Skip to content

Commit

Permalink
Added test for PublicKeySerdeImpl class and tests for BucketAccessSer…
Browse files Browse the repository at this point in the history
…viceImpl and DefaultDFSConfig
  • Loading branch information
Thendo20 committed Jul 4, 2024
1 parent a131c86 commit f95d74c
Show file tree
Hide file tree
Showing 3 changed files with 76 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@
import de.adorsys.datasafe.encrypiton.api.types.UserIDAuth;
import de.adorsys.datasafe.types.api.resource.BasePrivateResource;
import de.adorsys.datasafe.types.api.resource.BasePublicResource;
import de.adorsys.datasafe.types.api.resource.Uri;
import de.adorsys.datasafe.types.api.shared.BaseMockitoTest;
import de.adorsys.datasafe.types.api.utils.ReadKeyPasswordTestFactory;
import org.junit.jupiter.api.Test;
Expand All @@ -14,6 +15,7 @@
class BucketAccessServiceImplTest extends BaseMockitoTest {

private static final String ABSOLUTE_BUCKET = "s3://bucket";
private final Uri uri = new Uri(ABSOLUTE_BUCKET);

private UserIDAuth auth = new UserIDAuth(new UserID(""), ReadKeyPasswordTestFactory.getForString(""));

Expand All @@ -35,4 +37,10 @@ void publicAccessFor() {
BasePublicResource.forAbsolutePublic(ABSOLUTE_BUCKET).getResource()).location().asURI()
).asString().isEqualTo(ABSOLUTE_BUCKET);
}
@Test
void withSystemAccess() {
assertThat(bucketAccessService.withSystemAccess(
BasePublicResource.forAbsolutePublic(ABSOLUTE_BUCKET)).location().asURI()
).asString().isEqualTo(ABSOLUTE_BUCKET);
}
}
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
package de.adorsys.datasafe.directory.impl.profile.dfs;

import de.adorsys.datasafe.directory.api.types.CreateUserPublicProfile;
import de.adorsys.datasafe.directory.impl.profile.config.DefaultDFSConfig;
import de.adorsys.datasafe.encrypiton.api.types.UserID;
import de.adorsys.datasafe.types.api.resource.Uri;
import de.adorsys.datasafe.types.api.types.ReadStorePassword;
import lombok.SneakyThrows;
import org.junit.jupiter.api.Assertions;
import org.junit.jupiter.api.Test;
Expand Down Expand Up @@ -38,5 +41,14 @@ public void checkUriWithSlash() {
Uri result2 = DefaultDFSConfig.addTrailingSlashIfNeeded(result1);
Assertions.assertEquals(new Uri(uriString + "/"), result2);
}
@Test
@SneakyThrows
public void createDefaultPublicTemplate() {
ReadStorePassword systemPassword = new ReadStorePassword("storePassword");
DefaultDFSConfig config = new DefaultDFSConfig(new URI(uriString), systemPassword);
CreateUserPublicProfile template = config.defaultPublicTemplate(new UserID("user1"));
Assertions.assertEquals(new UserID("user1"), template.getId());

}

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
package de.adorsys.datasafe.encrypiton.impl.keystore;

import de.adorsys.datasafe.encrypiton.api.keystore.KeyStoreService;
import de.adorsys.datasafe.encrypiton.api.types.encryption.EncryptionConfig;
import de.adorsys.datasafe.encrypiton.api.types.encryption.KeyCreationConfig;
import de.adorsys.datasafe.encrypiton.api.types.keystore.KeyStoreAccess;
import de.adorsys.datasafe.encrypiton.api.types.keystore.KeyStoreAuth;
import de.adorsys.datasafe.encrypiton.api.types.keystore.PublicKeyIDWithPublicKey;
import de.adorsys.datasafe.types.api.shared.BaseMockitoTest;
import de.adorsys.datasafe.types.api.types.ReadKeyPassword;
import de.adorsys.datasafe.types.api.types.ReadStorePassword;
import de.adorsys.datasafe.types.api.utils.ReadKeyPasswordTestFactory;
import de.adorsys.keymanagement.juggler.services.DaggerBCJuggler;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.mockito.InjectMocks;

import javax.inject.Inject;
import java.security.KeyStore;
import java.security.PublicKey;
import java.util.Base64;
import java.util.List;

import static org.assertj.core.api.AssertionsForClassTypes.assertThat;
import static org.mockito.Mockito.mock;

public class PublicKeySerdeImplTest extends BaseMockitoTest {
private KeyStoreService keyStoreService = new KeyStoreServiceImpl(
EncryptionConfig.builder().build().getKeystore(),
DaggerBCJuggler.builder().build()
);

@Test
public void writeAndReadPubKey(){
ReadStorePassword readStorePassword = new ReadStorePassword("storepass");
ReadKeyPassword readKeyPassword = ReadKeyPasswordTestFactory.getForString("keypass");

KeyStoreAuth keyStoreAuth = new KeyStoreAuth(readStorePassword, readKeyPassword);
KeyCreationConfig config = KeyCreationConfig.builder().signKeyNumber(0).encKeyNumber(1).build();
KeyStore keyStore = keyStoreService.createKeyStore(keyStoreAuth, config);

KeyStoreAccess keyStoreAccess = new KeyStoreAccess(keyStore, keyStoreAuth);
PublicKeySerdeImpl publicKeySerde = mock(PublicKeySerdeImpl.class);

List<PublicKeyIDWithPublicKey> publicKeys = keyStoreService.getPublicKeys(keyStoreAccess);

PublicKey publicKey = publicKeys.get(0).getPublicKey();
String encodedKey = publicKeySerde.writePubKey(publicKey);

assertThat(encodedKey).isEqualTo(Base64.getEncoder().encodeToString(publicKey.getEncoded()));

PublicKey readPublicKey = publicKeySerde.readPubKey(encodedKey);

assertThat(readPublicKey).isEqualTo(publicKey);
}
}

0 comments on commit f95d74c

Please sign in to comment.