22
22
23
23
@ ExtendWith (MockitoExtension .class )
24
24
@ MockitoSettings (strictness = Strictness .LENIENT )
25
- public class GcpOidcAttestationProviderTest {
25
+ public class GcpOidcCoreAttestationServiceTest {
26
26
private static final String ATTESTATION_REQUEST = "test-attestation-request" ;
27
27
private static final String PUBLIC_KEY = "test-public-key" ;
28
28
@@ -56,7 +56,7 @@ public void setup() throws AttestationException {
56
56
57
57
@ Test
58
58
public void testHappyPath () throws AttestationException {
59
- var provider = new GcpOidcAttestationProvider (alwaysPassTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 ));
59
+ var provider = new GcpOidcCoreAttestationService (alwaysPassTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 ));
60
60
provider .registerEnclave (ENCLAVE_ID_1 );
61
61
attest (provider , ar -> {
62
62
assertTrue (ar .succeeded ());
@@ -68,7 +68,7 @@ public void testHappyPath() throws AttestationException {
68
68
public void testSignatureCheckFailed_ClientError () throws AttestationException {
69
69
var errorStr = "signature validation failed" ;
70
70
when (alwaysFailTokenValidator .validate (any ())).thenThrow (new AttestationClientException (errorStr ));
71
- var provider = new GcpOidcAttestationProvider (alwaysFailTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 ));
71
+ var provider = new GcpOidcCoreAttestationService (alwaysFailTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 ));
72
72
provider .registerEnclave (ENCLAVE_ID_1 );
73
73
attest (provider , ar -> {
74
74
assertTrue (ar .succeeded ());
@@ -80,7 +80,7 @@ public void testSignatureCheckFailed_ClientError() throws AttestationException {
80
80
@ Test
81
81
public void testSignatureCheckFailed_ServerError () throws AttestationException {
82
82
when (alwaysFailTokenValidator .validate (any ())).thenThrow (new AttestationException ("unknown server error" ));
83
- var provider = new GcpOidcAttestationProvider (alwaysFailTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 ));
83
+ var provider = new GcpOidcCoreAttestationService (alwaysFailTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 ));
84
84
provider .registerEnclave (ENCLAVE_ID_1 );
85
85
attest (provider , ar -> {
86
86
assertFalse (ar .succeeded ());
@@ -92,7 +92,7 @@ public void testSignatureCheckFailed_ServerError() throws AttestationException {
92
92
public void testPolicyCheckFailed_ClientError () throws AttestationException {
93
93
var errorStr = "policy validation failed" ;
94
94
when (alwaysFailPolicyValidator .validate (any ())).thenThrow (new AttestationClientException (errorStr ));
95
- var provider = new GcpOidcAttestationProvider (alwaysPassTokenValidator , Arrays .asList (alwaysFailPolicyValidator ));
95
+ var provider = new GcpOidcCoreAttestationService (alwaysPassTokenValidator , Arrays .asList (alwaysFailPolicyValidator ));
96
96
provider .registerEnclave (ENCLAVE_ID_1 );
97
97
attest (provider , ar -> {
98
98
assertTrue (ar .succeeded ());
@@ -104,7 +104,7 @@ public void testPolicyCheckFailed_ClientError() throws AttestationException {
104
104
@ Test
105
105
public void testPolicyCheckFailed_ServerError () throws AttestationException {
106
106
when (alwaysFailPolicyValidator .validate (any ())).thenThrow (new AttestationException ("unknown server error" ));
107
- var provider = new GcpOidcAttestationProvider (alwaysPassTokenValidator , Arrays .asList (alwaysFailPolicyValidator ));
107
+ var provider = new GcpOidcCoreAttestationService (alwaysPassTokenValidator , Arrays .asList (alwaysFailPolicyValidator ));
108
108
provider .registerEnclave (ENCLAVE_ID_1 );
109
109
attest (provider , ar -> {
110
110
assertFalse (ar .succeeded ());
@@ -114,7 +114,7 @@ public void testPolicyCheckFailed_ServerError() throws AttestationException {
114
114
115
115
@ Test
116
116
public void testNoPolicyConfigured () throws AttestationException {
117
- var provider = new GcpOidcAttestationProvider (alwaysPassTokenValidator , Arrays .asList ());
117
+ var provider = new GcpOidcCoreAttestationService (alwaysPassTokenValidator , Arrays .asList ());
118
118
provider .registerEnclave (ENCLAVE_ID_1 );
119
119
attest (provider , ar -> {
120
120
assertTrue (ar .succeeded ());
@@ -125,15 +125,15 @@ public void testNoPolicyConfigured() throws AttestationException {
125
125
126
126
@ Test
127
127
public void testMultiplePolicyValidators () throws AttestationException {
128
- var provider = new GcpOidcAttestationProvider (alwaysPassTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 , alwaysFailPolicyValidator , alwaysPassPolicyValidator2 ));
128
+ var provider = new GcpOidcCoreAttestationService (alwaysPassTokenValidator , Arrays .asList (alwaysPassPolicyValidator1 , alwaysFailPolicyValidator , alwaysPassPolicyValidator2 ));
129
129
provider .registerEnclave (ENCLAVE_ID_2 );
130
130
attest (provider , ar -> {
131
131
assertTrue (ar .succeeded ());
132
132
assertTrue (ar .result ().isSuccess ());
133
133
});
134
134
}
135
135
136
- private static void attest (IAttestationProvider provider , Handler <AsyncResult <AttestationResult >> handler ) {
136
+ private static void attest (ICoreAttestationService provider , Handler <AsyncResult <AttestationResult >> handler ) {
137
137
provider .attest (
138
138
ATTESTATION_REQUEST .getBytes (StandardCharsets .UTF_8 ),
139
139
PUBLIC_KEY .getBytes (StandardCharsets .UTF_8 ),
0 commit comments