@@ -9,9 +9,11 @@ package credentialmgr
99import (
1010 "testing"
1111
12+ "github.com/hyperledger/fabric-sdk-go/api/apifabclient"
1213 "github.com/hyperledger/fabric-sdk-go/pkg/config"
1314 "github.com/hyperledger/fabric-sdk-go/pkg/cryptosuite"
1415 fcmocks "github.com/hyperledger/fabric-sdk-go/pkg/fabric-client/mocks"
16+ "github.com/pkg/errors"
1517)
1618
1719func TestCredentialManager (t * testing.T ) {
@@ -36,11 +38,29 @@ func TestCredentialManager(t *testing.T) {
3638 t .Fatalf ("Should have failed to retrieve signing identity for non-existent user" )
3739 }
3840
39- _ , err = credentialMgr .GetSigningIdentity ("User1" )
41+ id , err : = credentialMgr .GetSigningIdentity ("User1" )
4042 if err != nil {
4143 t .Fatalf ("Failed to retrieve signing identity: %s" , err )
4244 }
45+ if err := checkSigningIdentity (id ); err != nil {
46+ t .Fatalf ("checkSigningIdentity failes: %s" , err )
47+ }
48+ }
4349
50+ func checkSigningIdentity (id * apifabclient.SigningIdentity ) error {
51+ if id == nil {
52+ return errors .New ("SigningIdentity is nil" )
53+ }
54+ if id .EnrollmentCert == nil {
55+ return errors .New ("Enrollment cert is missing" )
56+ }
57+ if id .MspID == "" {
58+ return errors .New ("MspID is missing" )
59+ }
60+ if id .PrivateKey == nil {
61+ return errors .New ("private key is missing" )
62+ }
63+ return nil
4464}
4565
4666func TestInvalidOrgCredentialManager (t * testing.T ) {
@@ -80,23 +100,35 @@ func TestCredentialManagerFromEmbeddedCryptoConfig(t *testing.T) {
80100 t .Fatalf ("Should have failed to retrieve signing identity for non-existent user" )
81101 }
82102
83- _ , err = credentialMgr .GetSigningIdentity ("EmbeddedUser" )
103+ id , err : = credentialMgr .GetSigningIdentity ("EmbeddedUser" )
84104 if err != nil {
85105 t .Fatalf ("Failed to retrieve signing identity: %+v" , err )
86106 }
107+ if err := checkSigningIdentity (id ); err != nil {
108+ t .Fatalf ("checkSigningIdentity failes: %s" , err )
109+ }
87110
88- _ , err = credentialMgr .GetSigningIdentity ("EmbeddedUserWithPaths" )
111+ id , err = credentialMgr .GetSigningIdentity ("EmbeddedUserWithPaths" )
89112 if err != nil {
90113 t .Fatalf ("Failed to retrieve signing identity: %+v" , err )
91114 }
115+ if err := checkSigningIdentity (id ); err != nil {
116+ t .Fatalf ("checkSigningIdentity failes: %s" , err )
117+ }
92118
93- _ , err = credentialMgr .GetSigningIdentity ("EmbeddedUserMixed" )
119+ id , err = credentialMgr .GetSigningIdentity ("EmbeddedUserMixed" )
94120 if err != nil {
95121 t .Fatalf ("Failed to retrieve signing identity: %+v" , err )
96122 }
123+ if err := checkSigningIdentity (id ); err != nil {
124+ t .Fatalf ("checkSigningIdentity failes: %s" , err )
125+ }
97126
98- _ , err = credentialMgr .GetSigningIdentity ("EmbeddedUserMixed2" )
127+ id , err = credentialMgr .GetSigningIdentity ("EmbeddedUserMixed2" )
99128 if err != nil {
100129 t .Fatalf ("Failed to retrieve signing identity: %+v" , err )
101130 }
131+ if err := checkSigningIdentity (id ); err != nil {
132+ t .Fatalf ("checkSigningIdentity failes: %s" , err )
133+ }
102134}
0 commit comments