/**
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.hadoop.yarn.server.globalpolicygenerator.secure;

import org.apache.hadoop.yarn.server.globalpolicygenerator.GPGContext;
import org.junit.Assert;
import org.junit.Test;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

public class TestGpgSecureLogins extends AbstractGlobalPolicyGeneratorTest {
  private static final Logger LOG = LoggerFactory.getLogger(TestGpgSecureLogins.class);

  @Test
  public void testHasRealm() throws Throwable {
    Assert.assertNotNull(getRealm());
    LOG.info("Router principal = {}", getPrincipalAndRealm(GPG_LOCALHOST));
  }

  @Test
  public void testRouterSecureLogin() throws Exception {
    startSecureGPG();
    GPGContext gpgContext = this.getGpg().getGPGContext();
    Assert.assertNotNull(gpgContext);
    stopSecureRouter();
  }

  public static String getPrincipalAndRealm(String principal) {
    return principal + "@" + getRealm();
  }

  protected static String getRealm() {
    return getKdc().getRealm();
  }
}
