diff options
| author | Thomas Lenz <thomas.lenz@egiz.gv.at> | 2020-11-27 09:07:27 +0100 | 
|---|---|---|
| committer | Thomas Lenz <thomas.lenz@egiz.gv.at> | 2020-11-27 09:07:27 +0100 | 
| commit | d01abea064f33d1c985464aadf3e2326c6ba3219 (patch) | |
| tree | 800e98e7b594b72552770710c5bea93a009a0ead /eidas_modules/authmodule-eIDAS-v2/src/test/java | |
| parent | 3d01b42c1e57145850feefd49327cec2bc8b7843 (diff) | |
| download | National_eIDAS_Gateway-d01abea064f33d1c985464aadf3e2326c6ba3219.tar.gz National_eIDAS_Gateway-d01abea064f33d1c985464aadf3e2326c6ba3219.tar.bz2 National_eIDAS_Gateway-d01abea064f33d1c985464aadf3e2326c6ba3219.zip | |
upatate AuthBlock format in case of E-ID like authentication
Diffstat (limited to 'eidas_modules/authmodule-eIDAS-v2/src/test/java')
| -rw-r--r-- | eidas_modules/authmodule-eIDAS-v2/src/test/java/at/asitplus/eidas/specific/modules/auth/eidas/v2/test/tasks/CreateIdentityLinkTaskEidNewTest.java | 37 | 
1 files changed, 4 insertions, 33 deletions
| diff --git a/eidas_modules/authmodule-eIDAS-v2/src/test/java/at/asitplus/eidas/specific/modules/auth/eidas/v2/test/tasks/CreateIdentityLinkTaskEidNewTest.java b/eidas_modules/authmodule-eIDAS-v2/src/test/java/at/asitplus/eidas/specific/modules/auth/eidas/v2/test/tasks/CreateIdentityLinkTaskEidNewTest.java index d08855f2..dd485ee6 100644 --- a/eidas_modules/authmodule-eIDAS-v2/src/test/java/at/asitplus/eidas/specific/modules/auth/eidas/v2/test/tasks/CreateIdentityLinkTaskEidNewTest.java +++ b/eidas_modules/authmodule-eIDAS-v2/src/test/java/at/asitplus/eidas/specific/modules/auth/eidas/v2/test/tasks/CreateIdentityLinkTaskEidNewTest.java @@ -2,9 +2,6 @@ package at.asitplus.eidas.specific.modules.auth.eidas.v2.test.tasks;  import static at.asitplus.eidas.specific.connector.MsEidasNodeConstants.PROP_CONFIG_SP_NEW_EID_MODE;  import static org.mockito.ArgumentMatchers.any; -import static org.mockito.ArgumentMatchers.anyString; -import static org.mockito.BDDMockito.given; -import static org.mockito.Mockito.doThrow;  import static org.powermock.api.mockito.PowerMockito.when;  import java.io.IOException; @@ -21,19 +18,14 @@ import java.util.Map;  import javax.xml.namespace.QName; -import at.asitplus.eidas.specific.modules.auth.eidas.v2.exception.SzrCommunicationException; -import at.asitplus.eidas.specific.modules.auth.eidas.v2.service.AuthBlockSigningService; -import at.gv.egiz.eaaf.core.exceptions.TaskExecutionException;  import org.apache.commons.lang3.RandomStringUtils;  import org.jetbrains.annotations.NotNull;  import org.jose4j.jwa.AlgorithmConstraints;  import org.jose4j.jwa.AlgorithmConstraints.ConstraintType;  import org.jose4j.jws.AlgorithmIdentifiers; -import org.jose4j.lang.JoseException;  import org.junit.Assert;  import org.junit.Before;  import org.junit.BeforeClass; -import org.junit.Ignore;  import org.junit.Rule;  import org.junit.Test;  import org.junit.runner.RunWith; @@ -51,6 +43,8 @@ import com.skjolberg.mockito.soap.SoapServiceRule;  import at.asitplus.eidas.specific.connector.MsEidasNodeConstants;  import at.asitplus.eidas.specific.modules.auth.eidas.v2.Constants; +import at.asitplus.eidas.specific.modules.auth.eidas.v2.exception.SzrCommunicationException; +import at.asitplus.eidas.specific.modules.auth.eidas.v2.service.AuthBlockSigningService;  import at.asitplus.eidas.specific.modules.auth.eidas.v2.service.EidasAttributeRegistry;  import at.asitplus.eidas.specific.modules.auth.eidas.v2.tasks.CreateIdentityLinkTask;  import at.asitplus.eidas.specific.modules.auth.eidas.v2.utils.JoseUtils; @@ -61,6 +55,7 @@ import at.gv.egiz.eaaf.core.api.idp.IConfiguration;  import at.gv.egiz.eaaf.core.api.idp.process.ExecutionContext;  import at.gv.egiz.eaaf.core.exceptions.EaafException;  import at.gv.egiz.eaaf.core.exceptions.EaafStorageException; +import at.gv.egiz.eaaf.core.exceptions.TaskExecutionException;  import at.gv.egiz.eaaf.core.impl.credential.EaafKeyStoreFactory;  import at.gv.egiz.eaaf.core.impl.credential.EaafKeyStoreUtils;  import at.gv.egiz.eaaf.core.impl.credential.KeyStoreConfiguration; @@ -75,7 +70,6 @@ import eu.eidas.auth.commons.attribute.PersonType;  import eu.eidas.auth.commons.protocol.impl.AuthenticationResponse;  import lombok.val;  import szrservices.SZR; -import szrservices.SZRException_Exception;  import szrservices.SignContentEntry;  import szrservices.SignContentResponseType; @@ -193,7 +187,7 @@ public class CreateIdentityLinkTaskEidNewTest {          .getPrivateKeyAndCertificates(keyStore.getFirst(), ALIAS, PW.toCharArray(), true, "junit").getSecond();      JwsResult result = JoseUtils.validateSignature(authBlock, Arrays.asList(trustedCerts), constraints);      Assert.assertTrue("AuthBlock not valid", result.isValid()); - +        }    @Test @@ -225,29 +219,6 @@ public class CreateIdentityLinkTaskEidNewTest {      }    } -  @Ignore -  @Test -  public void exceptionTest() throws Exception { -    try { -      when(szrMock, "getStammzahlEncrypted", any(), any()).thenReturn(RandomStringUtils.randomNumeric(10)); -      val signContentResp = new SignContentResponseType(); -      final SignContentEntry signContentEntry = new SignContentEntry(); -      signContentEntry.setValue(RandomStringUtils.randomAlphanumeric(10)); -      signContentResp.getOut().add(signContentEntry); -      when(szrMock, "signContent", any(), any(), any()).thenReturn(signContentResp); -      doThrow(new EaafException("test")).when(authBlockSigner) -          .buildSignedAuthBlock(pendingReq.getUniqueTransactionIdentifier()); - -      task.execute(pendingReq, executionContext); -    } catch (TaskExecutionException e) { -      Assert.assertEquals("Incorrect exception thrown", e.getMessage(), -          "IdentityLink generation for foreign person " + "FAILED."); -      Assert.assertTrue("Incorrect exception thrown", e.getCause() instanceof EaafException); -      Assert.assertTrue("Incorrect exception thrown", e.getCause().getMessage().contains("test")); -    } - -  } -    private Pair<KeyStore, Provider> getKeyStore() throws EaafException {      // read Connector wide config data TODO connector wide!      String keyStoreName = basicConfig.getBasicConfiguration(MsEidasNodeConstants.PROP_CONFIG_AUTHBLOCK_KEYSTORE_NAME); | 
