From: David ‘Bombe’ Roden Date: Sun, 15 Jan 2017 12:37:30 +0000 (+0100) Subject: Move all Kotlin files to the correct directory X-Git-Tag: 0.9.7^2~330 X-Git-Url: https://git.pterodactylus.net/?p=Sone.git;a=commitdiff_plain;h=0a481aacb47d7c1e90c1c212a58f87af29e3ebb6 Move all Kotlin files to the correct directory --- diff --git a/src/main/java/net/pterodactylus/sone/freenet/L10nText.kt b/src/main/java/net/pterodactylus/sone/freenet/L10nText.kt deleted file mode 100644 index 0c975be..0000000 --- a/src/main/java/net/pterodactylus/sone/freenet/L10nText.kt +++ /dev/null @@ -1,6 +0,0 @@ -package net.pterodactylus.sone.freenet - -/** - * Container for an l10n key and optional values. - */ -data class L10nText(val text: String, val parameters: List = emptyList()) diff --git a/src/main/kotlin/net/pterodactylus/sone/freenet/L10nText.kt b/src/main/kotlin/net/pterodactylus/sone/freenet/L10nText.kt new file mode 100644 index 0000000..0c975be --- /dev/null +++ b/src/main/kotlin/net/pterodactylus/sone/freenet/L10nText.kt @@ -0,0 +1,6 @@ +package net.pterodactylus.sone.freenet + +/** + * Container for an l10n key and optional values. + */ +data class L10nText(val text: String, val parameters: List = emptyList()) diff --git a/src/test/java/net/pterodactylus/sone/OneByOneMatcher.kt b/src/test/java/net/pterodactylus/sone/OneByOneMatcher.kt deleted file mode 100644 index 109add2..0000000 --- a/src/test/java/net/pterodactylus/sone/OneByOneMatcher.kt +++ /dev/null @@ -1,33 +0,0 @@ -package net.pterodactylus.sone - -import org.hamcrest.Description -import org.hamcrest.TypeSafeDiagnosingMatcher - -class OneByOneMatcher : TypeSafeDiagnosingMatcher() { - private data class Matcher(val expected: V, val actual: (A) -> V, val description: String) - - private val matchers = mutableListOf>() - - fun expect(description: String, expected: V, actual: (A) -> V) { - matchers += Matcher(expected, actual, description) - } - - override fun describeTo(description: Description) { - matchers.forEachIndexed { index, matcher -> - if (index > 0) { - description.appendText(", ") - } - description.appendText("${matcher.description} is ").appendValue(matcher.expected) - } - } - - override fun matchesSafely(item: A, mismatchDescription: Description) = - matchers.all { - if (it.expected != it.actual(item)) { - mismatchDescription.appendText("${it.description} is ").appendValue(it.actual(item)) - false - } else { - true - } - } -} diff --git a/src/test/java/net/pterodactylus/sone/fcp/FcpInterfaceTest.kt b/src/test/java/net/pterodactylus/sone/fcp/FcpInterfaceTest.kt deleted file mode 100644 index e9137b0..0000000 --- a/src/test/java/net/pterodactylus/sone/fcp/FcpInterfaceTest.kt +++ /dev/null @@ -1,247 +0,0 @@ -@file:Suppress("DEPRECATION") - -package net.pterodactylus.sone.fcp - -import com.google.inject.Guice -import freenet.pluginmanager.PluginNotFoundException -import freenet.pluginmanager.PluginReplySender -import freenet.support.SimpleFieldSet -import net.pterodactylus.sone.core.Core -import net.pterodactylus.sone.fcp.FcpInterface.AccessAuthorizer -import net.pterodactylus.sone.fcp.FcpInterface.CommandSupplier -import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired -import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired.ALWAYS -import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired.NO -import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired.WRITING -import net.pterodactylus.sone.fcp.event.FcpInterfaceActivatedEvent -import net.pterodactylus.sone.fcp.event.FcpInterfaceDeactivatedEvent -import net.pterodactylus.sone.fcp.event.FullAccessRequiredChanged -import net.pterodactylus.sone.freenet.fcp.Command.AccessType -import net.pterodactylus.sone.freenet.fcp.Command.AccessType.FULL_FCP -import net.pterodactylus.sone.freenet.fcp.Command.AccessType.RESTRICTED_FCP -import net.pterodactylus.sone.freenet.fcp.Command.Response -import net.pterodactylus.sone.test.bindAs -import net.pterodactylus.sone.test.capture -import net.pterodactylus.sone.test.mock -import net.pterodactylus.sone.test.whenever -import org.hamcrest.MatcherAssert.assertThat -import org.hamcrest.Matchers.containsInAnyOrder -import org.hamcrest.Matchers.equalTo -import org.hamcrest.Matchers.sameInstance -import org.junit.Test -import org.mockito.ArgumentMatchers -import org.mockito.Mockito.any -import org.mockito.Mockito.anyBoolean -import org.mockito.Mockito.verify - -/** - * Unit test for [FcpInterface] and its subclasses. - */ -class FcpInterfaceTest { - - private val core = mock() - private val workingCommand = mock().apply { - whenever(execute(any())).thenReturn(Response("Working", SimpleFieldSet(true).apply { - putSingle("ReallyWorking", "true") - })) - } - private val brokenCommand = mock().apply { - whenever(execute(any())).thenThrow(RuntimeException::class.java) - } - private val commandSupplier = object : CommandSupplier() { - override fun supplyCommands(core: Core): Map { - return mapOf( - "Working" to workingCommand, - "Broken" to brokenCommand - ) - } - } - private val accessAuthorizer = mock() - private val fcpInterface = FcpInterface(core, commandSupplier, accessAuthorizer) - private val pluginReplySender = mock() - private val parameters = SimpleFieldSet(true) - private val replyParameters = capture() - - @Test - fun `fcp interface is instantiated as singleton`() { - val injector = Guice.createInjector(core.bindAs(Core::class)) - assertThat(injector.getInstance(FcpInterface::class.java), sameInstance(injector.getInstance(FcpInterface::class.java))) - } - - @Test - fun `fcp interface can be activated`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - assertThat(fcpInterface.isActive, equalTo(true)) - } - - @Test - fun `fcp interface can be deactivated`() { - fcpInterface.fcpInterfaceDeactivated(FcpInterfaceDeactivatedEvent()) - assertThat(fcpInterface.isActive, equalTo(false)) - } - - private fun setAndVerifyAccessRequired(fullAccessRequired: FullAccessRequired) { - fcpInterface.fullAccessRequiredChanged(FullAccessRequiredChanged(fullAccessRequired)) - assertThat(fcpInterface.fullAccessRequired, equalTo(fullAccessRequired)) - } - - @Test - fun `set full access required can set access to no`() { - setAndVerifyAccessRequired(NO) - } - - @Test - fun `set full access required can set access to writing`() { - setAndVerifyAccessRequired(WRITING) - } - - @Test - fun `set full access required can set access to always`() { - setAndVerifyAccessRequired(ALWAYS) - } - - @Test - fun `sending command to inactive fcp interface results in 400 error reply`() { - fcpInterface.fcpInterfaceDeactivated(FcpInterfaceDeactivatedEvent()) - fcpInterface.handle(pluginReplySender, parameters, null, 0) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Error")) - assertThat(replyParameters.value["ErrorCode"], equalTo("503")) - } - - @Test - fun `exception while sending reply does not result in exception`() { - fcpInterface.fcpInterfaceDeactivated(FcpInterfaceDeactivatedEvent()) - whenever(pluginReplySender.send(ArgumentMatchers.any())).thenThrow(PluginNotFoundException::class.java) - fcpInterface.handle(pluginReplySender, parameters, null, 0) - } - - @Test - fun `sending command over non-authorized connection results in 401 error reply`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - parameters.putSingle("Message", "Working") - fcpInterface.handle(pluginReplySender, parameters, null, RESTRICTED_FCP.ordinal) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Error")) - assertThat(replyParameters.value["ErrorCode"], equalTo("401")) - } - - @Test - fun `sending unknown command results in 404 error reply`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - fcpInterface.handle(pluginReplySender, parameters, null, RESTRICTED_FCP.ordinal) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Error")) - assertThat(replyParameters.value["ErrorCode"], equalTo("404")) - } - - @Test - fun `sending working command without identifier results in 400 error code`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) - parameters.putSingle("Message", "Working") - fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Error")) - assertThat(replyParameters.value["ErrorCode"], equalTo("400")) - } - - @Test - fun `sending working command with empty identifier results in 400 error code`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) - parameters.putSingle("Message", "Working") - parameters.putSingle("Identifier", "") - fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Error")) - assertThat(replyParameters.value["ErrorCode"], equalTo("400")) - } - - @Test - fun `sending working command with identifier results in working reply`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) - parameters.putSingle("Message", "Working") - parameters.putSingle("Identifier", "Test") - fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Working")) - assertThat(replyParameters.value["ReallyWorking"], equalTo("true")) - } - - @Test - fun `sending broken command with identifier results in 500 error reply`() { - fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) - whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) - parameters.putSingle("Message", "Broken") - parameters.putSingle("Identifier", "Test") - fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) - verify(pluginReplySender).send(replyParameters.capture()) - assertThat(replyParameters.value["Message"], equalTo("Error")) - assertThat(replyParameters.value["ErrorCode"], equalTo("500")) - } - -} - -class CommandSupplierTest { - - private val core = mock() - private val commandSupplier = CommandSupplier() - - @Test - fun `command supplier supplies all commands`() { - val commands = commandSupplier.supplyCommands(core) - assertThat(commands.keys, containsInAnyOrder( - "CreatePost", - "CreateReply", - "DeletePost", - "DeleteReply", - "GetLocalSones", - "GetPost", - "GetPostFeed", - "GetPosts", - "GetSone", - "GetSones", - "LikePost", - "LikeReply", - "LockSone", - "UnlockSone", - "Version" - )) - } - - @Test - fun `command supplier is instantiated as singleton`() { - val injector = Guice.createInjector() - assertThat(injector.getInstance(CommandSupplier::class.java), sameInstance(injector.getInstance(CommandSupplier::class.java))) - } - -} - -class AccessAuthorizerTest { - - private val accessAuthorizer = AccessAuthorizer() - - @Test - fun `access authorizer is instantiated as singleton`() { - val injector = Guice.createInjector() - assertThat(injector.getInstance(AccessAuthorizer::class.java), sameInstance(injector.getInstance(AccessAuthorizer::class.java))) - } - - @Test - fun `access authorizer makes correct decisions`() { - AccessType.values().forEach { accessType -> - FullAccessRequired.values().forEach { fullAccessRequired -> - listOf(false, true).forEach { commandRequiresWriteAccess -> - assertThat("$accessType, $fullAccessRequired, $commandRequiresWriteAccess", accessAuthorizer.authorized(accessType, fullAccessRequired, commandRequiresWriteAccess), equalTo( - accessType != RESTRICTED_FCP || - fullAccessRequired == NO || - (fullAccessRequired == WRITING && !commandRequiresWriteAccess) - )) - } - } - } - } - -} diff --git a/src/test/java/net/pterodactylus/sone/template/ImageAccessorTest.kt b/src/test/java/net/pterodactylus/sone/template/ImageAccessorTest.kt deleted file mode 100644 index eb692ba..0000000 --- a/src/test/java/net/pterodactylus/sone/template/ImageAccessorTest.kt +++ /dev/null @@ -1,55 +0,0 @@ -package net.pterodactylus.sone.template - -import net.pterodactylus.sone.data.Album -import net.pterodactylus.sone.data.Image -import net.pterodactylus.sone.test.mock -import net.pterodactylus.sone.test.whenever -import org.hamcrest.MatcherAssert.assertThat -import org.hamcrest.Matchers.equalTo -import org.hamcrest.Matchers.nullValue -import org.junit.Before -import org.junit.Test - -/** - * Unit test for [ImageAccessor]. - */ -class ImageAccessorTest { - - private val accessor = ImageAccessor() - private val album = mock() - private val images = listOf(mock(), mock()) - - @Before - fun setupImages() { - whenever(album.images).thenReturn(images) - images.forEach { - whenever(it.album).thenReturn(album) - } - } - - @Test - fun `accessor returns next image for first image`() { - assertThat(accessor.get(null, images[0], "next"), equalTo(images[1])) - } - - @Test - fun `accessor returns null for next image of second image`() { - assertThat(accessor.get(null, images[1], "next"), nullValue()) - } - - @Test - fun `accessor returns previous image for second image`() { - assertThat(accessor.get(null, images[1], "previous"), equalTo(images[0])) - } - - @Test - fun `accessor returns null for previous image of first image`() { - assertThat(accessor.get(null, images[0], "previous"), nullValue()) - } - - @Test - fun `accessor uses reflection accessor for all other members`() { - assertThat(accessor.get(null, images[0], "hashCode"), equalTo(images[0].hashCode())) - } - -} diff --git a/src/test/kotlin/net/pterodactylus/sone/OneByOneMatcher.kt b/src/test/kotlin/net/pterodactylus/sone/OneByOneMatcher.kt new file mode 100644 index 0000000..109add2 --- /dev/null +++ b/src/test/kotlin/net/pterodactylus/sone/OneByOneMatcher.kt @@ -0,0 +1,33 @@ +package net.pterodactylus.sone + +import org.hamcrest.Description +import org.hamcrest.TypeSafeDiagnosingMatcher + +class OneByOneMatcher : TypeSafeDiagnosingMatcher() { + private data class Matcher(val expected: V, val actual: (A) -> V, val description: String) + + private val matchers = mutableListOf>() + + fun expect(description: String, expected: V, actual: (A) -> V) { + matchers += Matcher(expected, actual, description) + } + + override fun describeTo(description: Description) { + matchers.forEachIndexed { index, matcher -> + if (index > 0) { + description.appendText(", ") + } + description.appendText("${matcher.description} is ").appendValue(matcher.expected) + } + } + + override fun matchesSafely(item: A, mismatchDescription: Description) = + matchers.all { + if (it.expected != it.actual(item)) { + mismatchDescription.appendText("${it.description} is ").appendValue(it.actual(item)) + false + } else { + true + } + } +} diff --git a/src/test/kotlin/net/pterodactylus/sone/fcp/FcpInterfaceTest.kt b/src/test/kotlin/net/pterodactylus/sone/fcp/FcpInterfaceTest.kt new file mode 100644 index 0000000..e9137b0 --- /dev/null +++ b/src/test/kotlin/net/pterodactylus/sone/fcp/FcpInterfaceTest.kt @@ -0,0 +1,247 @@ +@file:Suppress("DEPRECATION") + +package net.pterodactylus.sone.fcp + +import com.google.inject.Guice +import freenet.pluginmanager.PluginNotFoundException +import freenet.pluginmanager.PluginReplySender +import freenet.support.SimpleFieldSet +import net.pterodactylus.sone.core.Core +import net.pterodactylus.sone.fcp.FcpInterface.AccessAuthorizer +import net.pterodactylus.sone.fcp.FcpInterface.CommandSupplier +import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired +import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired.ALWAYS +import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired.NO +import net.pterodactylus.sone.fcp.FcpInterface.FullAccessRequired.WRITING +import net.pterodactylus.sone.fcp.event.FcpInterfaceActivatedEvent +import net.pterodactylus.sone.fcp.event.FcpInterfaceDeactivatedEvent +import net.pterodactylus.sone.fcp.event.FullAccessRequiredChanged +import net.pterodactylus.sone.freenet.fcp.Command.AccessType +import net.pterodactylus.sone.freenet.fcp.Command.AccessType.FULL_FCP +import net.pterodactylus.sone.freenet.fcp.Command.AccessType.RESTRICTED_FCP +import net.pterodactylus.sone.freenet.fcp.Command.Response +import net.pterodactylus.sone.test.bindAs +import net.pterodactylus.sone.test.capture +import net.pterodactylus.sone.test.mock +import net.pterodactylus.sone.test.whenever +import org.hamcrest.MatcherAssert.assertThat +import org.hamcrest.Matchers.containsInAnyOrder +import org.hamcrest.Matchers.equalTo +import org.hamcrest.Matchers.sameInstance +import org.junit.Test +import org.mockito.ArgumentMatchers +import org.mockito.Mockito.any +import org.mockito.Mockito.anyBoolean +import org.mockito.Mockito.verify + +/** + * Unit test for [FcpInterface] and its subclasses. + */ +class FcpInterfaceTest { + + private val core = mock() + private val workingCommand = mock().apply { + whenever(execute(any())).thenReturn(Response("Working", SimpleFieldSet(true).apply { + putSingle("ReallyWorking", "true") + })) + } + private val brokenCommand = mock().apply { + whenever(execute(any())).thenThrow(RuntimeException::class.java) + } + private val commandSupplier = object : CommandSupplier() { + override fun supplyCommands(core: Core): Map { + return mapOf( + "Working" to workingCommand, + "Broken" to brokenCommand + ) + } + } + private val accessAuthorizer = mock() + private val fcpInterface = FcpInterface(core, commandSupplier, accessAuthorizer) + private val pluginReplySender = mock() + private val parameters = SimpleFieldSet(true) + private val replyParameters = capture() + + @Test + fun `fcp interface is instantiated as singleton`() { + val injector = Guice.createInjector(core.bindAs(Core::class)) + assertThat(injector.getInstance(FcpInterface::class.java), sameInstance(injector.getInstance(FcpInterface::class.java))) + } + + @Test + fun `fcp interface can be activated`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + assertThat(fcpInterface.isActive, equalTo(true)) + } + + @Test + fun `fcp interface can be deactivated`() { + fcpInterface.fcpInterfaceDeactivated(FcpInterfaceDeactivatedEvent()) + assertThat(fcpInterface.isActive, equalTo(false)) + } + + private fun setAndVerifyAccessRequired(fullAccessRequired: FullAccessRequired) { + fcpInterface.fullAccessRequiredChanged(FullAccessRequiredChanged(fullAccessRequired)) + assertThat(fcpInterface.fullAccessRequired, equalTo(fullAccessRequired)) + } + + @Test + fun `set full access required can set access to no`() { + setAndVerifyAccessRequired(NO) + } + + @Test + fun `set full access required can set access to writing`() { + setAndVerifyAccessRequired(WRITING) + } + + @Test + fun `set full access required can set access to always`() { + setAndVerifyAccessRequired(ALWAYS) + } + + @Test + fun `sending command to inactive fcp interface results in 400 error reply`() { + fcpInterface.fcpInterfaceDeactivated(FcpInterfaceDeactivatedEvent()) + fcpInterface.handle(pluginReplySender, parameters, null, 0) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Error")) + assertThat(replyParameters.value["ErrorCode"], equalTo("503")) + } + + @Test + fun `exception while sending reply does not result in exception`() { + fcpInterface.fcpInterfaceDeactivated(FcpInterfaceDeactivatedEvent()) + whenever(pluginReplySender.send(ArgumentMatchers.any())).thenThrow(PluginNotFoundException::class.java) + fcpInterface.handle(pluginReplySender, parameters, null, 0) + } + + @Test + fun `sending command over non-authorized connection results in 401 error reply`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + parameters.putSingle("Message", "Working") + fcpInterface.handle(pluginReplySender, parameters, null, RESTRICTED_FCP.ordinal) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Error")) + assertThat(replyParameters.value["ErrorCode"], equalTo("401")) + } + + @Test + fun `sending unknown command results in 404 error reply`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + fcpInterface.handle(pluginReplySender, parameters, null, RESTRICTED_FCP.ordinal) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Error")) + assertThat(replyParameters.value["ErrorCode"], equalTo("404")) + } + + @Test + fun `sending working command without identifier results in 400 error code`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) + parameters.putSingle("Message", "Working") + fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Error")) + assertThat(replyParameters.value["ErrorCode"], equalTo("400")) + } + + @Test + fun `sending working command with empty identifier results in 400 error code`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) + parameters.putSingle("Message", "Working") + parameters.putSingle("Identifier", "") + fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Error")) + assertThat(replyParameters.value["ErrorCode"], equalTo("400")) + } + + @Test + fun `sending working command with identifier results in working reply`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) + parameters.putSingle("Message", "Working") + parameters.putSingle("Identifier", "Test") + fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Working")) + assertThat(replyParameters.value["ReallyWorking"], equalTo("true")) + } + + @Test + fun `sending broken command with identifier results in 500 error reply`() { + fcpInterface.fcpInterfaceActivated(FcpInterfaceActivatedEvent()) + whenever(accessAuthorizer.authorized(any(), any(), anyBoolean())).thenReturn(true) + parameters.putSingle("Message", "Broken") + parameters.putSingle("Identifier", "Test") + fcpInterface.handle(pluginReplySender, parameters, null, FULL_FCP.ordinal) + verify(pluginReplySender).send(replyParameters.capture()) + assertThat(replyParameters.value["Message"], equalTo("Error")) + assertThat(replyParameters.value["ErrorCode"], equalTo("500")) + } + +} + +class CommandSupplierTest { + + private val core = mock() + private val commandSupplier = CommandSupplier() + + @Test + fun `command supplier supplies all commands`() { + val commands = commandSupplier.supplyCommands(core) + assertThat(commands.keys, containsInAnyOrder( + "CreatePost", + "CreateReply", + "DeletePost", + "DeleteReply", + "GetLocalSones", + "GetPost", + "GetPostFeed", + "GetPosts", + "GetSone", + "GetSones", + "LikePost", + "LikeReply", + "LockSone", + "UnlockSone", + "Version" + )) + } + + @Test + fun `command supplier is instantiated as singleton`() { + val injector = Guice.createInjector() + assertThat(injector.getInstance(CommandSupplier::class.java), sameInstance(injector.getInstance(CommandSupplier::class.java))) + } + +} + +class AccessAuthorizerTest { + + private val accessAuthorizer = AccessAuthorizer() + + @Test + fun `access authorizer is instantiated as singleton`() { + val injector = Guice.createInjector() + assertThat(injector.getInstance(AccessAuthorizer::class.java), sameInstance(injector.getInstance(AccessAuthorizer::class.java))) + } + + @Test + fun `access authorizer makes correct decisions`() { + AccessType.values().forEach { accessType -> + FullAccessRequired.values().forEach { fullAccessRequired -> + listOf(false, true).forEach { commandRequiresWriteAccess -> + assertThat("$accessType, $fullAccessRequired, $commandRequiresWriteAccess", accessAuthorizer.authorized(accessType, fullAccessRequired, commandRequiresWriteAccess), equalTo( + accessType != RESTRICTED_FCP || + fullAccessRequired == NO || + (fullAccessRequired == WRITING && !commandRequiresWriteAccess) + )) + } + } + } + } + +} diff --git a/src/test/kotlin/net/pterodactylus/sone/template/ImageAccessorTest.kt b/src/test/kotlin/net/pterodactylus/sone/template/ImageAccessorTest.kt new file mode 100644 index 0000000..eb692ba --- /dev/null +++ b/src/test/kotlin/net/pterodactylus/sone/template/ImageAccessorTest.kt @@ -0,0 +1,55 @@ +package net.pterodactylus.sone.template + +import net.pterodactylus.sone.data.Album +import net.pterodactylus.sone.data.Image +import net.pterodactylus.sone.test.mock +import net.pterodactylus.sone.test.whenever +import org.hamcrest.MatcherAssert.assertThat +import org.hamcrest.Matchers.equalTo +import org.hamcrest.Matchers.nullValue +import org.junit.Before +import org.junit.Test + +/** + * Unit test for [ImageAccessor]. + */ +class ImageAccessorTest { + + private val accessor = ImageAccessor() + private val album = mock() + private val images = listOf(mock(), mock()) + + @Before + fun setupImages() { + whenever(album.images).thenReturn(images) + images.forEach { + whenever(it.album).thenReturn(album) + } + } + + @Test + fun `accessor returns next image for first image`() { + assertThat(accessor.get(null, images[0], "next"), equalTo(images[1])) + } + + @Test + fun `accessor returns null for next image of second image`() { + assertThat(accessor.get(null, images[1], "next"), nullValue()) + } + + @Test + fun `accessor returns previous image for second image`() { + assertThat(accessor.get(null, images[1], "previous"), equalTo(images[0])) + } + + @Test + fun `accessor returns null for previous image of first image`() { + assertThat(accessor.get(null, images[0], "previous"), nullValue()) + } + + @Test + fun `accessor uses reflection accessor for all other members`() { + assertThat(accessor.get(null, images[0], "hashCode"), equalTo(images[0].hashCode())) + } + +}