From 4f9efdda2eb43e2a51ee163cf21cb01c61a56055 Mon Sep 17 00:00:00 2001 From: Florian Friemel Date: Fri, 23 Nov 2018 14:16:29 +0000 Subject: [PATCH] Disable utimaco integration tests. (#1593) --- .../utimaco/UtimacoCryptoServiceIntegrationTest.kt | 14 ++++++++++++++ .../utimaco/UtimacoNodeRegistrationTest.kt | 2 ++ 2 files changed, 16 insertions(+) diff --git a/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoCryptoServiceIntegrationTest.kt b/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoCryptoServiceIntegrationTest.kt index 2126b142df..20b7b9564a 100644 --- a/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoCryptoServiceIntegrationTest.kt +++ b/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoCryptoServiceIntegrationTest.kt @@ -13,6 +13,7 @@ import org.junit.Test import net.corda.node.hsm.HsmSimulator import net.corda.nodeapi.internal.cryptoservice.CryptoServiceException import net.corda.testing.core.DUMMY_BANK_A_NAME +import org.junit.Ignore import java.io.IOException import java.time.Duration import java.util.* @@ -30,6 +31,7 @@ class UtimacoCryptoServiceIntegrationTest { val config = testConfig(hsmSimulator.port) val login = { UtimacoCryptoService.UtimacoCredentials("INTEGRATION_TEST", "INTEGRATION_TEST".toByteArray()) } + @Ignore @Test fun `When credentials are incorrect, should throw UtimacoHSMException`() { val config = testConfig(hsmSimulator.port) @@ -40,6 +42,7 @@ class UtimacoCryptoServiceIntegrationTest { } } + @Ignore @Test fun `When credentials become incorrect, should throw UtimacoHSMException`() { var pw = "INTEGRATION_TEST" @@ -49,6 +52,7 @@ class UtimacoCryptoServiceIntegrationTest { assertFailsWith { cryptoService.generateKeyPair("foo", Crypto.ECDSA_SECP256R1_SHA256.schemeNumberID) } } + @Ignore @Test fun `When connection cannot be established, should throw ConnectionException`() { val invalidConfig = testConfig(1) @@ -57,6 +61,7 @@ class UtimacoCryptoServiceIntegrationTest { } } + @Ignore @Test fun `When alias contains illegal characters, should throw `() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -64,6 +69,7 @@ class UtimacoCryptoServiceIntegrationTest { assertFailsWith { cryptoService.generateKeyPair(alias, Crypto.ECDSA_SECP256R1_SHA256.schemeNumberID) } } + @Ignore @Test fun `Handles re-authentication properly`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -77,6 +83,7 @@ class UtimacoCryptoServiceIntegrationTest { Crypto.doVerify(pubKey, signed, data) } + @Ignore @Test fun `Generate ECDSA key with r1 curve, then sign and verify data`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -88,6 +95,7 @@ class UtimacoCryptoServiceIntegrationTest { Crypto.doVerify(pubKey, signed, data) } + @Ignore @Test fun `Generate ECDSA key with k1 curve, then sign and verify data`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -99,6 +107,7 @@ class UtimacoCryptoServiceIntegrationTest { Crypto.doVerify(pubKey, signed, data) } + @Ignore @Test fun `Generate RSA key, then sign and verify data`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -110,6 +119,7 @@ class UtimacoCryptoServiceIntegrationTest { Crypto.doVerify(pubKey, signed, data) } + @Ignore @Test fun `When key does not exist, signing should throw`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -119,6 +129,7 @@ class UtimacoCryptoServiceIntegrationTest { assertFailsWith { cryptoService.sign(alias, data) } } + @Ignore @Test fun `When key does not exist, getPublicKey should return null`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -127,6 +138,7 @@ class UtimacoCryptoServiceIntegrationTest { assertNull(cryptoService.getPublicKey(alias)) } + @Ignore @Test fun `When key does not exist, getContentSigner should throw`() { val cryptoService = UtimacoCryptoService.fromConfig(config) @@ -136,6 +148,7 @@ class UtimacoCryptoServiceIntegrationTest { assertFailsWith { cryptoService.getSigner(alias) } } + @Ignore @Test fun `Content signer works with X509Utilities`() { val cryptoService = UtimacoCryptoService.fromConfig(config, login) @@ -159,6 +172,7 @@ class UtimacoCryptoServiceIntegrationTest { ourCertificate.checkValidity() } + @Ignore @Test fun `login with key file`() { // the admin user of the simulator is set up with key-file login diff --git a/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoNodeRegistrationTest.kt b/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoNodeRegistrationTest.kt index 7db1cc1e70..498548842d 100644 --- a/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoNodeRegistrationTest.kt +++ b/node/src/integration-test/kotlin/net/corda/node/services/keys/cryptoservice/utimaco/UtimacoNodeRegistrationTest.kt @@ -28,6 +28,7 @@ import org.junit.Test import org.junit.rules.TemporaryFolder import net.corda.node.hsm.HsmSimulator import org.assertj.core.api.Assertions.assertThat +import org.junit.Ignore import java.io.File import java.net.URL import java.nio.charset.Charset @@ -60,6 +61,7 @@ class UtimacoNodeRegistrationTest : IntegrationTest() { private val genevieveName = CordaX500Name("Genevieve", "London", "GB") } + @Ignore @Test fun `node registration with one node backed by Utimaco HSM`() {