Skip to content

Commit

Permalink
[ES-1347] Added test cases for AuthChallengeFactorFormatValidator
Browse files Browse the repository at this point in the history
Signed-off-by: Venkata Saidurga Polamraju <saidurgacsea@gmail.com>
  • Loading branch information
pvsaidurga committed Sep 4, 2024
1 parent e164544 commit 533155e
Showing 1 changed file with 164 additions and 1 deletion.
Original file line number Diff line number Diff line change
@@ -1,25 +1,39 @@
package io.mosip.esignet.api.validator;

import com.fasterxml.jackson.databind.ObjectMapper;
import io.mosip.esignet.api.dto.AuthChallenge;
import io.mosip.esignet.api.util.ErrorConstants;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.mockito.InjectMocks;
import org.mockito.Mockito;
import org.mockito.junit.MockitoJUnitRunner;
import org.mockito.Mock;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.core.env.Environment;
import org.springframework.test.util.ReflectionTestUtils;

import javax.validation.ConstraintValidatorContext;

import java.util.List;
import java.util.Map;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
import static org.mockito.ArgumentMatchers.anyString;
import static org.mockito.Mockito.mock;

@RunWith(MockitoJUnitRunner.class)
public class ValidatorTest {

@InjectMocks
private AuthChallengeFactorFormatValidator authChallengeFactorFormatValidator;

@InjectMocks
private PurposeValidator purposeValidator;

@Mock
private Environment environment;

@Mock
private ConstraintValidatorContext constraintValidatorContext;

Expand Down Expand Up @@ -56,4 +70,153 @@ public void testIsValid_WithEmptyPurpose_thenFail() {
boolean isValid = purposeValidator.isValid(purpose, constraintValidatorContext);
assertFalse(isValid);
}

@Test
public void authChallengeFactorFormatValidator_validAuthFactorType_thenPass() {
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("OTP");
authChallenge.setFormat("alpha-numeric");
authChallenge.setChallenge("111111");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.format", String.class)).thenReturn("alpha-numeric");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.min-length", Integer.TYPE, 50)).thenReturn(6);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.max-length", Integer.TYPE, 50)).thenReturn(6);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertTrue(isValid);
}

@Test
public void authChallengeFactorFormatValidator_invalidAuthFactorType_thenFail() {
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType(null);
authChallenge.setFormat("alpha-numeric");
authChallenge.setChallenge("111111");
Mockito.when(constraintValidatorContext.buildConstraintViolationWithTemplate(anyString()))
.thenReturn(mock(ConstraintValidatorContext.ConstraintViolationBuilder.class));
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
Mockito.verify(constraintValidatorContext).buildConstraintViolationWithTemplate(ErrorConstants.INVALID_AUTH_FACTOR_TYPE);
assertFalse(isValid);
}

@Test
public void authChallengeFactorFormatValidator_invalidChallengeLength_theFail() {
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("OTP");
authChallenge.setFormat("alpha-numeric");
authChallenge.setChallenge("1111111");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.format", String.class)).thenReturn("alpha-numeric");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.min-length", Integer.TYPE, 50)).thenReturn(6);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.max-length", Integer.TYPE, 50)).thenReturn(6);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertFalse(isValid);
}

@Test
public void authChallengeFactorFormatValidator_invalidFactoFormat_thenFail() {
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("OTP");
authChallenge.setFormat("jwt");
authChallenge.setChallenge("1111");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.OTP.format", String.class)).thenReturn("alpha-numeric");
Mockito.when(constraintValidatorContext.buildConstraintViolationWithTemplate(anyString()))
.thenReturn(mock(ConstraintValidatorContext.ConstraintViolationBuilder.class));
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertFalse(isValid);

}

@Test
public void authChallengeFactorFormatValidator_withKBIAuthFactor_thenPass() {
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"objectMapper",new ObjectMapper());
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"idField","individualId");
List<Map<String,String>> fieldDetailList = List.of(Map.of("id","individualId","type","text","format","string","regex","")
,Map.of("id","fullName","type","","format","","regex","")
, Map.of("id","dateOfBirth","type","date","format","yyyy-MM-dd","regex",""));
ReflectionTestUtils.setField(authChallengeFactorFormatValidator, "fieldDetailList", fieldDetailList);
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("KBI");
authChallenge.setFormat("base64url-encoded-json");
authChallenge.setChallenge("eyJmdWxsTmFtZSI6IkthaWYgU2lkZGlxdWUiLCJkb2IiOiIyMDAwLTA3LTI2In0=");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.format", String.class)).thenReturn("base64url-encoded-json");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.min-length", Integer.TYPE, 50)).thenReturn(50);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.max-length", Integer.TYPE, 50)).thenReturn(200);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertTrue(isValid);
}

@Test
public void authChallengeFactorFormatValidator_withInvalidKBIChallenge_thenFail() {
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"objectMapper",new ObjectMapper());
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"idField","individualId");
List<Map<String,String>> fieldDetailList = List.of(Map.of("id","individualId","type","text","format","string","regex","")
,Map.of("id","fullName","type","","format","","regex","")
, Map.of("id","dateOfBirth","type","date","format","yyyy-MM-dd","regex",""));
ReflectionTestUtils.setField(authChallengeFactorFormatValidator, "fieldDetailList", fieldDetailList);
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("KBI");
authChallenge.setFormat("base64url-encoded-json");
authChallenge.setChallenge("eyJmdWxsTmFtZSI6IkthaWYgU2lkZGlxdWUiLhfweibjhBDKJBNS");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.format", String.class)).thenReturn("base64url-encoded-json");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.min-length", Integer.TYPE, 50)).thenReturn(50);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.max-length", Integer.TYPE, 50)).thenReturn(200);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertFalse(isValid);
}

@Test
public void authChallengeFactorFormatValidator_withKBIInvalidRegex_thenFail() {
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"objectMapper",new ObjectMapper());
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"idField","individualId");
List<Map<String,String>> fieldDetailList = List.of(Map.of("id","individualId","type","text","format","string","regex","")
,Map.of("id","fullName","type","text","format","","regex","")
, Map.of("id","dob","type","text","format","yyyy-MM-dd","regex",""));
ReflectionTestUtils.setField(authChallengeFactorFormatValidator, "fieldDetailList", fieldDetailList);
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("KBI");
authChallenge.setFormat("base64url-encoded-json");
authChallenge.setChallenge("eyJmdWxsTmFtZSI6IkthaWYgU2lkZGlxdWUiLCJkb2IiOiIyMDAwLTA3LTI2In0=");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.format", String.class)).thenReturn("base64url-encoded-json");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.min-length", Integer.TYPE, 50)).thenReturn(50);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.max-length", Integer.TYPE, 50)).thenReturn(200);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertFalse(isValid);
}

@Test
public void authChallengeFactorFormatValidator_withEmptyName_thenFail() {
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"objectMapper",new ObjectMapper());
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"idField","individualId");
List<Map<String,String>> fieldDetailList = List.of(Map.of("id","individualId","type","text","format","string","regex","")
,Map.of("id","fullName","type","text","format","","regex","")
, Map.of("id","dob","type","text","format","yyyy-MM-dd","regex",""));
ReflectionTestUtils.setField(authChallengeFactorFormatValidator, "fieldDetailList", fieldDetailList);
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("KBI");
authChallenge.setFormat("base64url-encoded-json");
authChallenge.setChallenge("eyJmdWxsTmFtZSI6IiAiLCJkb2IiOiIyMDAwLTA3LTI2In0=");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.format", String.class)).thenReturn("base64url-encoded-json");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.min-length", Integer.TYPE, 50)).thenReturn(30);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.max-length", Integer.TYPE, 50)).thenReturn(200);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertFalse(isValid);
}

@Test
public void authChallengeFactorFormatValidator_withMaximumLength_thenFail1() {
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"objectMapper",new ObjectMapper());
ReflectionTestUtils.setField(authChallengeFactorFormatValidator,"idField","individualId");
List<Map<String,String>> fieldDetailList = List.of(Map.of("id","individualId","type","text","format","string","regex","")
,Map.of("id","fullName","type","text","format","","regex","","maxLength","10")
, Map.of("id","dob","type","text","format","yyyy-MM-dd","regex",""));
ReflectionTestUtils.setField(authChallengeFactorFormatValidator, "fieldDetailList", fieldDetailList);
AuthChallenge authChallenge = new AuthChallenge();
authChallenge.setAuthFactorType("KBI");
authChallenge.setFormat("base64url-encoded-json");
authChallenge.setChallenge("eyJmdWxsTmFtZSI6ImFiY2RlZmdoaWprbG1ub3BxcnN0dXZ3eHl6IiwiZG9iIjoiMjAwMC0wNy0yNiJ9cb");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.format", String.class)).thenReturn("base64url-encoded-json");
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.min-length", Integer.TYPE, 50)).thenReturn(30);
Mockito.when(environment.getProperty("mosip.esignet.auth-challenge.KBI.max-length", Integer.TYPE, 50)).thenReturn(200);
boolean isValid = authChallengeFactorFormatValidator.isValid(authChallenge, constraintValidatorContext);
assertFalse(isValid);
}

}

0 comments on commit 533155e

Please sign in to comment.