|
14 | 14 | */ |
15 | 15 | package org.hyperledger.besu.pki.keystore; |
16 | 16 |
|
17 | | -import static org.assertj.core.api.Assertions.assertThat; |
| 17 | +import static org.junit.jupiter.api.Assertions.assertEquals; |
| 18 | +import static org.junit.jupiter.api.Assertions.assertNotNull; |
| 19 | +import static org.junit.jupiter.api.Assertions.assertNull; |
18 | 20 |
|
19 | 21 | import java.nio.file.Path; |
20 | 22 | import java.security.cert.Certificate; |
21 | 23 |
|
22 | | -import org.junit.Test; |
23 | | -import org.junit.runner.RunWith; |
24 | | -import org.junit.runners.Parameterized; |
| 24 | +import org.junit.jupiter.params.ParameterizedTest; |
| 25 | +import org.junit.jupiter.params.provider.MethodSource; |
25 | 26 |
|
26 | | -@RunWith(Parameterized.class) |
27 | 27 | public abstract class BaseKeyStoreFileWrapperTest { |
28 | 28 | protected static final String KEYSTORE_VALID_KEY_ALIAS = "partner1client1"; |
29 | 29 | protected static final String KEYSTORE_INVALID_KEY_ALIAS = "partner1clientinvalid"; |
30 | 30 | protected static final String TRUSTSTORE_VALID_CERTIFICATE_ALIAS = "interca"; |
31 | 31 | protected static final String TRUSTSTORE_INVALID_CERTIFICATE_ALIAS = "interca-invalid"; |
32 | 32 |
|
33 | | - @Parameterized.Parameter public String keyStoreWrapperDescription; |
34 | | - |
35 | | - @Parameterized.Parameter(1) |
36 | | - public boolean keystoreWrapperConfiguredWithTruststore; |
37 | | - |
38 | | - @Parameterized.Parameter(2) |
39 | | - public KeyStoreWrapper keyStoreWrapper; |
40 | | - |
41 | 33 | protected static Path toPath(final String path) throws Exception { |
42 | 34 | return null == path |
43 | 35 | ? null |
44 | 36 | : Path.of(BaseKeyStoreFileWrapperTest.class.getResource(path).toURI()); |
45 | 37 | } |
46 | 38 |
|
47 | | - @Test |
48 | | - public void getPublicKey_WithValidAlias_ReturnsExpectedValue() { |
49 | | - assertThat(keyStoreWrapper.getPublicKey(KEYSTORE_VALID_KEY_ALIAS)) |
50 | | - .as("Public key is not null") |
51 | | - .isNotNull(); |
| 39 | + @ParameterizedTest |
| 40 | + @MethodSource("data") |
| 41 | + public void getPublicKey_WithValidAlias_ReturnsExpectedValue( |
| 42 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 43 | + assertNotNull( |
| 44 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPublicKey(KEYSTORE_VALID_KEY_ALIAS)); |
52 | 45 | } |
53 | 46 |
|
54 | | - @Test |
55 | | - public void getPublicKey_WithInvalidAlias_ReturnsExpectedValue() { |
56 | | - assertThat(keyStoreWrapper.getPublicKey(KEYSTORE_INVALID_KEY_ALIAS)) |
57 | | - .as("Public key is null") |
58 | | - .isNull(); |
| 47 | + @ParameterizedTest |
| 48 | + @MethodSource("data") |
| 49 | + public void getPublicKey_WithInvalidAlias_ReturnsExpectedValue( |
| 50 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 51 | + assertNull( |
| 52 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPublicKey(KEYSTORE_INVALID_KEY_ALIAS)); |
59 | 53 | } |
60 | 54 |
|
61 | | - @Test |
62 | | - public void getPrivateKey_WithValidAlias_ReturnsExpectedValue() { |
63 | | - assertThat(keyStoreWrapper.getPrivateKey(KEYSTORE_VALID_KEY_ALIAS)) |
64 | | - .as("Private key is not null") |
65 | | - .isNotNull(); |
| 55 | + @ParameterizedTest |
| 56 | + @MethodSource("data") |
| 57 | + public void getPrivateKey_WithValidAlias_ReturnsExpectedValue( |
| 58 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 59 | + assertNotNull( |
| 60 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPrivateKey(KEYSTORE_VALID_KEY_ALIAS), |
| 61 | + "Private key is not null"); |
66 | 62 | } |
67 | 63 |
|
68 | | - @Test |
69 | | - public void getPrivateKey_WithInvalidAlias_ReturnsExpectedValue() { |
70 | | - assertThat(keyStoreWrapper.getPrivateKey(KEYSTORE_INVALID_KEY_ALIAS)) |
71 | | - .as("Private key is null") |
72 | | - .isNull(); |
| 64 | + @ParameterizedTest |
| 65 | + @MethodSource("data") |
| 66 | + public void getPrivateKey_WithInvalidAlias_ReturnsExpectedValue( |
| 67 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 68 | + assertNull( |
| 69 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPrivateKey(KEYSTORE_INVALID_KEY_ALIAS), |
| 70 | + "Private key is null"); |
73 | 71 | } |
74 | 72 |
|
75 | | - @Test |
76 | | - public void getCertificate_WithValidAlias_ReturnsExpectedValue() { |
77 | | - assertThat(keyStoreWrapper.getCertificate(KEYSTORE_VALID_KEY_ALIAS)) |
78 | | - .as("Certificate is not null") |
79 | | - .isNotNull(); |
| 73 | + @ParameterizedTest |
| 74 | + @MethodSource("data") |
| 75 | + public void getCertificate_WithValidAlias_ReturnsExpectedValue( |
| 76 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 77 | + assertNotNull( |
| 78 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificate(KEYSTORE_VALID_KEY_ALIAS), |
| 79 | + "Certificate is not null"); |
80 | 80 | } |
81 | 81 |
|
82 | | - @Test |
83 | | - public void getCertificate_WithInvalidAlias_ReturnsExpectedValue() { |
84 | | - assertThat(keyStoreWrapper.getCertificate(KEYSTORE_INVALID_KEY_ALIAS)) |
85 | | - .as("Certificate is null") |
86 | | - .isNull(); |
| 82 | + @ParameterizedTest |
| 83 | + @MethodSource("data") |
| 84 | + public void getCertificate_WithInvalidAlias_ReturnsExpectedValue( |
| 85 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 86 | + assertNull( |
| 87 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificate(KEYSTORE_INVALID_KEY_ALIAS), |
| 88 | + "Certificate is null"); |
87 | 89 | } |
88 | 90 |
|
89 | | - @Test |
90 | | - public void getCertificateChain_WithValidAlias_ReturnsExpectedValue() { |
91 | | - assertThat(keyStoreWrapper.getCertificateChain(KEYSTORE_VALID_KEY_ALIAS)) |
92 | | - .as("Certificate chain is not null") |
93 | | - .isNotNull(); |
| 91 | + @ParameterizedTest |
| 92 | + @MethodSource("data") |
| 93 | + public void getCertificateChain_WithValidAlias_ReturnsExpectedValue( |
| 94 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 95 | + assertNotNull( |
| 96 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificateChain(KEYSTORE_VALID_KEY_ALIAS), |
| 97 | + "Certificate chain is not null"); |
94 | 98 | } |
95 | 99 |
|
96 | | - @Test |
97 | | - public void getCertificateChain_WithInvalidAlias_ReturnsExpectedValue() { |
98 | | - assertThat(keyStoreWrapper.getCertificateChain(KEYSTORE_INVALID_KEY_ALIAS)) |
99 | | - .as("Certificate is null") |
100 | | - .isNull(); |
| 100 | + @ParameterizedTest |
| 101 | + @MethodSource("data") |
| 102 | + public void getCertificateChain_WithInvalidAlias_ReturnsExpectedValue( |
| 103 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 104 | + assertNull( |
| 105 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificateChain( |
| 106 | + KEYSTORE_INVALID_KEY_ALIAS), |
| 107 | + "Certificate is null"); |
101 | 108 | } |
102 | 109 |
|
103 | | - @Test |
104 | | - public void getCertificate_FromTruststore_WithValidAlias_ReturnsExpectedValue() { |
| 110 | + @ParameterizedTest |
| 111 | + @MethodSource("data") |
| 112 | + public void getCertificate_FromTruststore_WithValidAlias_ReturnsExpectedValue( |
| 113 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
105 | 114 | final Certificate certificate = |
106 | | - keyStoreWrapper.getCertificate(TRUSTSTORE_VALID_CERTIFICATE_ALIAS); |
107 | | - if (keystoreWrapperConfiguredWithTruststore) { |
108 | | - assertThat(certificate).as("Certificate is not null").isNotNull(); |
| 115 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCertificate( |
| 116 | + TRUSTSTORE_VALID_CERTIFICATE_ALIAS); |
| 117 | + if (keyStoreWrapperTestParameter.keystoreWrapperConfiguredWithTruststore) { |
| 118 | + assertNotNull(certificate, "Certificate is not null"); |
109 | 119 | } else { |
110 | | - assertThat(certificate).as("Certificate is null").isNull(); |
| 120 | + assertNull(certificate, "Certificate is null"); |
111 | 121 | } |
112 | 122 | } |
113 | 123 |
|
114 | | - @Test |
115 | | - public void getCertificate_FromTruststore_WithInvalidAlias_ReturnsExpectedValue() { |
116 | | - assertThat(keyStoreWrapper.getPrivateKey(TRUSTSTORE_INVALID_CERTIFICATE_ALIAS)) |
117 | | - .as("Certificate is null") |
118 | | - .isNull(); |
| 124 | + @ParameterizedTest |
| 125 | + @MethodSource("data") |
| 126 | + public void getCertificate_FromTruststore_WithInvalidAlias_ReturnsExpectedValue( |
| 127 | + final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 128 | + assertNull( |
| 129 | + keyStoreWrapperTestParameter.keyStoreWrapper.getPrivateKey( |
| 130 | + TRUSTSTORE_INVALID_CERTIFICATE_ALIAS), |
| 131 | + "Certificate is null"); |
119 | 132 | } |
120 | 133 |
|
121 | | - @Test |
122 | | - public void getCRLS_Check() { |
123 | | - assertThat(keyStoreWrapper.getCRLs()).as("CRLs is not null").isNotNull(); |
124 | | - assertThat(keyStoreWrapper.getCRLs().size()).as("CRLs size matches").isEqualTo(2); |
| 134 | + @ParameterizedTest |
| 135 | + @MethodSource("data") |
| 136 | + public void getCRLS_Check(final KeyStoreWrapperTestParameter keyStoreWrapperTestParameter) { |
| 137 | + assertNotNull(keyStoreWrapperTestParameter.keyStoreWrapper.getCRLs(), "CRLs is not null"); |
| 138 | + assertEquals( |
| 139 | + keyStoreWrapperTestParameter.keyStoreWrapper.getCRLs().size(), 2, "CRLs size matches"); |
| 140 | + } |
| 141 | + |
| 142 | + public static class KeyStoreWrapperTestParameter { |
| 143 | + public String keyStoreWrapperDescription; |
| 144 | + public boolean keystoreWrapperConfiguredWithTruststore; |
| 145 | + public KeyStoreWrapper keyStoreWrapper; |
| 146 | + |
| 147 | + public KeyStoreWrapperTestParameter( |
| 148 | + final String keyStoreWrapperDescription, |
| 149 | + final boolean keystoreWrapperConfiguredWithTruststore, |
| 150 | + final KeyStoreWrapper keyStoreWrapper) { |
| 151 | + this.keyStoreWrapperDescription = keyStoreWrapperDescription; |
| 152 | + this.keystoreWrapperConfiguredWithTruststore = keystoreWrapperConfiguredWithTruststore; |
| 153 | + this.keyStoreWrapper = keyStoreWrapper; |
| 154 | + } |
125 | 155 | } |
126 | 156 | } |
0 commit comments