Skip to content

Commit 76fae0d

Browse files
committed
Swap the assertEquals parameters so the expected value is first.
1 parent e1b3291 commit 76fae0d

File tree

1 file changed

+32
-44
lines changed

1 file changed

+32
-44
lines changed

cab-token-generator/javatests/com/google/auth/credentialaccessboundary/ClientSideCredentialAccessBoundaryFactoryTest.java

Lines changed: 32 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -491,13 +491,13 @@ public void builder_invalidRefreshMarginAndMinimumTokenLifetime_throws() throws
491491
IllegalArgumentException exception =
492492
assertThrows(
493493
IllegalArgumentException.class,
494-
() -> {
495-
ClientSideCredentialAccessBoundaryFactory.newBuilder()
496-
.setSourceCredential(sourceCredentials)
497-
.setRefreshMargin(Duration.ofMinutes(50))
498-
.setMinimumTokenLifetime(Duration.ofMinutes(50))
499-
.build();
500-
});
494+
() ->
495+
ClientSideCredentialAccessBoundaryFactory.newBuilder()
496+
.setSourceCredential(sourceCredentials)
497+
.setRefreshMargin(Duration.ofMinutes(50))
498+
.setMinimumTokenLifetime(Duration.ofMinutes(50))
499+
.build());
500+
501501
assertEquals(
502502
"Refresh margin must be at least one minute longer than the minimum token lifetime.",
503503
exception.getMessage());
@@ -649,9 +649,9 @@ private static class CabToken {
649649
}
650650
}
651651

652-
private static CabToken parseCabToken(AccessToken token) throws Exception {
652+
private static CabToken parseCabToken(AccessToken token) {
653653
String[] parts = token.getTokenValue().split("\\.");
654-
assertEquals(parts.length, 2);
654+
assertEquals(2, parts.length);
655655

656656
return new CabToken(parts[0], parts[1]);
657657
}
@@ -703,28 +703,28 @@ public void generateToken_withAvailablityCondition_success() throws Exception {
703703
AccessToken token = factory.generateToken(accessBoundary);
704704

705705
CabToken cabToken = parseCabToken(token);
706-
assertEquals(cabToken.intermediateToken, "accessToken");
706+
assertEquals("accessToken", cabToken.intermediateToken);
707707

708708
// Checks the encrypted restriction is the correct proto format of the
709709
// CredentialAccessBoundary
710710
ClientSideAccessBoundary clientSideAccessBoundary =
711711
decryptRestriction(
712712
cabToken.encryptedRestriction,
713713
transportFactory.transport.getAccessBoundarySessionKey());
714-
assertEquals(clientSideAccessBoundary.getAccessBoundaryRulesCount(), 1);
714+
assertEquals(1, clientSideAccessBoundary.getAccessBoundaryRulesCount());
715715

716716
ClientSideAccessBoundaryRule rule = clientSideAccessBoundary.getAccessBoundaryRules(0);
717717

718718
// Available resource and available permission should be the exact same as
719719
// in original format
720-
assertEquals(rule.getAvailableResource(), "resource");
721-
assertEquals(rule.getAvailablePermissionsList(), ImmutableList.of("role1", "role2"));
720+
assertEquals("resource", rule.getAvailableResource());
721+
assertEquals(ImmutableList.of("role1", "role2"), rule.getAvailablePermissionsList());
722722

723723
// Availablity condition should be in the correct compiled proto format
724724
Expr expr = rule.getCompiledAvailabilityCondition();
725-
assertEquals(expr.getCallExpr().getFunction(), "_==_");
726-
assertEquals(expr.getCallExpr().getArgs(0).getIdentExpr().getName(), "a");
727-
assertEquals(expr.getCallExpr().getArgs(1).getIdentExpr().getName(), "b");
725+
assertEquals("_==_", expr.getCallExpr().getFunction());
726+
assertEquals("a", expr.getCallExpr().getArgs(0).getIdentExpr().getName());
727+
assertEquals("b", expr.getCallExpr().getArgs(1).getIdentExpr().getName());
728728
}
729729

730730
@Test
@@ -755,22 +755,22 @@ public void generateToken_withoutAvailabilityCondition_success() throws Exceptio
755755
AccessToken token = factory.generateToken(accessBoundary);
756756

757757
CabToken cabToken = parseCabToken(token);
758-
assertEquals(cabToken.intermediateToken, "accessToken");
758+
assertEquals("accessToken", cabToken.intermediateToken);
759759

760760
// Checks the encrypted restriction is the correct proto format of the
761761
// CredentialAccessBoundary
762762
ClientSideAccessBoundary clientSideAccessBoundary =
763763
decryptRestriction(
764764
cabToken.encryptedRestriction,
765765
transportFactory.transport.getAccessBoundarySessionKey());
766-
assertEquals(clientSideAccessBoundary.getAccessBoundaryRulesCount(), 1);
766+
assertEquals(1, clientSideAccessBoundary.getAccessBoundaryRulesCount());
767767

768768
ClientSideAccessBoundaryRule rule = clientSideAccessBoundary.getAccessBoundaryRules(0);
769769

770770
// Available resource and available permission should be the exact same as
771771
// in original format
772-
assertEquals(rule.getAvailableResource(), "resource");
773-
assertEquals(rule.getAvailablePermissionsList(), ImmutableList.of("role"));
772+
assertEquals("resource", rule.getAvailableResource());
773+
assertEquals(ImmutableList.of("role"), rule.getAvailablePermissionsList());
774774

775775
// Availablity condition should be empty since it's not provided
776776
assertFalse(rule.hasCompiledAvailabilityCondition());
@@ -814,30 +814,30 @@ public void generateToken_withMultipleRules_success() throws Exception {
814814
AccessToken token = factory.generateToken(accessBoundary);
815815

816816
CabToken cabToken = parseCabToken(token);
817-
assertEquals(cabToken.intermediateToken, "accessToken");
817+
assertEquals("accessToken", cabToken.intermediateToken);
818818

819819
// Checks the encrypted restriction is the correct proto format of the
820820
// CredentialAccessBoundary
821821
ClientSideAccessBoundary clientSideAccessBoundary =
822822
decryptRestriction(
823823
cabToken.encryptedRestriction,
824824
transportFactory.transport.getAccessBoundarySessionKey());
825-
assertEquals(clientSideAccessBoundary.getAccessBoundaryRulesCount(), 2);
825+
assertEquals(2, clientSideAccessBoundary.getAccessBoundaryRulesCount());
826826

827827
// Checks the first rule
828828
ClientSideAccessBoundaryRule rule1 = clientSideAccessBoundary.getAccessBoundaryRules(0);
829-
assertEquals(rule1.getAvailableResource(), "resource1");
830-
assertEquals(rule1.getAvailablePermissionsList(), ImmutableList.of("role1-1", "role1-2"));
829+
assertEquals("resource1", rule1.getAvailableResource());
830+
assertEquals(ImmutableList.of("role1-1", "role1-2"), rule1.getAvailablePermissionsList());
831831

832832
Expr expr = rule1.getCompiledAvailabilityCondition();
833-
assertEquals(expr.getCallExpr().getFunction(), "_==_");
834-
assertEquals(expr.getCallExpr().getArgs(0).getIdentExpr().getName(), "a");
835-
assertEquals(expr.getCallExpr().getArgs(1).getIdentExpr().getName(), "b");
833+
assertEquals("_==_", expr.getCallExpr().getFunction());
834+
assertEquals("a", expr.getCallExpr().getArgs(0).getIdentExpr().getName());
835+
assertEquals("b", expr.getCallExpr().getArgs(1).getIdentExpr().getName());
836836

837837
// Checks the second rule
838838
ClientSideAccessBoundaryRule rule2 = clientSideAccessBoundary.getAccessBoundaryRules(1);
839-
assertEquals(rule2.getAvailableResource(), "resource");
840-
assertEquals(rule2.getAvailablePermissionsList(), ImmutableList.of("role2"));
839+
assertEquals("resource", rule2.getAvailableResource());
840+
assertEquals(ImmutableList.of("role2"), rule2.getAvailablePermissionsList());
841841
assertFalse(rule2.hasCompiledAvailabilityCondition());
842842
}
843843

@@ -875,11 +875,7 @@ public void generateToken_withInvalidAvailabilityCondition_failure() throws Exce
875875
.build())
876876
.build();
877877

878-
assertThrows(
879-
CelValidationException.class,
880-
() -> {
881-
factory.generateToken(accessBoundary);
882-
});
878+
assertThrows(CelValidationException.class, () -> factory.generateToken(accessBoundary));
883879
}
884880

885881
@Test
@@ -916,11 +912,7 @@ public void generateToken_withSessionKeyNotBase64Encoded_failure() throws Except
916912
.build())
917913
.build();
918914

919-
assertThrows(
920-
IllegalStateException.class,
921-
() -> {
922-
factory.generateToken(accessBoundary);
923-
});
915+
assertThrows(IllegalStateException.class, () -> factory.generateToken(accessBoundary));
924916
}
925917

926918
@Test
@@ -957,10 +949,6 @@ public void generateToken_withMalformSessionKey_failure() throws Exception {
957949
.build())
958950
.build();
959951

960-
assertThrows(
961-
GeneralSecurityException.class,
962-
() -> {
963-
factory.generateToken(accessBoundary);
964-
});
952+
assertThrows(GeneralSecurityException.class, () -> factory.generateToken(accessBoundary));
965953
}
966954
}

0 commit comments

Comments
 (0)