181 lines
7.8 KiB
Java
181 lines
7.8 KiB
Java
package com.mattrixwv.cipherstream.controller.monosubstitution;
|
|
|
|
|
|
import static org.hamcrest.Matchers.*;
|
|
import static org.mockito.Mockito.*;
|
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.*;
|
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.*;
|
|
|
|
import java.util.List;
|
|
|
|
import org.junit.jupiter.api.BeforeEach;
|
|
import org.junit.jupiter.api.Tag;
|
|
import org.junit.jupiter.api.Test;
|
|
import org.mockito.Mock;
|
|
import org.slf4j.Logger;
|
|
import org.springframework.beans.factory.annotation.Autowired;
|
|
import org.springframework.boot.test.autoconfigure.web.servlet.WebMvcTest;
|
|
import org.springframework.http.MediaType;
|
|
import org.springframework.test.util.ReflectionTestUtils;
|
|
import org.springframework.test.web.servlet.MockMvc;
|
|
|
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
|
import com.mattrixwv.cipherstream.aspect.CipherStreamLoggingAspect;
|
|
import com.mattrixwv.cipherstream.controller.CipherStreamControllerIntegrationTestBase;
|
|
import com.mattrixwv.cipherstream.utils.CipherInfoUtil;
|
|
import com.mattrixwv.cipherstream.utils.CipherParameterUtil;
|
|
|
|
|
|
@Tag("integration-test")
|
|
@WebMvcTest(controllers = BaconianCipherController.class)
|
|
public class BaconianCipherControllerIntegrationTest extends CipherStreamControllerIntegrationTestBase{
|
|
@Autowired
|
|
private MockMvc mockMvc;
|
|
@Autowired
|
|
private BaconianCipherController baconianCipherController;
|
|
//Loggers
|
|
@Mock(name = "com.mattrixwv.cipherstream.controller.monosubstitution.BaconianCipherController")
|
|
protected Logger baconianLogger;
|
|
//Fields
|
|
private static final String url = "/baconian";
|
|
private static final String decodedString = "Message to^encode";
|
|
private static final String encodedString = "ABABB aabaa baaab baaab aaaaa aabba aabaa baaba abbab aabaa abbaa aaaba abbab aaabb aabaa";
|
|
private static final ObjectNode blankNode = mapper.createObjectNode();
|
|
private static final String baconianName = "baconianName";
|
|
private static final String baconianDescription = "baconianDescription";
|
|
private static final List<String> baconianExplanation = List.of("baconianExplanation1", "baconianExplanation2", "baconianExplanation3");
|
|
private static final List<String> baconianFacts = List.of("baconianFact1", "baconianFact2", "baconianFact3");
|
|
|
|
|
|
@BeforeEach
|
|
public void setup(){
|
|
decodedNode = mapper.createObjectNode();
|
|
decodedNode.put(CipherParameterUtil.PRESERVE_CAPITALS, true);
|
|
decodedNode.put(CipherParameterUtil.PRESERVE_WHITESPACE, true);
|
|
decodedNode.put(CipherParameterUtil.PRESERVE_SYMBOLS, true);
|
|
decodedNode.put(CipherParameterUtil.INPUT_STRING, decodedString);
|
|
decodedNode.put(CipherParameterUtil.OUTPUT_STRING, encodedString);
|
|
|
|
encodedNode = mapper.createObjectNode();
|
|
encodedNode.put(CipherParameterUtil.PRESERVE_CAPITALS, true);
|
|
encodedNode.put(CipherParameterUtil.PRESERVE_WHITESPACE, true);
|
|
encodedNode.put(CipherParameterUtil.PRESERVE_SYMBOLS, true);
|
|
encodedNode.put(CipherParameterUtil.INPUT_STRING, encodedString);
|
|
encodedNode.put(CipherParameterUtil.OUTPUT_STRING, decodedString.replaceAll("[^a-zA-Z]", ""));
|
|
|
|
ReflectionTestUtils.setField(baconianCipherController, "baconianName", baconianName);
|
|
ReflectionTestUtils.setField(baconianCipherController, "baconianDescription", baconianDescription);
|
|
ReflectionTestUtils.setField(baconianCipherController, "baconianExplanation", baconianExplanation);
|
|
ReflectionTestUtils.setField(baconianCipherController, "baconianFacts", baconianFacts);
|
|
}
|
|
|
|
|
|
@Test
|
|
public void testGetCipherInfo() throws Exception{
|
|
mockMvc.perform(get(url)
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress))
|
|
.andExpect(status().isOk())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_DESCRIPTION).value(baconianDescription))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_NAME).value(baconianName))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION).isArray())
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION, hasSize(baconianExplanation.size())))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_EXPLANATION, hasItems(baconianExplanation.get(0), baconianExplanation.get(1), baconianExplanation.get(2))))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS).isArray())
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS, hasSize(baconianFacts.size())))
|
|
.andExpect(jsonPath(CipherInfoUtil.CIPHER_FACTS, hasItems(baconianFacts.get(0), baconianFacts.get(1), baconianFacts.get(2))));
|
|
|
|
//Filter
|
|
super.verifyFilter(url);
|
|
//Controller
|
|
verify(baconianLogger, times(1)).info("Getting info for {}", baconianName);
|
|
verifyNoMoreInteractions(baconianLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, baconianName);
|
|
}
|
|
|
|
@Test
|
|
public void testEncodeBaconian() throws Exception{
|
|
mockMvc.perform(post(url + "/encode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(decodedNode.toString()))
|
|
.andExpect(status().isOk())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath(CipherParameterUtil.OUTPUT_STRING).value(encodedString));
|
|
|
|
//Filter
|
|
super.verifyFilter(url + "/encode");
|
|
//Controller
|
|
verify(baconianLogger, times(1)).info("Encoding {}", baconianName);
|
|
verifyNoMoreInteractions(baconianLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, baconianName);
|
|
//Cipher Aspect
|
|
verifyAspectLogging(decodedNode);
|
|
}
|
|
|
|
@Test
|
|
public void testEncodeBaconian_error() throws Exception{
|
|
mockMvc.perform(post(url + "/encode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(blankNode.toString()))
|
|
.andExpect(status().isBadRequest())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath("message").value(CipherParameterUtil.PRESERVE_CAPITALS + CipherParameterUtil.PRESENT_MESSAGE));
|
|
|
|
//Filter
|
|
super.verifyFilter(url + "/encode");
|
|
//Controller
|
|
verify(baconianLogger, times(1)).info("Encoding {}", baconianName);
|
|
verifyNoMoreInteractions(baconianLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, baconianName);
|
|
//Cipher Aspect
|
|
verifyNoInteractions(aspectLogger);
|
|
}
|
|
|
|
@Test
|
|
public void testDecodeBaconian() throws Exception{
|
|
mockMvc.perform(post(url + "/decode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(encodedNode.toString()))
|
|
.andExpect(status().isOk())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath(CipherParameterUtil.OUTPUT_STRING).value(decodedString.replaceAll("[^a-zA-Z]", "")));
|
|
|
|
//Filter
|
|
super.verifyFilter(url + "/decode");
|
|
//Controller
|
|
verify(baconianLogger, times(1)).info("Decoding {}", baconianName);
|
|
verifyNoMoreInteractions(baconianLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, baconianName);
|
|
//Cipher Aspect
|
|
verifyAspectLogging(encodedNode);
|
|
}
|
|
|
|
@Test
|
|
public void testDecodeBaconian_error() throws Exception{
|
|
mockMvc.perform(post(url + "/decode")
|
|
.header("X-Request-Id", requestId)
|
|
.header("X-Forwarded-For", ipAddress)
|
|
.contentType(MediaType.APPLICATION_JSON)
|
|
.content(blankNode.toString()))
|
|
.andExpect(status().isBadRequest())
|
|
.andExpect(content().contentTypeCompatibleWith(MediaType.APPLICATION_JSON))
|
|
.andExpect(jsonPath("message").value(CipherParameterUtil.PRESERVE_CAPITALS + CipherParameterUtil.PRESENT_MESSAGE));
|
|
|
|
//Filter
|
|
super.verifyFilter(url + "/decode");
|
|
//Controller
|
|
verify(baconianLogger, times(1)).info("Decoding {}", baconianName);
|
|
verifyNoMoreInteractions(baconianLogger);
|
|
verify(mdc, times(1)).put(CipherStreamLoggingAspect.CIPHER_NAME_LOGGING, baconianName);
|
|
//Cipher Aspect
|
|
verifyNoInteractions(aspectLogger);
|
|
}
|
|
}
|