|
14 | 14 | */
|
15 | 15 | package org.hyperledger.besu.pki.keystore;
|
16 | 16 |
|
17 |
| -import static org.assertj.core.api.Assertions.assertThat; |
| 17 | +import static org.junit.jupiter.api.Assertions.assertEquals; |
| 18 | +import static org.junit.jupiter.api.Assertions.assertNotNull; |
| 19 | +import static org.junit.jupiter.api.Assertions.assertNull; |
18 | 20 |
|
19 | 21 | import java.nio.file.Path;
|
20 | 22 | import java.security.cert.Certificate;
|
21 | 23 |
|
22 |
| -import org.junit.Test; |
23 |
| -import org.junit.runner.RunWith; |
24 |
| -import org.junit.runners.Parameterized; |
| 24 | +import org.junit.jupiter.params.ParameterizedTest; |
| 25 | +import org.junit.jupiter.params.provider.MethodSource; |
25 | 26 |
|
26 |
| -@RunWith(Parameterized.class) |
27 | 27 | public abstract class BaseKeyStoreFileWrapperTest {
|
28 | 28 | protected static final String KEYSTORE_VALID_KEY_ALIAS = "partner1client1";
|
29 | 29 | protected static final String KEYSTORE_INVALID_KEY_ALIAS = "partner1clientinvalid";
|
30 | 30 | protected static final String TRUSTSTORE_VALID_CERTIFICATE_ALIAS = "interca";
|
31 | 31 | protected static final String TRUSTSTORE_INVALID_CERTIFICATE_ALIAS = "interca-invalid";
|
32 | 32 |
|
33 |
| - @Parameterized.Parameter public String keyStoreWrapperDescription; |
34 |
| - |
35 |
| - @Parameterized.Parameter(1) |
36 |
| - public boolean keystoreWrapperConfiguredWithTruststore; |
37 |
| - |
38 |
| - @Parameterized.Parameter(2) |
39 |
| - public KeyStoreWrapper keyStoreWrapper; |
40 |
| - |
41 | 33 | protected static Path toPath(final String path) throws Exception {
|
42 | 34 | return null == path
|
43 | 35 | ? null
|
44 | 36 | : Path.of(BaseKeyStoreFileWrapperTest.class.getResource(path).toURI());
|
45 | 37 | }
|
46 | 38 |
|
47 |
| - @Test |
48 |
| - public void getPublicKey_WithValidAlias_ReturnsExpectedValue() { |
49 |
| - assertThat(keyStoreWrapper.getPublicKey(KEYSTORE_VALID_KEY_ALIAS)) |
50 |
| - .as("Public key is not null") |
51 |
| - .isNotNull(); |
| 39 | + @ParameterizedTest |
| 40 | + @MethodSource("data") |
| 41 | + public void getPublicKey_WithValidAlias_ReturnsExpectedValue( |
| 42 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 43 | + assertNotNull( |
| 44 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPublicKey(KEYSTORE_VALID_KEY_ALIAS)); |
52 | 45 | }
|
53 | 46 |
|
54 |
| - @Test |
55 |
| - public void getPublicKey_WithInvalidAlias_ReturnsExpectedValue() { |
56 |
| - assertThat(keyStoreWrapper.getPublicKey(KEYSTORE_INVALID_KEY_ALIAS)) |
57 |
| - .as("Public key is null") |
58 |
| - .isNull(); |
| 47 | + @ParameterizedTest |
| 48 | + @MethodSource("data") |
| 49 | + public void getPublicKey_WithInvalidAlias_ReturnsExpectedValue( |
| 50 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 51 | + assertNull( |
| 52 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPublicKey(KEYSTORE_INVALID_KEY_ALIAS)); |
59 | 53 | }
|
60 | 54 |
|
61 |
| - @Test |
62 |
| - public void getPrivateKey_WithValidAlias_ReturnsExpectedValue() { |
63 |
| - assertThat(keyStoreWrapper.getPrivateKey(KEYSTORE_VALID_KEY_ALIAS)) |
64 |
| - .as("Private key is not null") |
65 |
| - .isNotNull(); |
| 55 | + @ParameterizedTest |
| 56 | + @MethodSource("data") |
| 57 | + public void getPrivateKey_WithValidAlias_ReturnsExpectedValue( |
| 58 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 59 | + assertNotNull( |
| 60 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPrivateKey(KEYSTORE_VALID_KEY_ALIAS), |
| 61 | + "Private key is not null"); |
66 | 62 | }
|
67 | 63 |
|
68 |
| - @Test |
69 |
| - public void getPrivateKey_WithInvalidAlias_ReturnsExpectedValue() { |
70 |
| - assertThat(keyStoreWrapper.getPrivateKey(KEYSTORE_INVALID_KEY_ALIAS)) |
71 |
| - .as("Private key is null") |
72 |
| - .isNull(); |
| 64 | + @ParameterizedTest |
| 65 | + @MethodSource("data") |
| 66 | + public void getPrivateKey_WithInvalidAlias_ReturnsExpectedValue( |
| 67 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 68 | + assertNull( |
| 69 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPrivateKey(KEYSTORE_INVALID_KEY_ALIAS), |
| 70 | + "Private key is null"); |
73 | 71 | }
|
74 | 72 |
|
75 |
| - @Test |
76 |
| - public void getCertificate_WithValidAlias_ReturnsExpectedValue() { |
77 |
| - assertThat(keyStoreWrapper.getCertificate(KEYSTORE_VALID_KEY_ALIAS)) |
78 |
| - .as("Certificate is not null") |
79 |
| - .isNotNull(); |
| 73 | + @ParameterizedTest |
| 74 | + @MethodSource("data") |
| 75 | + public void getCertificate_WithValidAlias_ReturnsExpectedValue( |
| 76 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 77 | + assertNotNull( |
| 78 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificate(KEYSTORE_VALID_KEY_ALIAS), |
| 79 | + "Certificate is not null"); |
80 | 80 | }
|
81 | 81 |
|
82 |
| - @Test |
83 |
| - public void getCertificate_WithInvalidAlias_ReturnsExpectedValue() { |
84 |
| - assertThat(keyStoreWrapper.getCertificate(KEYSTORE_INVALID_KEY_ALIAS)) |
85 |
| - .as("Certificate is null") |
86 |
| - .isNull(); |
| 82 | + @ParameterizedTest |
| 83 | + @MethodSource("data") |
| 84 | + public void getCertificate_WithInvalidAlias_ReturnsExpectedValue( |
| 85 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 86 | + assertNull( |
| 87 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificate(KEYSTORE_INVALID_KEY_ALIAS), |
| 88 | + "Certificate is null"); |
87 | 89 | }
|
88 | 90 |
|
89 |
| - @Test |
90 |
| - public void getCertificateChain_WithValidAlias_ReturnsExpectedValue() { |
91 |
| - assertThat(keyStoreWrapper.getCertificateChain(KEYSTORE_VALID_KEY_ALIAS)) |
92 |
| - .as("Certificate chain is not null") |
93 |
| - .isNotNull(); |
| 91 | + @ParameterizedTest |
| 92 | + @MethodSource("data") |
| 93 | + public void getCertificateChain_WithValidAlias_ReturnsExpectedValue( |
| 94 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 95 | + assertNotNull( |
| 96 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificateChain(KEYSTORE_VALID_KEY_ALIAS), |
| 97 | + "Certificate chain is not null"); |
94 | 98 | }
|
95 | 99 |
|
96 |
| - @Test |
97 |
| - public void getCertificateChain_WithInvalidAlias_ReturnsExpectedValue() { |
98 |
| - assertThat(keyStoreWrapper.getCertificateChain(KEYSTORE_INVALID_KEY_ALIAS)) |
99 |
| - .as("Certificate is null") |
100 |
| - .isNull(); |
| 100 | + @ParameterizedTest |
| 101 | + @MethodSource("data") |
| 102 | + public void getCertificateChain_WithInvalidAlias_ReturnsExpectedValue( |
| 103 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 104 | + assertNull( |
| 105 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificateChain( |
| 106 | + KEYSTORE_INVALID_KEY_ALIAS), |
| 107 | + "Certificate is null"); |
101 | 108 | }
|
102 | 109 |
|
103 |
| - @Test |
104 |
| - public void getCertificate_FromTruststore_WithValidAlias_ReturnsExpectedValue() { |
| 110 | + @ParameterizedTest |
| 111 | + @MethodSource("data") |
| 112 | + public void getCertificate_FromTruststore_WithValidAlias_ReturnsExpectedValue( |
| 113 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
105 | 114 | final Certificate certificate =
|
106 |
| - keyStoreWrapper.getCertificate(TRUSTSTORE_VALID_CERTIFICATE_ALIAS); |
107 |
| - if (keystoreWrapperConfiguredWithTruststore) { |
108 |
| - assertThat(certificate).as("Certificate is not null").isNotNull(); |
| 115 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificate( |
| 116 | + TRUSTSTORE_VALID_CERTIFICATE_ALIAS); |
| 117 | + if (keyStoreWrapperTestParameter.keystoreWrapperConfiguredWithTruststore) { |
| 118 | + assertNotNull(certificate, "Certificate is not null"); |
109 | 119 | } else {
|
110 |
| - assertThat(certificate).as("Certificate is null").isNull(); |
| 120 | + assertNull(certificate, "Certificate is null"); |
111 | 121 | }
|
112 | 122 | }
|
113 | 123 |
|
114 |
| - @Test |
115 |
| - public void getCertificate_FromTruststore_WithInvalidAlias_ReturnsExpectedValue() { |
116 |
| - assertThat(keyStoreWrapper.getPrivateKey(TRUSTSTORE_INVALID_CERTIFICATE_ALIAS)) |
117 |
| - .as("Certificate is null") |
118 |
| - .isNull(); |
| 124 | + @ParameterizedTest |
| 125 | + @MethodSource("data") |
| 126 | + public void getCertificate_FromTruststore_WithInvalidAlias_ReturnsExpectedValue( |
| 127 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 128 | + assertNull( |
| 129 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPrivateKey( |
| 130 | + TRUSTSTORE_INVALID_CERTIFICATE_ALIAS), |
| 131 | + "Certificate is null"); |
119 | 132 | }
|
120 | 133 |
|
121 |
| - @Test |
122 |
| - public void getCRLS_Check() { |
123 |
| - assertThat(keyStoreWrapper.getCRLs()).as("CRLs is not null").isNotNull(); |
124 |
| - assertThat(keyStoreWrapper.getCRLs().size()).as("CRLs size matches").isEqualTo(2); |
| 134 | + @ParameterizedTest |
| 135 | + @MethodSource("data") |
| 136 | + public void getCRLS_Check(final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 137 | + assertNotNull(keyStoreWrapperTestParameter.keyStoreWrapper.getCRLs(), "CRLs is not null"); |
| 138 | + assertEquals( |
| 139 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCRLs().size(), 2, "CRLs size matches"); |
| 140 | + } |
| 141 | + |
| 142 | + public static class KeyStoreWrapperTestParameter { |
| 143 | + public String keyStoreWrapperDescription; |
| 144 | + public boolean keystoreWrapperConfiguredWithTruststore; |
| 145 | + public KeyStoreWrapper keyStoreWrapper; |
| 146 | + |
| 147 | + public KeyStoreWrapperTestParameter( |
| 148 | + final String keyStoreWrapperDescription, |
| 149 | + final boolean keystoreWrapperConfiguredWithTruststore, |
| 150 | + final KeyStoreWrapper keyStoreWrapper) { |
| 151 | + this.keyStoreWrapperDescription = keyStoreWrapperDescription; |
| 152 | + this.keystoreWrapperConfiguredWithTruststore = keystoreWrapperConfiguredWithTruststore; |
| 153 | + this.keyStoreWrapper = keyStoreWrapper; |
| 154 | + } |
125 | 155 | }
|
126 | 156 | }
|
0 commit comments