/*
* Copyright (C) 2015 Square, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package keywhiz.service.resources.admin;
import com.google.common.collect.ImmutableMap;
import com.google.common.collect.ImmutableSet;
import io.dropwizard.jersey.params.LongParam;
import java.util.List;
import java.util.Optional;
import javax.ws.rs.BadRequestException;
import javax.ws.rs.NotFoundException;
import javax.ws.rs.core.Response;
import keywhiz.api.ApiDate;
import keywhiz.api.CreateGroupRequest;
import keywhiz.api.GroupDetailResponse;
import keywhiz.api.model.Client;
import keywhiz.api.model.Group;
import keywhiz.api.model.SanitizedSecret;
import keywhiz.auth.User;
import keywhiz.log.AuditLog;
import keywhiz.log.SimpleLogger;
import keywhiz.service.daos.AclDAO;
import keywhiz.service.daos.GroupDAO;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
import org.mockito.Mock;
import org.mockito.junit.MockitoJUnit;
import org.mockito.junit.MockitoRule;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
public class GroupsResourceTest {
@Rule public MockitoRule mockito = MockitoJUnit.rule();
@Mock AclDAO aclDAO;
@Mock GroupDAO groupDAO;
User user = User.named("user");
ApiDate now = ApiDate.now();
Group group =
new Group(1, "group", "desc", now, "creator", now, "creator", ImmutableMap.of("app", "app"));
AuditLog auditLog = new SimpleLogger();
GroupsResource resource;
@Before public void setUp() {
resource = new GroupsResource(aclDAO, groupDAO, auditLog);
}
@Test public void listingOfGroups() {
Group group1 = new Group(1, "group1", "desc", now, "creator", now, "updater", ImmutableMap.of(
"app", "app"));
Group group2 = new Group(2, "group2", "desc", now, "creator", now, "updater",
ImmutableMap.of("app", "app"));
when(groupDAO.getGroups()).thenReturn(ImmutableSet.of(group1, group2));
List<Group> response = resource.listGroups(user);
assertThat(response).containsOnly(group1, group2);
}
@Test public void createsGroup() {
CreateGroupRequest request =
new CreateGroupRequest("newGroup", "description", ImmutableMap.of("app", "app"));
when(groupDAO.getGroup("newGroup")).thenReturn(Optional.empty());
when(groupDAO.createGroup("newGroup", "user", "description",
ImmutableMap.of("app", "app"))).thenReturn(55L);
when(groupDAO.getGroupById(55L)).thenReturn(Optional.of(group));
when(aclDAO.getSanitizedSecretsFor(group)).thenReturn(ImmutableSet.of());
Response response = resource.createGroup(user, request);
assertThat(response.getStatus()).isEqualTo(201);
}
@Test(expected = BadRequestException.class)
public void rejectsWhenGroupExists() {
CreateGroupRequest request =
new CreateGroupRequest("newGroup", "description", ImmutableMap.of("app", "app"));
Group group = new Group(3, "newGroup", "desc", now, "creator", now, "updater",
ImmutableMap.of("app", "app"));
when(groupDAO.getGroup("newGroup")).thenReturn(Optional.of(group));
resource.createGroup(user, request);
}
@Test public void getSpecificIncludesAllTheThings() {
when(groupDAO.getGroupById(4444)).thenReturn(Optional.of(group));
SanitizedSecret secret = SanitizedSecret.of(1, "name", null, "checksum", now, "creator", now, "creator", null, null, null,
1136214245, 125L);
when(aclDAO.getSanitizedSecretsFor(group)).thenReturn(ImmutableSet.of(secret));
Client client = new Client(1, "client", "desc", now, "creator", now, "creator", null, true, false);
when(aclDAO.getClientsFor(group)).thenReturn(ImmutableSet.of(client));
GroupDetailResponse response = resource.getGroup(user, new LongParam("4444"));
assertThat(response.getId()).isEqualTo(group.getId());
assertThat(response.getName()).isEqualTo(group.getName());
assertThat(response.getDescription()).isEqualTo(group.getDescription());
assertThat(response.getCreationDate()).isEqualTo(group.getCreatedAt());
assertThat(response.getCreatedBy()).isEqualTo(group.getCreatedBy());
assertThat(response.getUpdateDate()).isEqualTo(group.getUpdatedAt());
assertThat(response.getUpdatedBy()).isEqualTo(group.getUpdatedBy());
assertThat(response.getSecrets()).containsExactly(secret);
assertThat(response.getClients()).containsExactly(client);
}
@Test(expected = NotFoundException.class)
public void notFoundWhenRetrievingBadId() {
when(groupDAO.getGroupById(0x1bad1dea)).thenReturn(Optional.empty());
resource.getGroup(user, new LongParam(Long.toString(0x1bad1dea)));
}
@Test public void findGroupByName() {
when(groupDAO.getGroup(group.getName())).thenReturn(Optional.of(group));
assertThat(resource.getGroupByName(user, "group")).isEqualTo(group);
}
@Test(expected = NotFoundException.class)
public void notFoundWhenRetrievingBadName() {
when(groupDAO.getGroup("non-existent-group")).thenReturn(Optional.empty());
resource.getGroupByName(user, "non-existent-group");
}
@Test public void canDelete() {
when(groupDAO.getGroupById(0xdeadbeef)).thenReturn(Optional.of(group));
Response response = resource.deleteGroup(user, new LongParam(Long.toString(0xdeadbeef)));
verify(groupDAO).deleteGroup(group);
assertThat(response.getStatus()).isEqualTo(204);
}
@Test(expected = NotFoundException.class)
public void notFoundWhenDeletingBadId() {
when(groupDAO.getGroupById(0x1bad1dea)).thenReturn(Optional.empty());
resource.deleteGroup(user, new LongParam(Long.toString(0x1bad1dea)));
}
}