Skip to content

Commit ded873b

Browse files
committed
Make tests package private.
1 parent eb0c832 commit ded873b

17 files changed

+84
-93
lines changed

hub/src/test/java/cloud/katta/client/model/ObjectMapperTest.java

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@
1717
/**
1818
* Check the generated client code can deserialize `useOneOfDiscriminatorLookup` data.
1919
*/
20-
public class ObjectMapperTest {
20+
class ObjectMapperTest {
2121

2222
@Test
23-
public void testAWSStatic() throws IOException {
23+
void testAWSStatic() throws IOException {
2424
final ObjectMapper mapper = new ObjectMapper();
2525
mapper.registerModule(new JsonNullableModule());
2626

@@ -36,7 +36,7 @@ public void testAWSStatic() throws IOException {
3636
}
3737

3838
@Test
39-
public void testAWSSTS() throws IOException {
39+
void testAWSSTS() throws IOException {
4040
final ObjectMapper mapper = new ObjectMapper();
4141
mapper.registerModule(new JsonNullableModule());
4242

@@ -60,7 +60,7 @@ public void testAWSSTS() throws IOException {
6060
}
6161

6262
@Test
63-
public void testMinioStatic() throws IOException {
63+
void testMinioStatic() throws IOException {
6464
final ObjectMapper mapper = new ObjectMapper();
6565
mapper.registerModule(new JsonNullableModule());
6666

@@ -76,7 +76,7 @@ public void testMinioStatic() throws IOException {
7676
}
7777

7878
@Test
79-
public void testMinioSTS() throws IOException {
79+
void testMinioSTS() throws IOException {
8080
final ObjectMapper mapper = new ObjectMapper();
8181
mapper.registerModule(new JsonNullableModule());
8282
final StorageProfileS3STSDto minioSTSProfile = mapper.readValue(this.getClass().getResourceAsStream("/setup/local/minio_sts/minio_sts_profile.json"), StorageProfileS3STSDto.class);

hub/src/test/java/cloud/katta/core/KeyRotationTest.java

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@
44

55
package cloud.katta.core;
66

7-
import org.apache.logging.log4j.LogManager;
8-
import org.apache.logging.log4j.Logger;
97
import org.junit.jupiter.api.TestInstance;
108
import org.junit.jupiter.api.extension.ExtendWith;
119
import org.junit.jupiter.params.ParameterizedTest;
@@ -41,22 +39,20 @@
4139

4240
@TestInstance(TestInstance.Lifecycle.PER_CLASS)
4341
@ExtendWith({HubTestSetupDockerExtension.Local.class})
44-
public class KeyRotationTest extends AbstractHubTest {
45-
private static final Logger log = LogManager.getLogger(KeyRotationTest.class.getName());
42+
class KeyRotationTest extends AbstractHubTest {
4643

4744
private Stream<Arguments> arguments() {
4845
return Stream.of(LOCAL_MINIO_STS);
4946
}
5047

5148
@ParameterizedTest
5249
@MethodSource("arguments")
53-
public void keyrotationTest(final HubTestConfig hubTestConfig) throws Exception {
50+
void testKeyRotation(final HubTestConfig hubTestConfig) throws Exception {
5451
final HubSession hubSession = setupConnection(hubTestConfig.setup);
5552
try {
5653
final UsersResourceApi usersResourceApi = new UsersResourceApi(hubSession.getClient());
5754
final VaultResourceApi vaultResourceApi = new VaultResourceApi(hubSession.getClient());
5855
final UserDto me = usersResourceApi.apiUsersMeGet(false, false);
59-
log.info(me);
6056

6157
final List<VaultDto> vaults = vaultResourceApi.apiVaultsAccessibleGet(Role.OWNER);
6258

@@ -71,8 +67,8 @@ public void keyrotationTest(final HubTestConfig hubTestConfig) throws Exception
7167
final HashMap<String, String> tokens = new HashMap<>();
7268
final UserKeysService service = new UserKeysServiceImpl(hubSession);
7369
final UserKeys userKeys = service.getUserKeys(hubSession.getHost(), me, new DeviceKeysServiceImpl().getDeviceKeys(hubSession.getHost()));
74-
final VaultServiceImpl vaultService = new VaultServiceImpl(hubSession);
75-
final UvfMetadataPayload metadataJWE = vaultService.getVaultMetadataJWE(UUID.fromString(vaultDto.getId().toString()), userKeys);
70+
final VaultServiceImpl vaultService = new VaultServiceImpl(hubSession);
71+
final UvfMetadataPayload metadataJWE = vaultService.getVaultMetadataJWE(UUID.fromString(vaultDto.getId().toString()), userKeys);
7672
final UvfAccessTokenPayload masterkeyJWE = vaultService.getVaultAccessTokenJWE(UUID.fromString(vaultDto.getId().toString()), userKeys);
7773

7874
// TODO https://github.com/shift7-ch/cipherduck-hub/issues/37 change nickname for now - could be used to rotate of shared access key/secret key.

hub/src/test/java/cloud/katta/core/UserKeysRecoveryTest.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,15 @@
2828

2929
@TestInstance(TestInstance.Lifecycle.PER_CLASS)
3030
@ExtendWith({HubTestSetupDockerExtension.Local.class})
31-
public class UserKeysRecoveryTest extends AbstractHubTest {
31+
class UserKeysRecoveryTest extends AbstractHubTest {
3232

3333
private Stream<Arguments> arguments() {
3434
return Stream.of(LOCAL_MINIO_STS);
3535
}
3636

3737
@ParameterizedTest
3838
@MethodSource("arguments")
39-
public void firstLoginAndUserKeyRecovery(final HubTestConfig hubTestConfig) throws Exception {
39+
void testFirstLoginAndUserKeyRecovery(final HubTestConfig hubTestConfig) throws Exception {
4040
final HubSession hubSession = setupConnection(hubTestConfig.setup);
4141
final UsersResourceApi usersApi = new UsersResourceApi(hubSession.getClient());
4242
final UserDto me = usersApi.apiUsersMeGet(true, false);

hub/src/test/java/cloud/katta/crypto/JWETest.java

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,9 @@
2525
import static org.junit.jupiter.api.Assertions.assertEquals;
2626

2727
class JWETest {
28+
2829
@Test
29-
public void testEcdhEsEncryptDecrypt() throws ParseException, JOSEException, NoSuchAlgorithmException, InvalidKeySpecException, NotECKeyException, JsonProcessingException {
30+
void testEcdhEsEncryptDecrypt() throws ParseException, JOSEException, NoSuchAlgorithmException, InvalidKeySpecException, NotECKeyException, JsonProcessingException {
3031
final P384KeyPair keyPair = P384KeyPair.generate();
3132
final Map<String, Object> orig = Collections.singletonMap("hello", "world");
3233
final String jwe = JWE.ecdhEsEncrypt(new JWEPayload() {
@@ -40,7 +41,7 @@ public Map<String, Object> toJSONObject() {
4041
}
4142

4243
@Test
43-
public void testPbes2EncryptDecrypt() throws JOSEException, ParseException, JsonProcessingException {
44+
void testPbes2EncryptDecrypt() throws JOSEException, ParseException, JsonProcessingException {
4445
final String setupCode = "topsecret";
4546
final JWEPayload payload = new JWEPayload() {
4647
@Override
@@ -55,7 +56,7 @@ public Map<String, Object> toJSONObject() {
5556
}
5657

5758
@Test
58-
public void testA256EncryptDecrypt() throws JOSEException, JsonProcessingException, ParseException {
59+
void testA256EncryptDecrypt() throws JOSEException, JsonProcessingException, ParseException {
5960
final byte[] kek = new byte[32];
6061
FastSecureRandomProvider.get().provide().nextBytes(kek);
6162
final String jwe = JWE.a256kwEncrypt(new JWEPayload() {
@@ -68,13 +69,13 @@ public Map<String, Object> toJSONObject() {
6869
}
6970

7071
@Test
71-
public void testDecryptPbes2() throws ParseException, JOSEException {
72+
void testDecryptPbes2() throws ParseException, JOSEException {
7273
final Payload payload = JWE.decryptPbes2("eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIiwicDJzIjoiQmp4NXBKU0lrSU5EZHJOS0pjTmdiUSIsInAyYyI6MTAwMDAwMCwiYXB1IjoiIiwiYXB2IjoiIn0.-sXeL9JD6MMhGEkdtP9LmIXGCHnVI5d7ifjO5WnWoz7d8Qsl7RmiQA.lmo9F4fSsukqfvuc.3o1l8RVc62czjv-fdi-jQJnijapO.n2ou6Oi04QOeGtiqrQhFRw", "topsecret");
7374
assertEquals(payload.toJSONObject().get("key"), "hello world");
7475
}
7576

7677
@Test
77-
public void testDecryptA256kw() throws ParseException, JOSEException {
78+
void testDecryptA256kw() throws ParseException, JOSEException {
7879
// JWE generated by https://dinochiesa.github.io/jwt/
7980
final String jwe = "eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JTSrGbw4XEKXYFTC7siTT7DIZUX2SogThcLKXgxe0FPK3Fi8ckjr9A.zQx0t4qoTVIc-h5f.cmqzZ-md3cvdTNH9FWbKOsw.DCdGhmdwjoYKIuNC5zgQJQ";
8081
final byte[] rawKek = Base64.getUrlDecoder().decode("y_uxz8iAtcOXlqMYpm2jASvDWokpCYMtwkthFSK6IF0");

hub/src/test/java/cloud/katta/crypto/JWTTest.java

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -45,37 +45,35 @@ class JWTTest {
4545
)
4646
.build();
4747

48-
final ECKeyPair signerKey = decodeKeyPair(Base64.getEncoder().encodeToString(signerPublicJwk.toECPublicKey().getEncoded()), (Base64.getEncoder().encodeToString(signerPublicJwk.toECPrivateKey().getEncoded())));
48+
final ECKeyPair signerKey = decodeKeyPair(Base64.getEncoder().encodeToString(signerPublicJwk.toECPublicKey().getEncoded()),
49+
Base64.getEncoder().encodeToString(signerPublicJwk.toECPrivateKey().getEncoded()));
4950

5051
JWTTest() throws InvalidKeySpecException, JOSEException {
5152
}
5253

5354
@Test
54-
public void es384signVerify() throws JOSEException, ParseException {
55+
void es384signVerify() throws JOSEException, ParseException {
5556
final String encodedHeader = "eyJhbGciOiJFUzM4NCIsInR5cCI6IkpXVCIsImI2NCI6dHJ1ZX0";
5657
final String encodedPayload = "eyJmb28iOjQyLCJiYXIiOiJsb2wiLCJvYmoiOnsibmVzdGVkIjp0cnVlfX0";
57-
5858
final String jwt = JWT.es384sign(JWSHeader.parse(Base64URL.from(encodedHeader)), Base64URL.from(encodedPayload), signerKey.getPrivate());
5959
assertNotNull(jwt);
6060
assertTrue(JWT.es384verify(jwt, signerKey.getPublic()));
6161
}
6262

6363
@Test
64-
public void es384verifyValidSignature() throws ParseException, JOSEException {
64+
void es384verifyValidSignature() throws ParseException, JOSEException {
6565
final String jwt = "eyJhbGciOiJFUzM4NCIsInR5cCI6IkpXVCIsImI2NCI6dHJ1ZX0.eyJmb28iOjQyLCJiYXIiOiJsb2wiLCJvYmoiOnsibmVzdGVkIjp0cnVlfX0.9jS7HDRkbwEbmJ_cpkFHcQuNHSsOzSO3ObkT_FBQIIJehYYk-1aAK0KVnOgeDg6hVELy5-XcRHOCETwuTuYG5eQ3jIbxpTviHttJ-r26BYynw6dlmJTuLSvsTjtpoTa_";
66-
6766
assertTrue(JWT.es384verify(jwt, signerKey.getPublic()));
6867
}
6968

7069
@Test
71-
public void es384verifyInvalidSignature() throws ParseException, JOSEException {
70+
void es384verifyInvalidSignature() throws ParseException, JOSEException {
7271
final String jwt = "eyJhbGciOiJFUzM4NCIsInR5cCI6IkpXVCIsImI2NCI6dHJ1ZX0.eyJmb28iOjQyLCJiYXIiOiJsb2wiLCJvYmoiOnsibmVzdGVkIjp0cnVlfX0.9jS7HDRkbwEbmJ_cpkFHcQuNHSsOzSO3ObkT_FBQIIJehYYk-1aAK0KVnOgeDg6hVELy5-XcRHOCETwuTuYG5eQ3jIbxpTviHttJ-r26BYynw6dlmJTuLSvsTjtpoTaX";
73-
7472
assertFalse(JWT.es384verify(jwt, signerKey.getPublic()));
7573
}
7674

7775
@Test
78-
public void buildES384SignedJWTAndParse() throws ParseException, JOSEException, JWTParseException, InvalidSignatureException {
76+
void buildES384SignedJWTAndParse() throws ParseException, JOSEException, JWTParseException, InvalidSignatureException {
7977
final Map<String, Object> payloadExpected = ImmutableMap.<String, Object>builder()
8078
.put("foo", 42L)
8179
.put("bar", "lol")
@@ -93,9 +91,8 @@ public void buildES384SignedJWTAndParse() throws ParseException, JOSEException,
9391
}
9492

9593
@Test
96-
public void parseES384SignedJWT() throws ParseException, JOSEException, JWTParseException, InvalidSignatureException {
94+
void parseES384SignedJWT() throws ParseException, JOSEException, JWTParseException, InvalidSignatureException {
9795
final String jwt = "eyJhbGciOiJFUzM4NCIsInR5cCI6IkpXVCIsImI2NCI6dHJ1ZX0.eyJmb28iOjQyLCJiYXIiOiJsb2wiLCJvYmoiOnsibmVzdGVkIjp0cnVlfX0.9jS7HDRkbwEbmJ_cpkFHcQuNHSsOzSO3ObkT_FBQIIJehYYk-1aAK0KVnOgeDg6hVELy5-XcRHOCETwuTuYG5eQ3jIbxpTviHttJ-r26BYynw6dlmJTuLSvsTjtpoTa_";
98-
9996
final Map<String, Object> payload = JWT.parse(jwt, signerKey.getPublic()).toJSONObject();
10097
assertEquals(42L, payload.get("foo"));
10198
assertEquals("lol", payload.get("bar"));

hub/src/test/java/cloud/katta/crypto/KeyHelperTest.java

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,24 +22,23 @@
2222

2323
class KeyHelperTest {
2424

25-
2625
@Test
27-
public void decodePrivateEncodePrivate() throws NoSuchAlgorithmException, InvalidKeySpecException, NotECKeyException {
26+
void decodePrivateEncodePrivate() throws NoSuchAlgorithmException, InvalidKeySpecException, NotECKeyException {
2827
// N.B. BC returns encoding with additional information, SunEC returns same encoding, see KeyHelperTest#testElliptic
2928
// final String PRIV_KEY = "ME8CAQAwEAYHKoZIzj0CAQYFK4EEACIEODA2AgEBBDEA6QybmBitf94veD5aCLr7nlkF5EZpaXHCfq1AXm57AKQyGOjTDAF9EQB28fMywTDQ";
3029
final String PRIV_KEY = "MFcCAQAwEAYHKoZIzj0CAQYFK4EEACIEQDA+AgEBBDDpDJuYGK1/3i94PloIuvueWQXkRmlpccJ+rUBebnsApDIY6NMMAX0RAHbx8zLBMNCgBwYFK4EEACI=";
3130
assertEquals(PRIV_KEY, encodePrivateKey(decodePrivateKey(PRIV_KEY)));
3231
}
3332

3433
@Test
35-
public void decodePublicEncodePublic() throws NoSuchAlgorithmException, InvalidKeySpecException, NotECKeyException {
34+
void decodePublicEncodePublic() throws NoSuchAlgorithmException, InvalidKeySpecException, NotECKeyException {
3635
final String PUB_KEY = "MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAERxQR+NRN6Wga01370uBBzr2NHDbKIC56tPUEq2HX64RhITGhii8Zzbkb1HnRmdF0aq6uqmUy4jUhuxnKxsv59A6JeK7Unn+mpmm3pQAygjoGc9wrvoH4HWJSQYUlsXDu";
3736
assertEquals(PUB_KEY, encodePublicKey(decodePublicKey(PUB_KEY)));
3837
}
3938

4039
@Test
4140
@Disabled("for documentation, run isolated only")
42-
public void testElliptic() throws InvalidKeySpecException, NoSuchAlgorithmException, NotECKeyException {
41+
void testElliptic() throws InvalidKeySpecException, NoSuchAlgorithmException, NotECKeyException {
4342
final String encodedPublicKey = "MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAESA0oPUI0DrULBpIjTRckRduqaPqKz2f4zF6UvB+WHyOVZNsWZHHWIdjZ4LkoOygNenLgllv/iyzzVrH2ILR3Si6s03UOnicBbLy8jPY3MRvdgJPNz4C0kFa7HNXtQNKE";
4443
final String encodedPrivateKey = "MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDCwqDLejJNvg83KP+zeNuLcrHnGjABYZXDq4NNxwHPtwv12vHDghCng4vM+qmN+EzWhZANiAARIDSg9QjQOtQsGkiNNFyRF26po+orPZ/jMXpS8H5YfI5Vk2xZkcdYh2NnguSg7KA16cuCWW/+LLPNWsfYgtHdKLqzTdQ6eJwFsvLyM9jcxG92Ak83PgLSQVrsc1e1A0oQ=";
4544
final String encodedPrivateKeyBC = "MIG/AgEAMBAGByqGSM49AgEGBSuBBAAiBIGnMIGkAgEBBDCwqDLejJNvg83KP+zeNuLcrHnGjABYZXDq4NNxwHPtwv12vHDghCng4vM+qmN+EzWgBwYFK4EEACKhZANiAARIDSg9QjQOtQsGkiNNFyRF26po+orPZ/jMXpS8H5YfI5Vk2xZkcdYh2NnguSg7KA16cuCWW/+LLPNWsfYgtHdKLqzTdQ6eJwFsvLyM9jcxG92Ak83PgLSQVrsc1e1A0oQ=";

hub/src/test/java/cloud/katta/crypto/UserKeysTest.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
class UserKeysTest {
2121

2222
@Test
23-
public void testEncryptWithSetupCodeAndRecover() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
23+
void testEncryptWithSetupCodeAndRecover() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
2424
// PEM-encoded
2525
final String encodedPublicKey = "MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAESA0oPUI0DrULBpIjTRckRduqaPqKz2f4zF6UvB+WHyOVZNsWZHHWIdjZ4LkoOygNenLgllv/iyzzVrH2ILR3Si6s03UOnicBbLy8jPY3MRvdgJPNz4C0kFa7HNXtQNKE";
2626
// pkcs8-encoded
@@ -36,7 +36,7 @@ public void testEncryptWithSetupCodeAndRecover() throws ParseException, JOSEExce
3636
}
3737

3838
@Test
39-
public void testEncryptWithSetupCodeAndRecoverNew() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
39+
void testEncryptWithSetupCodeAndRecoverNew() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
4040
final UserKeys userKeys = UserKeys.create();
4141

4242
final String encryptedPrivateKey = userKeys.encryptWithSetupCode("top secret");
@@ -48,7 +48,7 @@ public void testEncryptWithSetupCodeAndRecoverNew() throws ParseException, JOSEE
4848
}
4949

5050
@Test
51-
public void testEncrypForDeviceAndDecryptOnDevice() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
51+
void testEncrypForDeviceAndDecryptOnDevice() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
5252
// PEM-encoded
5353
final String encodedPublicKey = "MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAESA0oPUI0DrULBpIjTRckRduqaPqKz2f4zF6UvB+WHyOVZNsWZHHWIdjZ4LkoOygNenLgllv/iyzzVrH2ILR3Si6s03UOnicBbLy8jPY3MRvdgJPNz4C0kFa7HNXtQNKE";
5454
// pkcs8-encoded
@@ -68,7 +68,7 @@ public void testEncrypForDeviceAndDecryptOnDevice() throws ParseException, JOSEE
6868
}
6969

7070
@Test
71-
public void testEncrypForDeviceAndDecryptOnDeviceNew() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
71+
void testEncrypForDeviceAndDecryptOnDeviceNew() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
7272
final P384KeyPair deviceKeys = P384KeyPair.generate();
7373
final UserKeys userKeys = UserKeys.create();
7474

hub/src/test/java/cloud/katta/crypto/uvf/UvfAccessTokenPayloadTest.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,14 @@ class UvfAccessTokenPayloadTest {
4141

4242

4343
@Test
44-
public void testDecryptAccessToken() throws InvalidKeySpecException, ParseException, JOSEException, JsonProcessingException {
44+
void testDecryptAccessToken() throws InvalidKeySpecException, ParseException, JOSEException, JsonProcessingException {
4545
final UserKeys userKeys = new UserKeys(decodeKeyPair(DEVICE_PUB_KEY, DEVICE_PRIV_KEY), decodeKeyPair(DEVICE_PUB_KEY, DEVICE_PRIV_KEY));
4646
final UvfAccessTokenPayload accessToken = userKeys.decryptAccessToken("eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTI1NkdDTSIsImVwayI6eyJrZXlfb3BzIjpbXSwiZXh0Ijp0cnVlLCJrdHkiOiJFQyIsIngiOiJoeHpiSWh6SUJza3A5ZkZFUmJSQ2RfOU1fbWYxNElqaDZhcnNoVXNkcEEyWno5ejZZNUs4NHpZR2I4b2FHemNUIiwieSI6ImJrMGRaNWhpelZ0TF9hN2hNejBjTUduNjhIRjZFdWlyNHdlclNkTFV5QWd2NWUzVzNYSG5sdHJ2VlRyU3pzUWYiLCJjcnYiOiJQLTM4NCJ9LCJhcHUiOiIiLCJhcHYiOiIifQ..pu3Q1nR_yvgRAapG.4zW0xm0JPxbcvZ66R-Mn3k841lHelDQfaUvsZZAtWsL2w4FMi6H_uu6ArAWYLtNREa_zfcPuyuJsFferYPSNRUWt4OW6aWs-l_wfo7G1ceEVxztQXzQiwD30UTA8OOdPcUuFfEq2-d9217jezrcyO6m6FjyssEZIrnRArUPWKzGdghXccGkkf0LTZcGJoHeKal-RtyP8PfvEAWTjSOCpBlSdUJ-1JL3tyd97uVFNaVuH3i7vvcMoUP_bdr0XW3rvRgaeC6X4daPLUvR1hK5MsutQMtM2vpFghS_zZxIQRqz3B2ECxa9Bjxhmn8kLX5heZ8fq3lH-bmJp1DxzZ4V1RkWk.yVwXG9yARa5Ihq2koh2NbQ");
4747
assertEquals(USER_PRIV_KEY, accessToken.key());
4848
}
4949

5050
@Test
51-
public void decryptAccessToken() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
51+
void decryptAccessToken() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
5252
final ECKeyPair ecKeyPair = decodeKeyPair(Base64.encodeAsString(alice.toECPublicKey().getEncoded()), Base64.encodeAsString(alice.toECPrivateKey().getEncoded()));
5353
final UserKeys userKeys = new UserKeys(ecKeyPair, P384KeyPair.generate());
5454
final String accessToken = "eyJlbmMiOiJBMjU2R0NNIiwia2lkIjoib3JnLmNyeXB0b21hdG9yLmh1Yi51c2Vya2V5IiwiYWxnIjoiRUNESC1FUytBMjU2S1ciLCJlcGsiOnsia2V5X29wcyI6W10sImV4dCI6dHJ1ZSwia3R5IjoiRUMiLCJ4IjoicFotVXExTjNOVElRcHNpZC11UGZMaW95bVVGVFJLM1dkTXVkLWxDcGh5MjQ4bUlJelpDc3RPRzZLTGloZnBkZyIsInkiOiJzMnl6eF9Ca2QweFhIcENnTlJFOWJiQUIyQkNNTF80cWZwcFEza1N2LXhqcEROVWZZdmlxQS1xRERCYnZkNDdYIiwiY3J2IjoiUC0zODQifSwiYXB1IjoiIiwiYXB2IjoiIn0.I_rXJagNrrCa9zISf0DZJLQbIZDxEpGxCyjFbNE0iZs6yFeVayNOGQ.7rASe4SqyKJJLHZ4.l6T2N_ATytZUyh1IZTIJJDY4dXCyQVsRB19QIIPrAi0QQiS4gl4.fnOtAJhdvPFFHVi6L5Ma_R8iL3IXq1_xAq2PvdEfx0A";
@@ -58,7 +58,7 @@ public void decryptAccessToken() throws ParseException, JOSEException, JsonProce
5858
}
5959

6060
@Test
61-
public void encryptDecryptAccessToken() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
61+
void encryptDecryptAccessToken() throws ParseException, JOSEException, JsonProcessingException, InvalidKeySpecException {
6262
final ECKeyPair ecKeyPair = decodeKeyPair(USER_PUB_KEY, USER_PRIV_KEY);
6363
final UserKeys userKeys = new UserKeys(ecKeyPair, P384KeyPair.generate());
6464
final String accessToken = new UvfAccessTokenPayload().withKey("very secret").encryptForUser(userKeys.ecdhKeyPair().getPublic());

0 commit comments

Comments
 (0)