Update tests to include MDC changes
This commit is contained in:
2
pom.xml
2
pom.xml
@@ -178,7 +178,6 @@
|
|||||||
<classpathDependencyExcludes>
|
<classpathDependencyExcludes>
|
||||||
<classpathDependencyExclude>org.apache.logging.log4j:log4j-slf4j2-impl</classpathDependencyExclude>
|
<classpathDependencyExclude>org.apache.logging.log4j:log4j-slf4j2-impl</classpathDependencyExclude>
|
||||||
</classpathDependencyExcludes>
|
</classpathDependencyExcludes>
|
||||||
<argLine>${argLine} -XX:+EnableDynamicAgentLoading</argLine>
|
|
||||||
</configuration>
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
<plugin>
|
||||||
@@ -210,7 +209,6 @@
|
|||||||
<classpathDependencyExcludes>
|
<classpathDependencyExcludes>
|
||||||
<classpathDependencyExclude>org.apache.logging.log4j:log4j-slf4j2-impl</classpathDependencyExclude>
|
<classpathDependencyExclude>org.apache.logging.log4j:log4j-slf4j2-impl</classpathDependencyExclude>
|
||||||
</classpathDependencyExcludes>
|
</classpathDependencyExcludes>
|
||||||
<argLine>${argLine} -XX:+EnableDynamicAgentLoading</argLine>
|
|
||||||
</configuration>
|
</configuration>
|
||||||
</execution>
|
</execution>
|
||||||
</executions>
|
</executions>
|
||||||
|
|||||||
@@ -49,6 +49,7 @@ public class FullFilterTest{
|
|||||||
|
|
||||||
verify(request, times(2)).getHeader("X-Request-Id");
|
verify(request, times(2)).getHeader("X-Request-Id");
|
||||||
verify(request, times(2)).getHeader("X-Forwarded-For");
|
verify(request, times(2)).getHeader("X-Forwarded-For");
|
||||||
|
verify(request, times(1)).getParameterMap();
|
||||||
verify(filterChain, times(1)).doFilter(request, response);
|
verify(filterChain, times(1)).doFilter(request, response);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -65,6 +66,22 @@ public class FullFilterTest{
|
|||||||
|
|
||||||
verify(request, times(2)).getHeader("X-Request-Id");
|
verify(request, times(2)).getHeader("X-Request-Id");
|
||||||
verify(request, times(2)).getHeader("X-Forwarded-For");
|
verify(request, times(2)).getHeader("X-Forwarded-For");
|
||||||
|
verify(request, times(1)).getParameterMap();
|
||||||
|
verify(filterChain, times(1)).doFilter(request, response);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDoFilterInternal_noHeaders() throws Exception{
|
||||||
|
doReturn(new HashMap<>()).when(request).getParameterMap();
|
||||||
|
doReturn("/testURL").when(request).getRequestURI();
|
||||||
|
|
||||||
|
|
||||||
|
fullFilter.doFilterInternal(request, response, filterChain);
|
||||||
|
|
||||||
|
|
||||||
|
verify(request, times(1)).getHeader("X-Request-Id");
|
||||||
|
verify(request, times(1)).getHeader("X-Forwarded-For");
|
||||||
|
verify(request, times(1)).getParameterMap();
|
||||||
verify(filterChain, times(1)).doFilter(request, response);
|
verify(filterChain, times(1)).doFilter(request, response);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -76,6 +77,7 @@ public class AdfgvxCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgvxLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
verify(adfgvxLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -95,6 +97,7 @@ public class AdfgvxCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgvxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
verify(adfgvxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -114,6 +117,7 @@ public class AdfgvxCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgvxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
verify(adfgvxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -133,6 +137,7 @@ public class AdfgvxCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgvxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
verify(adfgvxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -152,6 +157,7 @@ public class AdfgvxCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgvxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
verify(adfgvxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGVX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -76,6 +77,7 @@ public class AdfgxCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgxLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
verify(adfgxLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -95,6 +97,7 @@ public class AdfgxCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
verify(adfgxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -114,6 +117,7 @@ public class AdfgxCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
verify(adfgxLogger, times(1)).info("Encoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -133,6 +137,7 @@ public class AdfgxCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
verify(adfgxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -152,6 +157,7 @@ public class AdfgxCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(adfgxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
verify(adfgxLogger, times(1)).info("Decoding {}", CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ADFGX_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -76,6 +77,7 @@ public class AffineCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(affineLogger, times(1)).info("Getting info for {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
verify(affineLogger, times(1)).info("Getting info for {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -95,6 +97,7 @@ public class AffineCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(affineLogger, times(1)).info("Encoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
verify(affineLogger, times(1)).info("Encoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -114,6 +117,7 @@ public class AffineCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(affineLogger, times(1)).info("Encoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
verify(affineLogger, times(1)).info("Encoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -133,6 +137,7 @@ public class AffineCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(affineLogger, times(1)).info("Decoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
verify(affineLogger, times(1)).info("Decoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -152,6 +157,7 @@ public class AffineCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(affineLogger, times(1)).info("Decoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
verify(affineLogger, times(1)).info("Decoding {}", CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AFFINE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -70,6 +71,7 @@ public class AtbashCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(atbashLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
verify(atbashLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -89,6 +91,7 @@ public class AtbashCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(atbashLogger, times(1)).info("Encoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
verify(atbashLogger, times(1)).info("Encoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -108,6 +111,7 @@ public class AtbashCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(atbashLogger, times(1)).info("Encoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
verify(atbashLogger, times(1)).info("Encoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -127,6 +131,7 @@ public class AtbashCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(atbashLogger, times(1)).info("Decoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
verify(atbashLogger, times(1)).info("Decoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -146,6 +151,7 @@ public class AtbashCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(atbashLogger, times(1)).info("Decoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
verify(atbashLogger, times(1)).info("Decoding {}", CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ATBASH_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class AutokeyCipherControllerIntegrationTest extends CipherStreamControll
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(autokeyLogger, times(1)).info("Getting info for {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
verify(autokeyLogger, times(1)).info("Getting info for {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class AutokeyCipherControllerIntegrationTest extends CipherStreamControll
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(autokeyLogger, times(1)).info("Encoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
verify(autokeyLogger, times(1)).info("Encoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class AutokeyCipherControllerIntegrationTest extends CipherStreamControll
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(autokeyLogger, times(1)).info("Encoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
verify(autokeyLogger, times(1)).info("Encoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class AutokeyCipherControllerIntegrationTest extends CipherStreamControll
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(autokeyLogger, times(1)).info("Decoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
verify(autokeyLogger, times(1)).info("Decoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class AutokeyCipherControllerIntegrationTest extends CipherStreamControll
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(autokeyLogger, times(1)).info("Decoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
verify(autokeyLogger, times(1)).info("Decoding {}", CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.AUTOKEY_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -70,6 +71,7 @@ public class BaconianCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(baconianLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
verify(baconianLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -89,6 +91,7 @@ public class BaconianCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baconianLogger, times(1)).info("Encoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
verify(baconianLogger, times(1)).info("Encoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -108,6 +111,7 @@ public class BaconianCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baconianLogger, times(1)).info("Encoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
verify(baconianLogger, times(1)).info("Encoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -127,6 +131,7 @@ public class BaconianCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baconianLogger, times(1)).info("Decoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
verify(baconianLogger, times(1)).info("Decoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -146,6 +151,7 @@ public class BaconianCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baconianLogger, times(1)).info("Decoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
verify(baconianLogger, times(1)).info("Decoding {}", CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BACONIAN_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class BaseXCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(baseXLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
verify(baseXLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class BaseXCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baseXLogger, times(1)).info("Encoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
verify(baseXLogger, times(1)).info("Encoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class BaseXCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baseXLogger, times(1)).info("Encoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
verify(baseXLogger, times(1)).info("Encoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class BaseXCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baseXLogger, times(1)).info("Decoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
verify(baseXLogger, times(1)).info("Decoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class BaseXCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(baseXLogger, times(1)).info("Decoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
verify(baseXLogger, times(1)).info("Decoding {}", CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BASE_X_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class BeaufortCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(beaufortLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
verify(beaufortLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class BeaufortCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(beaufortLogger, times(1)).info("Encoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
verify(beaufortLogger, times(1)).info("Encoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class BeaufortCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(beaufortLogger, times(1)).info("Encoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
verify(beaufortLogger, times(1)).info("Encoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class BeaufortCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(beaufortLogger, times(1)).info("Decoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
verify(beaufortLogger, times(1)).info("Decoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class BeaufortCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(beaufortLogger, times(1)).info("Decoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
verify(beaufortLogger, times(1)).info("Decoding {}", CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BEAUFORT_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class CaesarCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(caesarLogger, times(1)).info("Getting info for {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
verify(caesarLogger, times(1)).info("Getting info for {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class CaesarCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(caesarLogger, times(1)).info("Encoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
verify(caesarLogger, times(1)).info("Encoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class CaesarCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(caesarLogger, times(1)).info("Encoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
verify(caesarLogger, times(1)).info("Encoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class CaesarCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(caesarLogger, times(1)).info("Decoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
verify(caesarLogger, times(1)).info("Decoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class CaesarCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(caesarLogger, times(1)).info("Decoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
verify(caesarLogger, times(1)).info("Decoding {}", CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.CAESAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class OneTimePadCipherControllerIntegrationTest extends CipherStreamContr
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(oneTimePadLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
verify(oneTimePadLogger, times(1)).info("Getting info for {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class OneTimePadCipherControllerIntegrationTest extends CipherStreamContr
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(oneTimePadLogger, times(1)).info("Encoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
verify(oneTimePadLogger, times(1)).info("Encoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class OneTimePadCipherControllerIntegrationTest extends CipherStreamContr
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(oneTimePadLogger, times(1)).info("Encoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
verify(oneTimePadLogger, times(1)).info("Encoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class OneTimePadCipherControllerIntegrationTest extends CipherStreamContr
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(oneTimePadLogger, times(1)).info("Decoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
verify(oneTimePadLogger, times(1)).info("Decoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class OneTimePadCipherControllerIntegrationTest extends CipherStreamContr
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(oneTimePadLogger, times(1)).info("Decoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
verify(oneTimePadLogger, times(1)).info("Decoding {}", CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.ONE_TIME_PAD_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,6 +17,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -74,6 +75,7 @@ public class PortaCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(portaLogger, times(1)).info("Getting info for {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
verify(portaLogger, times(1)).info("Getting info for {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -97,6 +99,7 @@ public class PortaCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
verify(mdc, times(1)).clear();
|
verify(mdc, times(1)).clear();
|
||||||
//Controller
|
//Controller
|
||||||
verify(portaLogger, times(1)).info("Encoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
verify(portaLogger, times(1)).info("Encoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -116,6 +119,7 @@ public class PortaCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(portaLogger, times(1)).info("Encoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
verify(portaLogger, times(1)).info("Encoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -139,6 +143,7 @@ public class PortaCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
verify(mdc, times(1)).clear();
|
verify(mdc, times(1)).clear();
|
||||||
//Controller
|
//Controller
|
||||||
verify(portaLogger, times(1)).info("Decoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
verify(portaLogger, times(1)).info("Decoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -158,6 +163,7 @@ public class PortaCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(portaLogger, times(1)).info("Decoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
verify(portaLogger, times(1)).info("Decoding {}", CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PORTA_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class SubstitutionCipherControllerIntegrationTest extends CipherStreamCon
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(substitutionLogger, times(1)).info("Getting info for {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
verify(substitutionLogger, times(1)).info("Getting info for {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class SubstitutionCipherControllerIntegrationTest extends CipherStreamCon
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(substitutionLogger, times(1)).info("Encoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
verify(substitutionLogger, times(1)).info("Encoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class SubstitutionCipherControllerIntegrationTest extends CipherStreamCon
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(substitutionLogger, times(1)).info("Encoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
verify(substitutionLogger, times(1)).info("Encoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class SubstitutionCipherControllerIntegrationTest extends CipherStreamCon
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(substitutionLogger, times(1)).info("Decoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
verify(substitutionLogger, times(1)).info("Decoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class SubstitutionCipherControllerIntegrationTest extends CipherStreamCon
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(substitutionLogger, times(1)).info("Decoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
verify(substitutionLogger, times(1)).info("Decoding {}", CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.SUBSTITUTION_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class VigenereCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(vigenereLogger, times(1)).info("Getting info for {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
verify(vigenereLogger, times(1)).info("Getting info for {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class VigenereCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(vigenereLogger, times(1)).info("Encoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
verify(vigenereLogger, times(1)).info("Encoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class VigenereCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(vigenereLogger, times(1)).info("Encoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
verify(vigenereLogger, times(1)).info("Encoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class VigenereCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(vigenereLogger, times(1)).info("Decoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
verify(vigenereLogger, times(1)).info("Decoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class VigenereCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(vigenereLogger, times(1)).info("Decoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
verify(vigenereLogger, times(1)).info("Decoding {}", CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.VIGENERE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class BifidCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(bifidLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
verify(bifidLogger, times(1)).info("Getting info for {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class BifidCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(bifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
verify(bifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class BifidCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(bifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
verify(bifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class BifidCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(bifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
verify(bifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class BifidCipherControllerIntegrationTest extends CipherStreamController
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(bifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
verify(bifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.BIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class ColumnarCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(columnarLogger, times(1)).info("Getting info for {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
verify(columnarLogger, times(1)).info("Getting info for {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class ColumnarCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(columnarLogger, times(1)).info("Encoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
verify(columnarLogger, times(1)).info("Encoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class ColumnarCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(columnarLogger, times(1)).info("Encoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
verify(columnarLogger, times(1)).info("Encoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class ColumnarCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(columnarLogger, times(1)).info("Decoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
verify(columnarLogger, times(1)).info("Decoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class ColumnarCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(columnarLogger, times(1)).info("Decoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
verify(columnarLogger, times(1)).info("Decoding {}", CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.COLUMNAR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class HillCipherControllerIntegrationTest extends CipherStreamControllerI
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(hillLogger, times(1)).info("Getting info for {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
verify(hillLogger, times(1)).info("Getting info for {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class HillCipherControllerIntegrationTest extends CipherStreamControllerI
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(hillLogger, times(1)).info("Encoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
verify(hillLogger, times(1)).info("Encoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class HillCipherControllerIntegrationTest extends CipherStreamControllerI
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(hillLogger, times(1)).info("Encoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
verify(hillLogger, times(1)).info("Encoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class HillCipherControllerIntegrationTest extends CipherStreamControllerI
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(hillLogger, times(1)).info("Decoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
verify(hillLogger, times(1)).info("Decoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class HillCipherControllerIntegrationTest extends CipherStreamControllerI
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(hillLogger, times(1)).info("Decoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
verify(hillLogger, times(1)).info("Decoding {}", CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.HILL_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -63,6 +64,7 @@ public class MorseCodeControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(morseLogger, times(1)).info("Getting info for {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
verify(morseLogger, times(1)).info("Getting info for {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -82,6 +84,7 @@ public class MorseCodeControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(morseLogger, times(1)).info("Encoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
verify(morseLogger, times(1)).info("Encoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -101,6 +104,7 @@ public class MorseCodeControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(morseLogger, times(1)).info("Encoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
verify(morseLogger, times(1)).info("Encoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -120,6 +124,7 @@ public class MorseCodeControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(morseLogger, times(1)).info("Decoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
verify(morseLogger, times(1)).info("Decoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -139,6 +144,7 @@ public class MorseCodeControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(morseLogger, times(1)).info("Decoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
verify(morseLogger, times(1)).info("Decoding {}", CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.MORSE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -74,6 +75,7 @@ public class PlayfairCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(playfairLogger, times(1)).info("Getting info for {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
verify(playfairLogger, times(1)).info("Getting info for {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -93,6 +95,7 @@ public class PlayfairCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(playfairLogger, times(1)).info("Encoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
verify(playfairLogger, times(1)).info("Encoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -112,6 +115,7 @@ public class PlayfairCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(playfairLogger, times(1)).info("Encoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
verify(playfairLogger, times(1)).info("Encoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -131,6 +135,7 @@ public class PlayfairCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(playfairLogger, times(1)).info("Decoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
verify(playfairLogger, times(1)).info("Decoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -150,6 +155,7 @@ public class PlayfairCipherControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(playfairLogger, times(1)).info("Decoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
verify(playfairLogger, times(1)).info("Decoding {}", CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.PLAYFAIR_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class PolybiusSquareControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(polybiusLogger, times(1)).info("Getting info for {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
verify(polybiusLogger, times(1)).info("Getting info for {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class PolybiusSquareControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(polybiusLogger, times(1)).info("Encoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
verify(polybiusLogger, times(1)).info("Encoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class PolybiusSquareControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(polybiusLogger, times(1)).info("Encoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
verify(polybiusLogger, times(1)).info("Encoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class PolybiusSquareControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(polybiusLogger, times(1)).info("Decoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
verify(polybiusLogger, times(1)).info("Decoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class PolybiusSquareControllerIntegrationTest extends CipherStreamControl
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(polybiusLogger, times(1)).info("Decoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
verify(polybiusLogger, times(1)).info("Decoding {}", CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.POLYBIUS_SQUARE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -73,6 +74,7 @@ public class RailFenceControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(railFenceLogger, times(1)).info("Getting info for {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
verify(railFenceLogger, times(1)).info("Getting info for {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -92,6 +94,7 @@ public class RailFenceControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(railFenceLogger, times(1)).info("Encoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
verify(railFenceLogger, times(1)).info("Encoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -111,6 +114,7 @@ public class RailFenceControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(railFenceLogger, times(1)).info("Encoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
verify(railFenceLogger, times(1)).info("Encoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -130,6 +134,7 @@ public class RailFenceControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(railFenceLogger, times(1)).info("Decoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
verify(railFenceLogger, times(1)).info("Decoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -149,6 +154,7 @@ public class RailFenceControllerIntegrationTest extends CipherStreamControllerIn
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(railFenceLogger, times(1)).info("Decoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
verify(railFenceLogger, times(1)).info("Decoding {}", CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.RAIL_FENCE_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ import org.springframework.http.MediaType;
|
|||||||
import org.springframework.test.web.servlet.MockMvc;
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
|
||||||
import com.fasterxml.jackson.databind.node.ObjectNode;
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
||||||
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
||||||
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
||||||
@@ -79,6 +80,7 @@ public class TrifidCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url);
|
super.verifyFilter(url);
|
||||||
//Controller
|
//Controller
|
||||||
verify(trifidLogger, times(1)).info("Getting info for {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
verify(trifidLogger, times(1)).info("Getting info for {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", infoNode);
|
||||||
}
|
}
|
||||||
@@ -98,6 +100,7 @@ public class TrifidCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(trifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
verify(trifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", decodedNode);
|
||||||
}
|
}
|
||||||
@@ -117,6 +120,7 @@ public class TrifidCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/encode");
|
super.verifyFilter(url + "/encode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(trifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
verify(trifidLogger, times(1)).info("Encoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
@@ -136,6 +140,7 @@ public class TrifidCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(trifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
verify(trifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
verify(aspectLogger, times(1)).info("CipherStream log {}", encodedNode);
|
||||||
}
|
}
|
||||||
@@ -155,6 +160,7 @@ public class TrifidCipherControllerIntegrationTest extends CipherStreamControlle
|
|||||||
super.verifyFilter(url + "/decode");
|
super.verifyFilter(url + "/decode");
|
||||||
//Controller
|
//Controller
|
||||||
verify(trifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
verify(trifidLogger, times(1)).info("Decoding {}", CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, CipherInfoUtil.TRIFID_CIPHER_NAME);
|
||||||
//Cipher Aspect
|
//Cipher Aspect
|
||||||
verifyNoInteractions(aspectLogger);
|
verifyNoInteractions(aspectLogger);
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user