197 lines
7.9 KiB
Java
197 lines
7.9 KiB
Java
package com.mattrixwv.cipherstream.controller.monosubstitution;
|
|
|
|
|
|
import static org.hamcrest.Matchers.*;
|
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.*;
|
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.*;
|
|
|
|
import java.util.List;
|
|
|
|
import org.junit.jupiter.api.BeforeEach;
|
|
import org.junit.jupiter.api.Tag;
|
|
import org.junit.jupiter.api.Test;
|
|
import org.springframework.beans.factory.annotation.Autowired;
|
|
import org.springframework.boot.webmvc.test.autoconfigure.WebMvcTest;
|
|
import org.springframework.http.MediaType;
|
|
import org.springframework.test.util.ReflectionTestUtils;
|
|
import org.springframework.test.web.servlet.MockMvc;
|
|
|
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
|
|
|
import tools.jackson.databind.node.ObjectNode;
|
|
|
|
|
|
@Tag("integration-test")
|
|
@WebMvcTest(controllers = AutokeyCipherController.class)
|
|
public class AutokeyCipherControllerIntegrationTest extends CipherStreamControllerIntegrationTestBase{
|
|
@Autowired
|
|
private MockMvc mockMvc;
|
|
@Autowired
|
|
private AutokeyCipherController autokeyCipherController;
|
|
//Loggers
|
|
//TODO: Fix logger testing
|
|
//@Mock(name = "com.mattrixwv.cipherstream.controller.monosubstitution.AutokeyCipherController")
|
|
//protected Logger autokeyLogger;
|
|
//Fields
|
|
private static final ObjectNode blankNode = mapper.createObjectNode();
|
|
private static final String url = "/autokey";
|
|
private static final String decodedString = "Message to^encode";
|
|
private static final String encodedString = "Wiqooxh fs^wfcuhx";
|
|
private static final String keyword = "keyword";
|
|
private static final String autokeyName = "autokeyName";
|
|
private static final String autokeyDescription = "autokeyDescription";
|
|
private static final List<String> autokeyExplanation = List.of("autokeyExplanation1", "autokeyExplanation2", "autokeyExplanation3");
|
|
private static final List<String> autokeyFacts = List.of("autokeyFact1", "autokeyFact2", "autokeyFact3");
|
|
|
|
|
|
@BeforeEach
|
|
public void setup(){
|
|
decodedNode = mapper.createObjectNode();
|
|
decodedNode.put(CipherParameterUtil.PRESERVE_CAPITALS, true);
|
|
decodedNode.put(CipherParameterUtil.PRESERVE_WHITESPACE, true);
|
|
decodedNode.put(CipherParameterUtil.PRESERVE_SYMBOLS, true);
|
|
decodedNode.put(CipherParameterUtil.KEYWORD, keyword);
|
|
decodedNode.put(CipherParameterUtil.INPUT_STRING, decodedString);
|
|
decodedNode.put(CipherParameterUtil.OUTPUT_STRING, encodedString);
|
|
|
|
encodedNode = mapper.createObjectNode();
|
|
encodedNode.put(CipherParameterUtil.PRESERVE_CAPITALS, true);
|
|
encodedNode.put(CipherParameterUtil.PRESERVE_WHITESPACE, true);
|
|
encodedNode.put(CipherParameterUtil.PRESERVE_SYMBOLS, true);
|
|
encodedNode.put(CipherParameterUtil.KEYWORD, keyword);
|
|
encodedNode.put(CipherParameterUtil.INPUT_STRING, encodedString);
|
|
encodedNode.put(CipherParameterUtil.OUTPUT_STRING, decodedString);
|
|
|
|
ReflectionTestUtils.setField(autokeyCipherController, "autokeyName", autokeyName);
|
|
ReflectionTestUtils.setField(autokeyCipherController, "autokeyDescription", autokeyDescription);
|
|
ReflectionTestUtils.setField(autokeyCipherController, "autokeyExplanation", autokeyExplanation);
|
|
ReflectionTestUtils.setField(autokeyCipherController, "autokeyFacts", autokeyFacts);
|
|
}
|
|
|
|
|
|
@Test
|
|
public void testGetCipherInfo() throws Exception{
|
|
mockMvc.perform(get(url)
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress))
|
|
.andExpect(status().isOk())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_DESCRIPTION).value(autokeyDescription))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_NAME).value(autokeyName))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION).isArray())
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION, hasSize(autokeyExplanation.size())))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION, hasItems(autokeyExplanation.get(0), autokeyExplanation.get(1), autokeyExplanation.get(2))))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS).isArray())
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS, hasSize(autokeyFacts.size())))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS, hasItems(autokeyFacts.get(0), autokeyFacts.get(1), autokeyFacts.get(2))));
|
|
|
|
//Filter
|
|
//TODO: Fix logger testing
|
|
/*
|
|
super.verifyFilter(url);
|
|
//Controller
|
|
verify(autokeyLogger, times(1)).info("Getting info for {}", autokeyName);
|
|
verifyNoMoreInteractions(autokeyLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName);
|
|
*/
|
|
}
|
|
|
|
@Test
|
|
public void testEncodeAutokey() throws Exception{
|
|
mockMvc.perform(post(url + "/encode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(decodedNode.toString()))
|
|
.andExpect(status().isOk())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath(CipherParameterUtil.OUTPUT_STRING).value(encodedString));
|
|
|
|
//Filter
|
|
//TODO: Fix logger testing
|
|
/*
|
|
super.verifyFilter(url + "/encode");
|
|
//Controller
|
|
verify(autokeyLogger, times(1)).info("Encoding {}", autokeyName);
|
|
verifyNoMoreInteractions(autokeyLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName);
|
|
//Cipher Aspect
|
|
verifyAspectLogging(decodedNode);
|
|
*/
|
|
}
|
|
|
|
@Test
|
|
public void testEncodeAutokey_error() throws Exception{
|
|
mockMvc.perform(post(url + "/encode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(blankNode.toString()))
|
|
.andExpect(status().isBadRequest())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath("message").value(CipherParameterUtil.PRESERVE_CAPITALS + CipherParameterUtil.PRESENT_MESSAGE));
|
|
|
|
//Filter
|
|
//TODO: Fix logger testing
|
|
/*
|
|
super.verifyFilter(url + "/encode");
|
|
//Controller
|
|
verify(autokeyLogger, times(1)).info("Encoding {}", autokeyName);
|
|
verifyNoMoreInteractions(autokeyLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName);
|
|
//Cipher Aspect
|
|
verifyNoInteractions(aspectLogger);
|
|
*/
|
|
}
|
|
|
|
@Test
|
|
public void testDecodeAutokey() throws Exception{
|
|
mockMvc.perform(post(url + "/decode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(encodedNode.toString()))
|
|
.andExpect(status().isOk())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath(CipherParameterUtil.OUTPUT_STRING).value(decodedString));
|
|
|
|
//Filter
|
|
//TODO: Fix logger testing
|
|
/*
|
|
super.verifyFilter(url + "/decode");
|
|
//Controller
|
|
verify(autokeyLogger, times(1)).info("Decoding {}", autokeyName);
|
|
verifyNoMoreInteractions(autokeyLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName);
|
|
//Cipher Aspect
|
|
verifyAspectLogging(encodedNode);
|
|
*/
|
|
}
|
|
|
|
@Test
|
|
public void testDecodeAutokey_error() throws Exception{
|
|
mockMvc.perform(post(url + "/decode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(blankNode.toString()))
|
|
.andExpect(status().isBadRequest())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath("message").value(CipherParameterUtil.PRESERVE_CAPITALS + CipherParameterUtil.PRESENT_MESSAGE));
|
|
|
|
//Filter
|
|
//TODO: Fix logger testing
|
|
/*
|
|
super.verifyFilter(url + "/decode");
|
|
//Controller
|
|
verify(autokeyLogger, times(1)).info("Decoding {}", autokeyName);
|
|
verifyNoMoreInteractions(autokeyLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, autokeyName);
|
|
//Cipher Aspect
|
|
verifyNoInteractions(aspectLogger);
|
|
*/
|
|
}
|
|
}
|