forked from lorenzodonini/ocpp-go
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsign_certificate_test.go
87 lines (79 loc) · 3.91 KB
/
sign_certificate_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
package ocpp2_test
import (
"fmt"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
"github.com/lorenzodonini/ocpp-go/ocpp2.0.1/security"
"github.com/lorenzodonini/ocpp-go/ocpp2.0.1/types"
)
// Test
func (suite *OcppV2TestSuite) TestSignCertificateRequestValidation() {
var requestTable = []GenericTestEntry{
{security.SignCertificateRequest{CSR: "deadc0de", CertificateType: types.ChargingStationCert}, true},
{security.SignCertificateRequest{CSR: "deadc0de", CertificateType: types.V2GCertificate}, true},
{security.SignCertificateRequest{CSR: "deadc0de"}, true},
{security.SignCertificateRequest{}, false},
{security.SignCertificateRequest{CSR: "deadc0de", CertificateType: "invalidType"}, false},
}
ExecuteGenericTestTable(suite.T(), requestTable)
}
func (suite *OcppV2TestSuite) TestSignCertificateConfirmationValidation() {
t := suite.T()
var confirmationTable = []GenericTestEntry{
{security.SignCertificateResponse{Status: types.GenericStatusAccepted, StatusInfo: types.NewStatusInfo("200", "")}, true},
{security.SignCertificateResponse{Status: types.GenericStatusAccepted}, true},
{security.SignCertificateResponse{}, false},
{security.SignCertificateResponse{Status: types.GenericStatusAccepted, StatusInfo: types.NewStatusInfo("", "")}, false},
{security.SignCertificateResponse{Status: "invalidStatus", StatusInfo: types.NewStatusInfo("200", "")}, false},
}
ExecuteGenericTestTable(t, confirmationTable)
}
func (suite *OcppV2TestSuite) TestSignCertificateE2EMocked() {
t := suite.T()
wsId := "test_id"
messageId := defaultMessageId
wsUrl := "someUrl"
csr := "deadc0de"
certificateType := types.ChargingStationCert
status := types.GenericStatusAccepted
statusInfo := types.NewStatusInfo("200", "")
requestJson := fmt.Sprintf(`[2,"%v","%v",{"csr":"%v","certificateType":"%v"}]`,
messageId, security.SignCertificateFeatureName, csr, certificateType)
responseJson := fmt.Sprintf(`[3,"%v",{"status":"%v","statusInfo":{"reasonCode":"%v"}}]`,
messageId, status, statusInfo.ReasonCode)
signCertificateResponse := security.NewSignCertificateResponse(status)
signCertificateResponse.StatusInfo = statusInfo
channel := NewMockWebSocket(wsId)
handler := &MockCSMSSecurityHandler{}
handler.On("OnSignCertificate", mock.AnythingOfType("string"), mock.Anything).Return(signCertificateResponse, nil).Run(func(args mock.Arguments) {
request, ok := args.Get(1).(*security.SignCertificateRequest)
require.True(t, ok)
require.NotNil(t, request)
assert.Equal(t, csr, request.CSR)
assert.Equal(t, certificateType, request.CertificateType)
})
setupDefaultCSMSHandlers(suite, expectedCSMSOptions{clientId: wsId, rawWrittenMessage: []byte(responseJson), forwardWrittenMessage: true}, handler)
setupDefaultChargingStationHandlers(suite, expectedChargingStationOptions{serverUrl: wsUrl, clientId: wsId, createChannelOnStart: true, channel: channel, rawWrittenMessage: []byte(requestJson), forwardWrittenMessage: true})
// Run Test
suite.csms.Start(8887, "somePath")
err := suite.chargingStation.Start(wsUrl)
require.Nil(t, err)
response, err := suite.chargingStation.SignCertificate(csr, func(request *security.SignCertificateRequest) {
request.CertificateType = certificateType
})
require.Nil(t, err)
require.NotNil(t, response)
assert.Equal(t, status, response.Status)
assert.Equal(t, statusInfo.ReasonCode, response.StatusInfo.ReasonCode)
assert.Equal(t, statusInfo.AdditionalInfo, response.StatusInfo.AdditionalInfo)
}
func (suite *OcppV2TestSuite) TestSignCertificateInvalidEndpoint() {
messageId := defaultMessageId
csr := "deadc0de"
certificateType := types.ChargingStationCert
request := security.NewSignCertificateRequest(csr)
requestJson := fmt.Sprintf(`[2,"%v","%v",{"csr":"%v","certificateType":"%v"}]`,
messageId, security.SignCertificateFeatureName, csr, certificateType)
testUnsupportedRequestFromCentralSystem(suite, request, requestJson, messageId)
}