-
Notifications
You must be signed in to change notification settings - Fork 23
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Added tests for DFSPrivateKeyServiceImpl and PathEncryptionImpl classes
- Loading branch information
Showing
2 changed files
with
122 additions
and
0 deletions.
There are no files selected for viewing
51 changes: 51 additions & 0 deletions
51
...st/java/de/adorsys/datasafe/directory/impl/profile/keys/DFSPrivateKeyServiceImplTest.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
package de.adorsys.datasafe.directory.impl.profile.keys; | ||
|
||
|
||
import de.adorsys.datasafe.directory.api.profile.keys.DocumentKeyStoreOperations; | ||
import de.adorsys.datasafe.encrypiton.api.keystore.KeyStoreService; | ||
import de.adorsys.datasafe.encrypiton.api.types.UserID; | ||
import de.adorsys.datasafe.encrypiton.api.types.UserIDAuth; | ||
import de.adorsys.datasafe.types.api.shared.BaseMockitoTest; | ||
import de.adorsys.datasafe.types.api.types.ReadKeyPassword; | ||
import lombok.SneakyThrows; | ||
import org.junit.jupiter.api.Assertions; | ||
import org.junit.jupiter.api.BeforeEach; | ||
import org.junit.jupiter.api.Test; | ||
import org.mockito.*; | ||
|
||
import java.security.*; | ||
|
||
|
||
import static org.mockito.ArgumentMatchers.any; | ||
import static org.mockito.Mockito.when; | ||
|
||
public class DFSPrivateKeyServiceImplTest extends BaseMockitoTest { | ||
@Mock | ||
private DocumentKeyStoreOperations keyStoreOper; | ||
@Mock | ||
private KeyStoreService keyStoreService; | ||
DFSPrivateKeyServiceImpl privateKeyService; | ||
@BeforeEach | ||
public void setUp() { | ||
privateKeyService = new DFSPrivateKeyServiceImpl(keyStoreOper); | ||
} | ||
|
||
@Test | ||
@SneakyThrows | ||
public void getKeyPair(){ | ||
ReadKeyPassword readKeyPassword = new ReadKeyPassword("keypass".toCharArray()); | ||
UserID user = new UserID("user1"); | ||
UserIDAuth userAuth = new UserIDAuth(user, readKeyPassword); | ||
|
||
KeyPairGenerator KeyGen = KeyPairGenerator.getInstance("RSA"); | ||
KeyPair keyPair = KeyGen.generateKeyPair(); | ||
|
||
when(keyStoreOper.getKeyPair(any())).thenReturn(keyPair); | ||
|
||
KeyPair keyPair1 = privateKeyService.getKeyPair(userAuth); | ||
Assertions.assertEquals(keyPair.getPublic(), keyPair1.getPublic()); | ||
Assertions.assertEquals(keyPair.getPrivate(), keyPair1.getPrivate()); | ||
} | ||
|
||
} | ||
|
71 changes: 71 additions & 0 deletions
71
.../test/java/de/adorsys/datasafe/encrypiton/impl/pathencryption/PathEncryptionImplTest.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
package de.adorsys.datasafe.encrypiton.impl.pathencryption; | ||
|
||
import de.adorsys.datasafe.directory.api.profile.keys.PrivateKeyService; | ||
import de.adorsys.datasafe.encrypiton.api.keystore.KeyStoreService; | ||
import de.adorsys.datasafe.encrypiton.api.pathencryption.encryption.SymmetricPathEncryptionService; | ||
import de.adorsys.datasafe.encrypiton.api.types.UserID; | ||
import de.adorsys.datasafe.encrypiton.api.types.UserIDAuth; | ||
import de.adorsys.datasafe.encrypiton.api.types.encryption.EncryptionConfig; | ||
import de.adorsys.datasafe.encrypiton.api.types.encryption.KeyCreationConfig; | ||
import de.adorsys.datasafe.encrypiton.api.types.keystore.*; | ||
import de.adorsys.datasafe.encrypiton.impl.keystore.KeyStoreServiceImpl; | ||
import de.adorsys.datasafe.types.api.resource.Uri; | ||
import de.adorsys.datasafe.types.api.shared.BaseMockitoTest; | ||
import de.adorsys.datasafe.types.api.types.ReadKeyPassword; | ||
import de.adorsys.datasafe.types.api.types.ReadStorePassword; | ||
import de.adorsys.keymanagement.juggler.services.DaggerBCJuggler; | ||
import org.junit.jupiter.api.Assertions; | ||
import org.junit.jupiter.api.BeforeEach; | ||
import org.junit.jupiter.api.Test; | ||
import org.mockito.*; | ||
|
||
import javax.crypto.SecretKey; | ||
import java.security.KeyStore; | ||
|
||
import static org.mockito.ArgumentMatchers.any; | ||
import static org.mockito.Mockito.when; | ||
|
||
public class PathEncryptionImplTest extends BaseMockitoTest { | ||
String uriString = "https://192.168.178.0.1:9090/minio/first/folder"; | ||
private final KeyStoreService keyStoreService = new KeyStoreServiceImpl( | ||
EncryptionConfig.builder().build().getKeystore(), | ||
DaggerBCJuggler.builder().build() | ||
); | ||
@Mock | ||
private SymmetricPathEncryptionService symmetricPathEncryptionService; | ||
@Mock | ||
private PrivateKeyService privateKeyService; | ||
|
||
PathEncryptionImpl pathEncryption; | ||
|
||
|
||
|
||
@BeforeEach | ||
void setUp() { | ||
pathEncryption = new PathEncryptionImpl(symmetricPathEncryptionService, privateKeyService); | ||
} | ||
|
||
@Test | ||
public void testPathEncryption() { | ||
ReadStorePassword storePassword = new ReadStorePassword("storepass"); | ||
ReadKeyPassword readKeyPassword = new ReadKeyPassword("keypass".toCharArray()); | ||
KeyStoreAuth keyStoreAuth = new KeyStoreAuth(storePassword, readKeyPassword); | ||
KeyID keyID = new KeyID("secret"); | ||
|
||
KeyCreationConfig config = KeyCreationConfig.builder().signKeyNumber(0).encKeyNumber(1).build(); | ||
KeyStore keystore = keyStoreService.createKeyStore(keyStoreAuth,config); | ||
KeyStoreAccess keyStoreAccess = new KeyStoreAccess(keystore, keyStoreAuth); | ||
|
||
SecretKey secretKey = keyStoreService.getSecretKey(keyStoreAccess, keyID); | ||
SecretKeyIDWithKey secretKeyID = new SecretKeyIDWithKey(keyID, secretKey); | ||
|
||
when(symmetricPathEncryptionService.encrypt(any(), any())).thenReturn(new Uri(uriString + ".enc")); | ||
when(privateKeyService.pathEncryptionSecretKey(any())).thenReturn(new AuthPathEncryptionSecretKey(secretKeyID,secretKeyID)); | ||
|
||
UserID user = new UserID("user1"); | ||
UserIDAuth userAuth = new UserIDAuth(user, readKeyPassword); | ||
|
||
Uri encryptedPath = pathEncryption.encrypt(userAuth, new Uri(uriString)); | ||
Assertions.assertEquals(encryptedPath, new Uri(uriString + ".enc")); | ||
} | ||
} |