package com.mattrixwv.cipherstream.controller.monosubstitution; import static org.hamcrest.Matchers.*; import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.*; import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.*; import java.util.List; import org.junit.jupiter.api.BeforeEach; import org.junit.jupiter.api.Tag; import org.junit.jupiter.api.Test; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.boot.webmvc.test.autoconfigure.WebMvcTest; import org.springframework.http.MediaType; import org.springframework.test.util.ReflectionTestUtils; import org.springframework.test.web.servlet.MockMvc; import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase; import com.mattrixwv.cipherstream.utils.CipherInfoUtil; import com.mattrixwv.cipherstream.utils.CipherParameterUtil; import tools.jackson.databind.node.ObjectNode; @Tag("integration-test") @WebMvcTest(controllers = AutokeyCipherController.class) public class AutokeyCipherControllerIntegrationTest extends CipherStreamControllerIntegrationTestBase{ @Autowired private MockMvc mockMvc; @Autowired private AutokeyCipherController autokeyCipherController; //Loggers //TODO: Fix logger testing //@Mock(name = "com.mattrixwv.cipherstream.controller.monosubstitution.AutokeyCipherController") //protected Logger autokeyLogger; //Fields private static final ObjectNode blankNode = mapper.createObjectNode(); private static final String url = "/autokey"; private static final String decodedString = "Message to^encode"; private static final String encodedString = "Wiqooxh fs^wfcuhx"; private static final String keyword = "keyword"; private static final String autokeyName = "autokeyName"; private static final String autokeyDescription = "autokeyDescription"; private static final List autokeyExplanation = List.of("autokeyExplanation1", "autokeyExplanation2", "autokeyExplanation3"); private static final List autokeyFacts = List.of("autokeyFact1", "autokeyFact2", "autokeyFact3"); @BeforeEach public void setup(){ decodedNode = mapper.createObjectNode(); decodedNode.put(CipherParameterUtil.PRESERVE_CAPITALS, true); decodedNode.put(CipherParameterUtil.PRESERVE_WHITESPACE, true); decodedNode.put(CipherParameterUtil.PRESERVE_SYMBOLS, true); decodedNode.put(CipherParameterUtil.KEYWORD, keyword); decodedNode.put(CipherParameterUtil.INPUT_STRING, decodedString); decodedNode.put(CipherParameterUtil.OUTPUT_STRING, encodedString); encodedNode = mapper.createObjectNode(); encodedNode.put(CipherParameterUtil.PRESERVE_CAPITALS, true); encodedNode.put(CipherParameterUtil.PRESERVE_WHITESPACE, true); encodedNode.put(CipherParameterUtil.PRESERVE_SYMBOLS, true); encodedNode.put(CipherParameterUtil.KEYWORD, keyword); encodedNode.put(CipherParameterUtil.INPUT_STRING, encodedString); encodedNode.put(CipherParameterUtil.OUTPUT_STRING, decodedString); ReflectionTestUtils.setField(autokeyCipherController, "autokeyName", autokeyName); ReflectionTestUtils.setField(autokeyCipherController, "autokeyDescription", autokeyDescription); ReflectionTestUtils.setField(autokeyCipherController, "autokeyExplanation", autokeyExplanation); ReflectionTestUtils.setField(autokeyCipherController, "autokeyFacts", autokeyFacts); } @Test public void testGetCipherInfo() throws Exception{ mockMvc.perform(get(url) .header("X-Request-Id", requestId) .header("X-Forwarded-For", ipAddress)) .andExpect(status().isOk()) .andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON)) .andExpect(jsonPath(CipherInfoUtil.CIPHER_DESCRIPTION).value(autokeyDescription)) .andExpect(jsonPath(CipherInfoUtil.CIPHER_NAME).value(autokeyName)) .andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION).isArray()) .andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION, hasSize(autokeyExplanation.size()))) .andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION, hasItems(autokeyExplanation.get(0), autokeyExplanation.get(1), autokeyExplanation.get(2)))) .andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS).isArray()) .andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS, hasSize(autokeyFacts.size()))) .andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS, hasItems(autokeyFacts.get(0), autokeyFacts.get(1), autokeyFacts.get(2)))); //Filter //TODO: Fix logger testing /* super.verifyFilter(url); //Controller verify(autokeyLogger, times(1)).info("Getting info for {}", autokeyName); verifyNoMoreInteractions(autokeyLogger); verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName); */ } @Test public void testEncodeAutokey() throws Exception{ mockMvc.perform(post(url + "/encode") .header("X-Request-Id", requestId) .header("X-Forwarded-For", ipAddress) .contentType(MediaType.APPLICATION_JSON) .content(decodedNode.toString())) .andExpect(status().isOk()) .andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON)) .andExpect(jsonPath(CipherParameterUtil.OUTPUT_STRING).value(encodedString)); //Filter //TODO: Fix logger testing /* super.verifyFilter(url + "/encode"); //Controller verify(autokeyLogger, times(1)).info("Encoding {}", autokeyName); verifyNoMoreInteractions(autokeyLogger); verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName); //Cipher Aspect verifyAspectLogging(decodedNode); */ } @Test public void testEncodeAutokey_error() throws Exception{ mockMvc.perform(post(url + "/encode") .header("X-Request-Id", requestId) .header("X-Forwarded-For", ipAddress) .contentType(MediaType.APPLICATION_JSON) .content(blankNode.toString())) .andExpect(status().isBadRequest()) .andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON)) .andExpect(jsonPath("message").value(CipherParameterUtil.PRESERVE_CAPITALS + CipherParameterUtil.PRESENT_MESSAGE)); //Filter //TODO: Fix logger testing /* super.verifyFilter(url + "/encode"); //Controller verify(autokeyLogger, times(1)).info("Encoding {}", autokeyName); verifyNoMoreInteractions(autokeyLogger); verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName); //Cipher Aspect verifyNoInteractions(aspectLogger); */ } @Test public void testDecodeAutokey() throws Exception{ mockMvc.perform(post(url + "/decode") .header("X-Request-Id", requestId) .header("X-Forwarded-For", ipAddress) .contentType(MediaType.APPLICATION_JSON) .content(encodedNode.toString())) .andExpect(status().isOk()) .andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON)) .andExpect(jsonPath(CipherParameterUtil.OUTPUT_STRING).value(decodedString)); //Filter //TODO: Fix logger testing /* super.verifyFilter(url + "/decode"); //Controller verify(autokeyLogger, times(1)).info("Decoding {}", autokeyName); verifyNoMoreInteractions(autokeyLogger); verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName); //Cipher Aspect verifyAspectLogging(encodedNode); */ } @Test public void testDecodeAutokey_error() throws Exception{ mockMvc.perform(post(url + "/decode") .header("X-Request-Id", requestId) .header("X-Forwarded-For", ipAddress) .contentType(MediaType.APPLICATION_JSON) .content(blankNode.toString())) .andExpect(status().isBadRequest()) .andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON)) .andExpect(jsonPath("message").value(CipherParameterUtil.PRESERVE_CAPITALS + CipherParameterUtil.PRESENT_MESSAGE)); //Filter //TODO: Fix logger testing /* super.verifyFilter(url + "/decode"); //Controller verify(autokeyLogger, times(1)).info("Decoding {}", autokeyName); verifyNoMoreInteractions(autokeyLogger); verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName); //Cipher Aspect verifyNoInteractions(aspectLogger); */ } }