");
+               certs.add("cert2");
+
+               when(certInfoMock.getChallenge()).thenReturn(luggagePassword);
+               when(certInfoMock.getCerts()).thenReturn(certs);
+               when(certInfoMock.getPrivatekey()).thenReturn(privateKeyString);
+               
+               outStream = new ByteArrayOutputStream();
+       }
+
+       @Test
+       public void test() {
+               PlaceArtifactOnStream placer = new PlaceArtifactOnStream(new PrintStream(outStream));
+               placer.place(transMock, certInfoMock, artiMock, "machine");
+               
+               String[] output = outStream.toString().split("\n", 0);
+               
+               String[] expected = {
+                               "Challenge:  " + luggagePassword,
+                               "PrivateKey:",
+                               privateKeyString,
+                               "Certificate Chain:",
+                               "cert1",
+                               "cert2"
+               };
+               
+               assertThat(output.length, is(expected.length));
+               for (int i = 0; i < output.length; i++) {
+                       assertThat(output[i], is(expected[i]));
+               }
+
+               // coverage
+               when(certInfoMock.getNotes()).thenReturn("");
+               placer.place(transMock, certInfoMock, artiMock, "machine");
+
+               when(certInfoMock.getNotes()).thenReturn("Some Notes");
+               when(transMock.info()).thenReturn(mock(LogTarget.class));
+               placer.place(transMock, certInfoMock, artiMock, "machine");
+       }
+
+}
diff --git a/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactScripts.java b/cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_PlaceArtifactScripts.java
new file mode 100644 (file)
index 0000000..0ed29e1
--- /dev/null
@@ -0,0 +1,92 @@
+/**
+ * ============LICENSE_START====================================================
+ * org.onap.aaf
+ * ===========================================================================
+ * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
+ * ===========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END====================================================
+ *
+ */
+
+package org.onap.aaf.cadi.cm.test;
+
+import static org.junit.Assert.*;
+import static org.hamcrest.CoreMatchers.*;
+import static org.mockito.Mockito.*;
+
+import java.io.File;
+
+import org.junit.*;
+import org.mockito.*;
+import org.onap.aaf.cadi.CadiException;
+import org.onap.aaf.cadi.cm.PlaceArtifactScripts;
+import org.onap.aaf.misc.env.Trans;
+
+import certman.v1_0.Artifacts.Artifact;
+import certman.v1_0.CertInfo;
+
+public class JU_PlaceArtifactScripts {
+
+       @Mock private Trans transMock;
+       @Mock private CertInfo certInfoMock;
+       @Mock private Artifact artiMock;
+
+       private static final String dirName = "src/test/resources/artifacts";
+       private static final String nsName = "org.onap.test";
+       private static final String luggagePassword = "12345";  // That's the stupidest combination I've ever heard in my life
+       private static final String notification = "A notification";
+       private static final String osUser = "user";  // That's the stupidest combination I've ever heard in my life
+
+       @Before
+       public void setup() {
+               MockitoAnnotations.initMocks(this);
+
+               when(artiMock.getDir()).thenReturn(dirName);
+               when(artiMock.getNs()).thenReturn(nsName);
+               when(artiMock.getNotification()).thenReturn(notification);
+               when(artiMock.getOsUser()).thenReturn(osUser);
+
+               when(certInfoMock.getChallenge()).thenReturn(luggagePassword);
+       }
+
+       @AfterClass
+       public static void tearDownOnce() {
+               cleanup();
+               PlaceArtifactScripts.clear();
+       }
+
+       @Test
+       public void test() throws CadiException {
+               PlaceArtifactScripts placer = new PlaceArtifactScripts();
+               placer.place(transMock, certInfoMock, artiMock, "machine");
+
+               assertThat(new File(dirName + '/' + nsName + ".crontab.sh").exists(), is(true));
+               assertThat(new File(dirName + '/' + nsName + ".check.sh").exists(), is(true));
+
+               //coverage
+               when(artiMock.getNotification()).thenReturn("mailto: " + notification);
+               placer.place(transMock, certInfoMock, artiMock, "machine");
+       }
+
+       private static void cleanup() {
+               File dir = new File(dirName);
+               if (dir.exists()) {
+                       for (File f : dir.listFiles()) {
+                               f.delete();
+                       }
+                       dir.delete();
+               }
+       }
+
+}
diff --git a/cadi/aaf/src/test/resources/cert.pem b/cadi/aaf/src/test/resources/cert.pem
new file mode 100644 (file)
index 0000000..175c949
--- /dev/null
@@ -0,0 +1,33 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
diff --git a/cadi/aaf/src/test/resources/key.pem b/cadi/aaf/src/test/resources/key.pem
new file mode 100644 (file)
index 0000000..a5818db
--- /dev/null
@@ -0,0 +1,52 @@
+-----BEGIN PRIVATE KEY-----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+-----END PRIVATE KEY-----