Remove blank lines from all tests
Remove all blank lines from test code so that test methods are visually grouped together. This generally helps to make the test classes easer to scan, however, the "given" / "when" / "then" blocks used by some tests are now not as easy to discern. Issue gh-8945
This commit is contained in:
-27
@@ -62,22 +62,16 @@ public class OpenID4JavaConsumerTests {
|
||||
ConsumerManager mgr = mock(ConsumerManager.class);
|
||||
AuthRequest authReq = mock(AuthRequest.class);
|
||||
DiscoveryInformation di = mock(DiscoveryInformation.class);
|
||||
|
||||
given(mgr.authenticate(any(DiscoveryInformation.class), any(), any())).willReturn(authReq);
|
||||
given(mgr.associate(any())).willReturn(di);
|
||||
|
||||
OpenID4JavaConsumer consumer = new OpenID4JavaConsumer(mgr, new MockAttributesFactory());
|
||||
|
||||
MockHttpServletRequest request = new MockHttpServletRequest();
|
||||
consumer.beginConsumption(request, "", "", "");
|
||||
|
||||
assertThat(request.getSession().getAttribute("SPRING_SECURITY_OPEN_ID_ATTRIBUTES_FETCH_LIST"))
|
||||
.isEqualTo(this.attributes);
|
||||
assertThat(request.getSession().getAttribute(DiscoveryInformation.class.getName())).isEqualTo(di);
|
||||
|
||||
// Check with empty attribute fetch list
|
||||
consumer = new OpenID4JavaConsumer(mgr, new NullAxFetchListFactory());
|
||||
|
||||
request = new MockHttpServletRequest();
|
||||
consumer.beginConsumption(request, "", "", "");
|
||||
}
|
||||
@@ -94,7 +88,6 @@ public class OpenID4JavaConsumerTests {
|
||||
public void messageOrConsumerAuthenticationExceptionRaisesOpenIDException() throws Exception {
|
||||
ConsumerManager mgr = mock(ConsumerManager.class);
|
||||
OpenID4JavaConsumer consumer = new OpenID4JavaConsumer(mgr, new NullAxFetchListFactory());
|
||||
|
||||
given(mgr.authenticate(ArgumentMatchers.<DiscoveryInformation>any(), any(), any()))
|
||||
.willThrow(new MessageException("msg"), new ConsumerException("msg"));
|
||||
try {
|
||||
@@ -103,7 +96,6 @@ public class OpenID4JavaConsumerTests {
|
||||
}
|
||||
catch (OpenIDConsumerException expected) {
|
||||
}
|
||||
|
||||
try {
|
||||
consumer.beginConsumption(new MockHttpServletRequest(), "", "", "");
|
||||
fail("OpenIDConsumerException was not thrown");
|
||||
@@ -118,15 +110,10 @@ public class OpenID4JavaConsumerTests {
|
||||
OpenID4JavaConsumer consumer = new OpenID4JavaConsumer(mgr, new NullAxFetchListFactory());
|
||||
VerificationResult vr = mock(VerificationResult.class);
|
||||
DiscoveryInformation di = mock(DiscoveryInformation.class);
|
||||
|
||||
given(mgr.verify(any(), any(ParameterList.class), any(DiscoveryInformation.class))).willReturn(vr);
|
||||
|
||||
MockHttpServletRequest request = new MockHttpServletRequest();
|
||||
|
||||
request.getSession().setAttribute(DiscoveryInformation.class.getName(), di);
|
||||
|
||||
OpenIDAuthenticationToken auth = consumer.endConsumption(request);
|
||||
|
||||
assertThat(auth.getStatus()).isEqualTo(OpenIDAuthenticationStatus.FAILURE);
|
||||
}
|
||||
|
||||
@@ -134,34 +121,28 @@ public class OpenID4JavaConsumerTests {
|
||||
public void verificationExceptionsRaiseOpenIDException() throws Exception {
|
||||
ConsumerManager mgr = mock(ConsumerManager.class);
|
||||
OpenID4JavaConsumer consumer = new OpenID4JavaConsumer(mgr, new NullAxFetchListFactory());
|
||||
|
||||
given(mgr.verify(any(), any(ParameterList.class), any(DiscoveryInformation.class)))
|
||||
.willThrow(new MessageException(""), new AssociationException(""), new DiscoveryException(""));
|
||||
|
||||
MockHttpServletRequest request = new MockHttpServletRequest();
|
||||
request.setQueryString("x=5");
|
||||
|
||||
try {
|
||||
consumer.endConsumption(request);
|
||||
fail("OpenIDConsumerException was not thrown");
|
||||
}
|
||||
catch (OpenIDConsumerException expected) {
|
||||
}
|
||||
|
||||
try {
|
||||
consumer.endConsumption(request);
|
||||
fail("OpenIDConsumerException was not thrown");
|
||||
}
|
||||
catch (OpenIDConsumerException expected) {
|
||||
}
|
||||
|
||||
try {
|
||||
consumer.endConsumption(request);
|
||||
fail("OpenIDConsumerException was not thrown");
|
||||
}
|
||||
catch (OpenIDConsumerException expected) {
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@SuppressWarnings("serial")
|
||||
@@ -173,18 +154,13 @@ public class OpenID4JavaConsumerTests {
|
||||
DiscoveryInformation di = mock(DiscoveryInformation.class);
|
||||
Identifier id = (Identifier) () -> "id";
|
||||
Message msg = mock(Message.class);
|
||||
|
||||
given(mgr.verify(any(), any(ParameterList.class), any(DiscoveryInformation.class))).willReturn(vr);
|
||||
given(vr.getVerifiedId()).willReturn(id);
|
||||
given(vr.getAuthResponse()).willReturn(msg);
|
||||
|
||||
MockHttpServletRequest request = new MockHttpServletRequest();
|
||||
|
||||
request.getSession().setAttribute(DiscoveryInformation.class.getName(), di);
|
||||
request.getSession().setAttribute("SPRING_SECURITY_OPEN_ID_ATTRIBUTES_FETCH_LIST", this.attributes);
|
||||
|
||||
OpenIDAuthenticationToken auth = consumer.endConsumption(request);
|
||||
|
||||
assertThat(auth.getStatus()).isEqualTo(OpenIDAuthenticationStatus.SUCCESS);
|
||||
}
|
||||
|
||||
@@ -196,9 +172,7 @@ public class OpenID4JavaConsumerTests {
|
||||
given(msg.hasExtension(AxMessage.OPENID_NS_AX)).willReturn(true);
|
||||
given(msg.getExtension(AxMessage.OPENID_NS_AX)).willReturn(fr);
|
||||
given(fr.getAttributeValues("a")).willReturn(Arrays.asList("x", "y"));
|
||||
|
||||
List<OpenIDAttribute> fetched = consumer.fetchAxAttributes(msg, this.attributes);
|
||||
|
||||
assertThat(fetched).hasSize(1);
|
||||
assertThat(fetched.get(0).getValues()).hasSize(2);
|
||||
}
|
||||
@@ -211,7 +185,6 @@ public class OpenID4JavaConsumerTests {
|
||||
given(msg.hasExtension(AxMessage.OPENID_NS_AX)).willReturn(true);
|
||||
given(msg.getExtension(AxMessage.OPENID_NS_AX)).willThrow(new MessageException(""));
|
||||
given(fr.getAttributeValues("a")).willReturn(Arrays.asList("x", "y"));
|
||||
|
||||
consumer.fetchAxAttributes(msg, this.attributes);
|
||||
}
|
||||
|
||||
|
||||
-4
@@ -75,10 +75,8 @@ public class OpenIDAuthenticationFilterTests {
|
||||
req.setRequestURI(REQUEST_PATH);
|
||||
req.setServerPort(8080);
|
||||
MockHttpServletResponse response = new MockHttpServletResponse();
|
||||
|
||||
req.setParameter("openid_identifier", " " + CLAIMED_IDENTITY_URL);
|
||||
req.setRemoteHost("www.example.com");
|
||||
|
||||
this.filter.setConsumer(new MockOpenIDConsumer() {
|
||||
@Override
|
||||
public String beginConsumption(HttpServletRequest req, String claimedIdentity, String returnToUrl,
|
||||
@@ -89,7 +87,6 @@ public class OpenIDAuthenticationFilterTests {
|
||||
return REDIRECT_URL;
|
||||
}
|
||||
});
|
||||
|
||||
FilterChain fc = mock(FilterChain.class);
|
||||
this.filter.doFilter(req, response, fc);
|
||||
assertThat(response.getRedirectedUrl()).isEqualTo(REDIRECT_URL);
|
||||
@@ -108,7 +105,6 @@ public class OpenIDAuthenticationFilterTests {
|
||||
MockHttpServletRequest req = new MockHttpServletRequest("GET", REQUEST_PATH);
|
||||
req.addParameter(paramName, paramValue);
|
||||
this.filter.setReturnToUrlParameters(Collections.singleton(paramName));
|
||||
|
||||
URI returnTo = new URI(this.filter.buildReturnToUrl(req));
|
||||
String query = returnTo.getRawQuery();
|
||||
assertThat(count(query, '=')).isEqualTo(1);
|
||||
|
||||
-21
@@ -57,12 +57,9 @@ public class OpenIDAuthenticationProviderTests {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
provider.setAuthoritiesMapper(new NullAuthoritiesMapper());
|
||||
|
||||
Authentication preAuth = new OpenIDAuthenticationToken(OpenIDAuthenticationStatus.CANCELLED, USERNAME, "",
|
||||
null);
|
||||
|
||||
assertThat(preAuth.isAuthenticated()).isFalse();
|
||||
|
||||
try {
|
||||
provider.authenticate(preAuth);
|
||||
fail("Should throw an AuthenticationException");
|
||||
@@ -81,11 +78,8 @@ public class OpenIDAuthenticationProviderTests {
|
||||
public void testAuthenticateError() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
|
||||
Authentication preAuth = new OpenIDAuthenticationToken(OpenIDAuthenticationStatus.ERROR, USERNAME, "", null);
|
||||
|
||||
assertThat(preAuth.isAuthenticated()).isFalse();
|
||||
|
||||
try {
|
||||
provider.authenticate(preAuth);
|
||||
fail("Should throw an AuthenticationException");
|
||||
@@ -105,11 +99,8 @@ public class OpenIDAuthenticationProviderTests {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setAuthenticationUserDetailsService(
|
||||
new UserDetailsByNameServiceWrapper<>(new MockUserDetailsService()));
|
||||
|
||||
Authentication preAuth = new OpenIDAuthenticationToken(OpenIDAuthenticationStatus.FAILURE, USERNAME, "", null);
|
||||
|
||||
assertThat(preAuth.isAuthenticated()).isFalse();
|
||||
|
||||
try {
|
||||
provider.authenticate(preAuth);
|
||||
fail("Should throw an AuthenticationException");
|
||||
@@ -128,12 +119,9 @@ public class OpenIDAuthenticationProviderTests {
|
||||
public void testAuthenticateSetupNeeded() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
|
||||
Authentication preAuth = new OpenIDAuthenticationToken(OpenIDAuthenticationStatus.SETUP_NEEDED, USERNAME, "",
|
||||
null);
|
||||
|
||||
assertThat(preAuth.isAuthenticated()).isFalse();
|
||||
|
||||
try {
|
||||
provider.authenticate(preAuth);
|
||||
fail("Should throw an AuthenticationException");
|
||||
@@ -153,13 +141,9 @@ public class OpenIDAuthenticationProviderTests {
|
||||
public void testAuthenticateSuccess() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
|
||||
Authentication preAuth = new OpenIDAuthenticationToken(OpenIDAuthenticationStatus.SUCCESS, USERNAME, "", null);
|
||||
|
||||
assertThat(preAuth.isAuthenticated()).isFalse();
|
||||
|
||||
Authentication postAuth = provider.authenticate(preAuth);
|
||||
|
||||
assertThat(postAuth).isNotNull();
|
||||
assertThat(postAuth instanceof OpenIDAuthenticationToken).isTrue();
|
||||
assertThat(postAuth.isAuthenticated()).isTrue();
|
||||
@@ -174,7 +158,6 @@ public class OpenIDAuthenticationProviderTests {
|
||||
@Test
|
||||
public void testDetectsMissingAuthoritiesPopulator() throws Exception {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
||||
try {
|
||||
provider.afterPropertiesSet();
|
||||
fail("Should have thrown Exception");
|
||||
@@ -193,7 +176,6 @@ public class OpenIDAuthenticationProviderTests {
|
||||
public void testDoesntSupport() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
|
||||
assertThat(provider.supports(UsernamePasswordAuthenticationToken.class)).isFalse();
|
||||
}
|
||||
|
||||
@@ -206,7 +188,6 @@ public class OpenIDAuthenticationProviderTests {
|
||||
public void testIgnoresUserPassAuthToken() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
|
||||
UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(USERNAME, "password");
|
||||
assertThat(provider.authenticate(token)).isNull();
|
||||
}
|
||||
@@ -220,7 +201,6 @@ public class OpenIDAuthenticationProviderTests {
|
||||
public void testSupports() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
|
||||
assertThat(provider.supports(OpenIDAuthenticationToken.class)).isTrue();
|
||||
}
|
||||
|
||||
@@ -234,7 +214,6 @@ public class OpenIDAuthenticationProviderTests {
|
||||
catch (IllegalArgumentException ex) {
|
||||
// expected
|
||||
}
|
||||
|
||||
provider = new OpenIDAuthenticationProvider();
|
||||
provider.setUserDetailsService(new MockUserDetailsService());
|
||||
provider.afterPropertiesSet();
|
||||
|
||||
Reference in New Issue
Block a user