{"repo": "corona-warn-app/cwa-server", "pull_number": 45, "instance_id": "corona-warn-app__cwa-server-45", "issue_numbers": ["34"], "base_commit": "e8ca246da1ab3620b6340383d4a59fe2041af562", "patch": "diff --git a/common/persistence/src/main/java/app/coronawarn/server/services/common/persistence/service/DiagnosisKeyService.java b/common/persistence/src/main/java/app/coronawarn/server/services/common/persistence/service/DiagnosisKeyService.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/services/common/persistence/service/DiagnosisKeyService.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/services/common/persistence/service/DiagnosisKeyService.java\n@@ -13,16 +13,12 @@ public class DiagnosisKeyService {\n private DiagnosisKeyRepository keyRepository;\n \n /**\n- * Persists the specified collection of {@link DiagnosisKey} instances. Use the returned\n- * collection for further operations as the saveDiagnosisKeys operation might have changed the\n- * {@link DiagnosisKey} instances completely.\n+ * Persists the specified collection of {@link DiagnosisKey} instances.\n *\n * @param diagnosisKeys must not contain {@literal null}.\n- * @return a collection of the saved keys; will never contain {@literal null}.\n * @throws IllegalArgumentException in case the given collection contains {@literal null}.\n */\n- public Collection saveDiagnosisKeys(\n- Collection diagnosisKeys) {\n- return keyRepository.saveAll(diagnosisKeys);\n+ public void saveDiagnosisKeys(Collection diagnosisKeys) {\n+ keyRepository.saveAll(diagnosisKeys);\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n@@ -1,23 +1,22 @@\n package app.coronawarn.server.services.submission.controller;\n \n-import java.util.Collection;\n-import java.util.Collections;\n-import java.util.stream.Collectors;\n import app.coronawarn.server.common.protocols.generated.ExposureKeys.TemporaryExposureKey;\n import app.coronawarn.server.services.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.common.persistence.service.DiagnosisKeyService;\n import app.coronawarn.server.services.submission.verification.TanVerifier;\n+import java.util.Collection;\n+import java.util.Collections;\n+import java.util.stream.Collectors;\n import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.http.HttpStatus;\n import org.springframework.http.ResponseEntity;\n import org.springframework.web.bind.annotation.GetMapping;\n-import org.springframework.web.bind.annotation.PathVariable;\n import org.springframework.web.bind.annotation.PostMapping;\n import org.springframework.web.bind.annotation.RequestBody;\n import org.springframework.web.bind.annotation.RequestHeader;\n import org.springframework.web.bind.annotation.RequestMapping;\n import org.springframework.web.bind.annotation.RestController;\n \n-// TODO Implement Unit Tests\n @RestController\n @RequestMapping(\"/version/v1\")\n public class SubmissionController {\n@@ -34,9 +33,8 @@ public ResponseEntity hello() {\n }\n \n // TODO update protoSpec and endpoint to Collection\n- @PostMapping(value = \"/diagnosis-keys/country/{country}\")\n- public ResponseEntity submitDiagnosisKey(\n- @PathVariable String country,\n+ @PostMapping(value = \"/diagnosis-keys\")\n+ public ResponseEntity submitDiagnosisKey(\n @RequestBody TemporaryExposureKey exposureKeys,\n @RequestHeader(value = \"cwa-fake\") Integer fake,\n @RequestHeader(value = \"cwa-authorization\") String tan) {\n@@ -56,15 +54,14 @@ public ResponseEntity submitDiagnosisKey(\n /**\n * @return A response that indicates that an invalid TAN was specified in the request.\n */\n- private ResponseEntity buildTanInvalidResponseEntity() {\n- // TODO implement\n- return null;\n+ private ResponseEntity buildTanInvalidResponseEntity() {\n+ return ResponseEntity.status(HttpStatus.FORBIDDEN).build();\n }\n \n /**\n * @return A response that indicates successful request processing.\n */\n- private ResponseEntity buildSuccessResponseEntity() {\n+ private ResponseEntity buildSuccessResponseEntity() {\n return ResponseEntity.ok().build();\n }\n \ndiff --git a/services/submission/src/main/resources/application.properties b/services/submission/src/main/resources/application.properties\n--- a/services/submission/src/main/resources/application.properties\n+++ b/services/submission/src/main/resources/application.properties\n@@ -1,3 +1,3 @@\n logging.level.org.springframework.web=DEBUG\n-spring.jpa.hibernate.ddl-auto = create\n+spring.jpa.hibernate.ddl-auto=create\n spring.flyway.enabled=false\n", "test_patch": "diff --git a/services/distribution/src/test/resources/application.properties b/services/distribution/src/test/resources/application.properties\n--- a/services/distribution/src/test/resources/application.properties\n+++ b/services/distribution/src/test/resources/application.properties\n@@ -1,5 +1,4 @@\n-spring.datasource.driver-class-name=org.hsqldb.jdbc.JDBCDriver\n-spring.datasource.url=jdbc:hsqldb:mem:testdb;DB_CLOSE_DELAY=-1\n-spring.datasource.username=cwa\n-spring.datasource.password=cwa\n-spring.jpa.hibernate.ddl-auto=create\n\\ No newline at end of file\n+spring.jpa.hibernate.ddl-auto=create\n+logging.level.org.springframework=off\n+logging.level.root=warn\n+spring.main.banner-mode=off\ndiff --git a/services/distribution/src/test/resources/logback-test.xml b/services/distribution/src/test/resources/logback-test.xml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/logback-test.xml\n@@ -0,0 +1,5 @@\n+\n+\n+ \n+ \n+\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n@@ -1,13 +1,20 @@\n package app.coronawarn.server.services.submission;\n \n+import static org.junit.jupiter.api.Assertions.assertNotNull;\n+\n+import app.coronawarn.server.services.submission.controller.SubmissionController;\n import org.junit.jupiter.api.Test;\n+import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.test.context.SpringBootTest;\n \n @SpringBootTest\n class ServerApplicationTests {\n \n-\t@Test\n-\tvoid contextLoads() {\n-\t}\n+ @Autowired\n+ private SubmissionController controller;\n \n+ @Test\n+ public void contextLoads() {\n+ assertNotNull(this.controller);\n+ }\n }\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n@@ -0,0 +1,159 @@\n+package app.coronawarn.server.services.submission.controller;\n+\n+\n+import static app.coronawarn.server.common.protocols.generated.ExposureKeys.TemporaryExposureKey;\n+import static org.junit.jupiter.api.Assertions.assertEquals;\n+import static org.mockito.Mockito.any;\n+import static org.mockito.Mockito.anyCollection;\n+import static org.mockito.Mockito.anyString;\n+import static org.mockito.Mockito.atLeastOnce;\n+import static org.mockito.Mockito.never;\n+import static org.mockito.Mockito.verify;\n+import static org.mockito.Mockito.when;\n+\n+import app.coronawarn.server.services.common.persistence.service.DiagnosisKeyService;\n+import app.coronawarn.server.services.submission.verification.TanVerifier;\n+import com.google.protobuf.ByteString;\n+import java.net.URI;\n+import java.util.HashSet;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.Stream;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.Arguments;\n+import org.junit.jupiter.params.provider.MethodSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.boot.test.web.client.TestRestTemplate;\n+import org.springframework.http.HttpHeaders;\n+import org.springframework.http.HttpMethod;\n+import org.springframework.http.HttpStatus;\n+import org.springframework.http.MediaType;\n+import org.springframework.http.RequestEntity;\n+import org.springframework.http.ResponseEntity;\n+\n+@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n+public class SubmissionControllerTest {\n+\n+ private static final URI SUBMISSION_URL = URI.create(\"/version/v1/diagnosis-keys\");\n+\n+ @MockBean\n+ private DiagnosisKeyService diagnosisKeyService;\n+\n+ @MockBean\n+ private TanVerifier tanVerifier;\n+\n+ @Autowired\n+ private TestRestTemplate testRestTemplate;\n+\n+ @BeforeEach\n+ public void setUpMocks() {\n+ when(tanVerifier.verifyTan(anyString())).thenReturn(true);\n+ }\n+\n+ @Test\n+ public void checkResponseStatusForValidParameters() {\n+ ResponseEntity actResponse =\n+ executeRequest(buildTemporaryExposureKey(), buildOkHeaders());\n+\n+ assertEquals(HttpStatus.OK, actResponse.getStatusCode());\n+ }\n+\n+ @Test\n+ public void checkSaveOperationCallForValidParameters() {\n+ executeRequest(buildTemporaryExposureKey(), buildOkHeaders());\n+\n+ verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(anyCollection());\n+ }\n+\n+ @ParameterizedTest\n+ @MethodSource(\"createIncompleteHeaders\")\n+ public void badRequestIfCwaHeadersMissing(HttpHeaders headers) {\n+ ResponseEntity actResponse = executeRequest(buildTemporaryExposureKey(), headers);\n+\n+ verify(diagnosisKeyService, never()).saveDiagnosisKeys(any());\n+ assertEquals(HttpStatus.BAD_REQUEST, actResponse.getStatusCode());\n+ }\n+\n+ private static Stream createIncompleteHeaders() {\n+ return Stream.of(\n+ Arguments.of(setContentTypeProtoBufHeader(new HttpHeaders())),\n+ Arguments.of(setContentTypeProtoBufHeader(setCwaFakeHeader(new HttpHeaders(), \"0\"))),\n+ Arguments.of(setContentTypeProtoBufHeader(setCwaAuthHeader(new HttpHeaders()))));\n+ }\n+\n+ @Test\n+ public void checkAcceptedHttpMethods() {\n+ Set expAllowedMethods =\n+ Stream.of(HttpMethod.POST, HttpMethod.OPTIONS)\n+ .collect(Collectors.toCollection(HashSet::new));\n+\n+ Set actAllowedMethods = testRestTemplate.optionsForAllow(SUBMISSION_URL.toString());\n+\n+ assertEquals(expAllowedMethods, actAllowedMethods);\n+ }\n+\n+ @Test\n+ public void invalidTanHandling() {\n+ when(tanVerifier.verifyTan(anyString())).thenReturn(false);\n+\n+ ResponseEntity actResponse =\n+ executeRequest(buildTemporaryExposureKey(), buildOkHeaders());\n+\n+ verify(diagnosisKeyService, never()).saveDiagnosisKeys(any());\n+ assertEquals(HttpStatus.FORBIDDEN, actResponse.getStatusCode());\n+ }\n+\n+ @Test\n+ public void fakeRequestHandling() {\n+ HttpHeaders headers = buildOkHeaders();\n+ setCwaFakeHeader(headers, \"1\");\n+\n+ ResponseEntity actResponse = executeRequest(buildTemporaryExposureKey(), headers);\n+\n+ verify(diagnosisKeyService, never()).saveDiagnosisKeys(any());\n+ assertEquals(HttpStatus.OK, actResponse.getStatusCode());\n+ }\n+\n+ private static HttpHeaders buildOkHeaders() {\n+ HttpHeaders headers = setCwaAuthHeader(setContentTypeProtoBufHeader(new HttpHeaders()));\n+\n+ return setCwaFakeHeader(headers, \"0\");\n+ }\n+\n+ private static HttpHeaders setContentTypeProtoBufHeader(HttpHeaders headers) {\n+ headers.setContentType(MediaType.valueOf(\"application/x-protobuf\"));\n+ return headers;\n+ }\n+\n+ private static HttpHeaders setCwaAuthHeader(HttpHeaders headers) {\n+ headers.set(\"cwa-authorization\", \"okTan\");\n+ return headers;\n+ }\n+\n+ private static HttpHeaders setCwaFakeHeader(HttpHeaders headers, String value) {\n+ headers.set(\"cwa-fake\", value);\n+ return headers;\n+ }\n+\n+ private static TemporaryExposureKey buildTemporaryExposureKey() {\n+ return buildTemporaryExposureKey(\"testKey123456789\", 3L, 2);\n+ }\n+\n+ private static TemporaryExposureKey buildTemporaryExposureKey(\n+ String keyData, long rollingStartNumber, int riskLevelValue) {\n+ return TemporaryExposureKey.newBuilder()\n+ .setKeyData(ByteString.copyFromUtf8(keyData))\n+ .setRollingStartNumber(rollingStartNumber)\n+ .setRiskLevelValue(riskLevelValue).build();\n+ }\n+\n+ private ResponseEntity executeRequest(TemporaryExposureKey body, HttpHeaders headers) {\n+ RequestEntity request =\n+ new RequestEntity<>(body, headers, HttpMethod.POST, SUBMISSION_URL);\n+ return testRestTemplate.postForEntity(SUBMISSION_URL, request, Void.class);\n+ }\n+}\ndiff --git a/services/submission/src/test/resources/application.properties b/services/submission/src/test/resources/application.properties\n--- a/services/submission/src/test/resources/application.properties\n+++ b/services/submission/src/test/resources/application.properties\n@@ -1,5 +1,4 @@\n-spring.datasource.driver-class-name=org.hsqldb.jdbc.JDBCDriver\n-spring.datasource.url=jdbc:hsqldb:mem:testdb;DB_CLOSE_DELAY=-1\n-spring.datasource.username=cwa\n-spring.datasource.password=cwa\n-spring.jpa.hibernate.ddl-auto=create\n\\ No newline at end of file\n+spring.jpa.hibernate.ddl-auto=create\n+logging.level.org.springframework=off\n+logging.level.root=warn\n+spring.main.banner-mode=off\ndiff --git a/services/submission/src/test/resources/logback-test.xml b/services/submission/src/test/resources/logback-test.xml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/resources/logback-test.xml\n@@ -0,0 +1,5 @@\n+\n+\n+ \n+ \n+\n", "problem_statement": "Diagnosis key submission unit tests\nImplement unit tests for the diagnosis key submission service according to best practices.\n", "hints_text": "", "created_at": "2020-05-08T09:00:07Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 106, "instance_id": "corona-warn-app__cwa-server-106", "issue_numbers": ["5"], "base_commit": "23b492fe7b9f0821f2a8c34516cb858efcfaa55b", "patch": "diff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n@@ -1,9 +1,18 @@\n package app.coronawarn.server.common.persistence.repository;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import javax.transaction.Transactional;\n import org.springframework.data.jpa.repository.JpaRepository;\n import org.springframework.stereotype.Repository;\n \n @Repository\n public interface DiagnosisKeyRepository extends JpaRepository {\n+\n+ /**\n+ * Deletes all entries that have a submission timestamp lesser or equal to the specified one.\n+ *\n+ * @param submissionTimestamp the submission timestamp up to which entries will be deleted.\n+ */\n+ @Transactional\n+ public void deleteBySubmissionTimestampIsLessThanEqual(long submissionTimestamp);\n }\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n@@ -1,7 +1,11 @@\n package app.coronawarn.server.common.persistence.service;\n \n+import static java.time.ZoneOffset.UTC;\n+\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.persistence.repository.DiagnosisKeyRepository;\n+import java.time.Instant;\n+import java.time.LocalDateTime;\n import java.util.Collection;\n import java.util.List;\n import org.springframework.beans.factory.annotation.Autowired;\n@@ -30,4 +34,18 @@ public void saveDiagnosisKeys(Collection diagnosisKeys) {\n public List getDiagnosisKeys() {\n return keyRepository.findAll(Sort.by(Sort.Direction.ASC, \"submissionTimestamp\"));\n }\n+\n+ /**\n+ * Deletes all diagnosis key entries which have a submission timestamp that is older than the\n+ * specified number of days.\n+ *\n+ * @param daysToRetain the number of days until which diagnosis keys will be retained.\n+ */\n+ public void applyRetentionPolicy(int daysToRetain) {\n+ long threshold = LocalDateTime\n+ .ofInstant(Instant.now(), UTC)\n+ .minusDays(daysToRetain)\n+ .toEpochSecond(UTC) / 3600L;\n+ keyRepository.deleteBySubmissionTimestampIsLessThanEqual(threshold);\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/DiagnosisKeyDistributionRunner.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/DiagnosisKeyDistributionRunner.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/DiagnosisKeyDistributionRunner.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/DiagnosisKeyDistributionRunner.java\n@@ -24,7 +24,7 @@\n import org.springframework.stereotype.Component;\n \n @Component\n-@Order(2)\n+@Order(3)\n /**\n * This runner retrieves stored diagnosis keys, the generates and persists the respective diagnosis\n * key bundles.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/ExposureConfigurationDistributionRunner.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/ExposureConfigurationDistributionRunner.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/ExposureConfigurationDistributionRunner.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/ExposureConfigurationDistributionRunner.java\n@@ -23,7 +23,7 @@\n import org.springframework.stereotype.Component;\n \n @Component\n-@Order(1)\n+@Order(2)\n /**\n * Reads the exposure configuration parameters from the respective file in the class path, then\n * generates and persists the respective exposure configuration bundle.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicyRunner.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicyRunner.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicyRunner.java\n@@ -0,0 +1,37 @@\n+package app.coronawarn.server.services.distribution.runner;\n+\n+import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.beans.factory.annotation.Value;\n+import org.springframework.boot.ApplicationArguments;\n+import org.springframework.boot.ApplicationRunner;\n+import org.springframework.core.annotation.Order;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * This runner removes any diagnosis keys from the database that were submitted before a configured\n+ * threshold of days.\n+ */\n+@Component\n+@Order(1)\n+public class RetentionPolicyRunner implements ApplicationRunner {\n+\n+ private static final Logger logger = LoggerFactory\n+ .getLogger(RetentionPolicyRunner.class);\n+\n+ @Autowired\n+ private DiagnosisKeyService diagnosisKeyService;\n+\n+ @Value(\"${app.coronawarn.server.services.distribution.retention_days}\")\n+ private Integer rententionDays;\n+\n+ @Override\n+ public void run(ApplicationArguments args) {\n+ diagnosisKeyService.applyRetentionPolicy(rententionDays);\n+\n+ logger.debug(\"Retention policy applied successfully. Deleted all entries older that {} days.\",\n+ rententionDays);\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3DistributionRunner.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3DistributionRunner.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3DistributionRunner.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3DistributionRunner.java\n@@ -16,7 +16,7 @@\n * This runner will sync the base working directory to the S3.\n */\n @Component\n-@Order(3)\n+@Order(4)\n public class S3DistributionRunner implements ApplicationRunner {\n \n private Logger logger = LoggerFactory.getLogger(this.getClass());\ndiff --git a/services/distribution/src/main/resources/application.properties b/services/distribution/src/main/resources/application.properties\n--- a/services/distribution/src/main/resources/application.properties\n+++ b/services/distribution/src/main/resources/application.properties\n@@ -2,6 +2,7 @@ logging.level.org.springframework.web=INFO\n logging.level.app.coronawarn=INFO\n spring.main.web-application-type=NONE\n \n+app.coronawarn.server.services.distribution.retention_days=14\n app.coronawarn.server.services.distribution.version=v1\n app.coronawarn.server.services.distribution.paths.output=out\n app.coronawarn.server.services.distribution.paths.privatekey=classpath:certificates/client/private.pem\n", "test_patch": "diff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/TestApplication.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/TestApplication.java\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/TestApplication.java\n@@ -0,0 +1,15 @@\n+package app.coronawarn.server.common.persistence;\n+\n+import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n+import org.springframework.boot.autoconfigure.SpringBootApplication;\n+import org.springframework.context.annotation.Bean;\n+import org.springframework.context.annotation.Configuration;\n+\n+@SpringBootApplication\n+@Configuration\n+public class TestApplication {\n+ @Bean\n+ DiagnosisKeyService createDiagnosisKeyService() {\n+ return new DiagnosisKeyService();\n+ }\n+}\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n@@ -0,0 +1,125 @@\n+package app.coronawarn.server.common.persistence.service;\n+\n+import static java.time.ZoneOffset.UTC;\n+import static org.junit.jupiter.api.Assertions.assertEquals;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.common.persistence.repository.DiagnosisKeyRepository;\n+import java.time.OffsetDateTime;\n+import java.util.ArrayList;\n+import java.util.Collections;\n+import java.util.List;\n+import org.assertj.core.util.Lists;\n+import org.junit.jupiter.api.AfterEach;\n+import org.junit.jupiter.api.Test;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;\n+\n+@DataJpaTest\n+public class DiagnosisKeyServiceTest {\n+\n+ @Autowired\n+ private DiagnosisKeyService diagnosisKeyService;\n+\n+ @Autowired\n+ private DiagnosisKeyRepository diagnosisKeyRepository;\n+\n+ @AfterEach\n+ public void tearDown() {\n+ diagnosisKeyRepository.deleteAll();\n+ }\n+\n+ @Test\n+ void testRetrievalForEmptyDB() {\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+ assertDiagnosisKeysEqual(Lists.emptyList(), actKeys);\n+ }\n+\n+ @Test\n+ void testSaveAndRetrieve() {\n+ var expKeys = List.of(buildDiagnosisKeyForSubmissionTimestamp(0L));\n+\n+ diagnosisKeyService.saveDiagnosisKeys(expKeys);\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+\n+ assertDiagnosisKeysEqual(expKeys, actKeys);\n+ }\n+\n+ @Test\n+ void testSortedRetrievalResult() {\n+ var expKeys = new ArrayList<>(List.of(\n+ buildDiagnosisKeyForSubmissionTimestamp(1L),\n+ buildDiagnosisKeyForSubmissionTimestamp(0L)));\n+\n+ diagnosisKeyService.saveDiagnosisKeys(expKeys);\n+\n+ // reverse to match expected sort order\n+ Collections.reverse(expKeys);\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+\n+ assertDiagnosisKeysEqual(expKeys, actKeys);\n+ }\n+\n+ @Test\n+ void testApplyRetentionPolicyForEmptyDb() {\n+ diagnosisKeyService.applyRetentionPolicy(1);\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+ assertDiagnosisKeysEqual(Lists.emptyList(), actKeys);\n+ }\n+\n+ @Test\n+ void testApplyRetentionPolicyForOneNotApplicableEntry() {\n+ var expKeys = List.of(buildDiagnosisKeyForDateTime(OffsetDateTime.now(UTC).minusHours(23)));\n+\n+ diagnosisKeyService.saveDiagnosisKeys(expKeys);\n+ diagnosisKeyService.applyRetentionPolicy(1);\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+\n+ assertDiagnosisKeysEqual(expKeys, actKeys);\n+ }\n+\n+ @Test\n+ void testApplyRetentionPolicyForOneApplicableEntry() {\n+ var keys = List.of(buildDiagnosisKeyForDateTime(OffsetDateTime.now(UTC).minusDays(1L)));\n+\n+ diagnosisKeyService.saveDiagnosisKeys(keys);\n+ diagnosisKeyService.applyRetentionPolicy(1);\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+\n+ assertDiagnosisKeysEqual(Lists.emptyList(), actKeys);\n+ }\n+\n+ private void assertDiagnosisKeysEqual(List expDiagKeys,\n+ List actDiagKeys) {\n+ assertEquals(expDiagKeys.size(), actDiagKeys.size(), \"Cardinality mismatch\");\n+\n+ for (int i = 0; i < expDiagKeys.size(); i++) {\n+ var expDiagKey = expDiagKeys.get(i);\n+ var actDiagKey = actDiagKeys.get(i);\n+\n+ assertEquals(\n+ expDiagKey.getKeyData(), actDiagKey.getKeyData(), \"keyData mismatch\");\n+ assertEquals(expDiagKey.getRollingStartNumber(), actDiagKey.getRollingStartNumber(),\n+ \"rollingStartNumber mismatch\");\n+ assertEquals(expDiagKey.getRollingPeriod(), actDiagKey.getRollingPeriod(),\n+ \"rollingPeriod mismatch\");\n+ assertEquals(expDiagKey.getTransmissionRiskLevel(), actDiagKey.getTransmissionRiskLevel(),\n+ \"transmissionRiskLevel mismatch\");\n+ assertEquals(expDiagKey.getSubmissionTimestamp(), actDiagKey.getSubmissionTimestamp(),\n+ \"submissionTimestamp mismatch\");\n+ }\n+ }\n+\n+ public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n+ return DiagnosisKey.builder()\n+ .withKeyData(new byte[16])\n+ .withRollingStartNumber(0L)\n+ .withRollingPeriod(1L)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(submissionTimeStamp).build();\n+ }\n+\n+ public static DiagnosisKey buildDiagnosisKeyForDateTime(OffsetDateTime dateTime) {\n+ return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond() / 3600);\n+ }\n+}\ndiff --git a/common/persistence/src/test/resources/application.properties b/common/persistence/src/test/resources/application.properties\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/test/resources/application.properties\n@@ -0,0 +1,6 @@\n+spring.flyway.enabled=false\n+spring.jpa.hibernate.ddl-auto=create\n+spring.jpa.properties.hibernate.show_sql=false\n+spring.main.banner-mode=off\n+logging.level.org.springframework=off\n+logging.level.root=off\n\\ No newline at end of file\ndiff --git a/common/persistence/src/test/resources/logback-test.xml b/common/persistence/src/test/resources/logback-test.xml\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/test/resources/logback-test.xml\n@@ -0,0 +1,6 @@\n+\n+\n+ \n+ \n+ \n+\ndiff --git a/services/distribution/src/test/resources/application.properties b/services/distribution/src/test/resources/application.properties\n--- a/services/distribution/src/test/resources/application.properties\n+++ b/services/distribution/src/test/resources/application.properties\n@@ -3,6 +3,7 @@ logging.level.org.springframework=off\n logging.level.root=off\n spring.main.banner-mode=off\n \n+app.coronawarn.server.services.distribution.retention_days=14\n app.coronawarn.server.services.distribution.version=v1\n app.coronawarn.server.services.distribution.paths.output=out\n app.coronawarn.server.services.distribution.paths.privatekey=classpath:certificates/client/private.pem\n", "problem_statement": "Set Retention Days to 14\nAny key data that is associated to a point in time older than 14 days shall be removed from the database and will also be removed from the CDN and therefore the index file.\n", "hints_text": "", "created_at": "2020-05-14T23:08:17Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 113, "instance_id": "corona-warn-app__cwa-server-113", "issue_numbers": ["112"], "base_commit": "ac44b28ad79130bd39e2d002cddf3a67799a80fb", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/crypto/CryptoProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProvider.java\nsimilarity index 89%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/crypto/CryptoProvider.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/crypto/CryptoProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProvider.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.crypto;\n+package app.coronawarn.server.services.distribution.assembly.component;\n \n import java.io.ByteArrayInputStream;\n import java.io.IOException;\n@@ -22,7 +22,7 @@\n import org.springframework.stereotype.Component;\n \n /**\n- * Wrapper class for a {@link CryptoProvider#getPrivateKey() private key} and a {@link\n+ * Wrapper component for a {@link CryptoProvider#getPrivateKey() private key} and a {@link\n * CryptoProvider#getCertificate()} certificate} from the application properties.\n */\n @Component\n@@ -30,10 +30,10 @@ public class CryptoProvider {\n \n private static final Logger logger = LoggerFactory.getLogger(CryptoProvider.class);\n \n- @Value(\"${app.coronawarn.server.services.distribution.paths.privatekey}\")\n+ @Value(\"${services.distribution.paths.privatekey}\")\n private String privateKeyPath;\n \n- @Value(\"${app.coronawarn.server.services.distribution.paths.certificate}\")\n+ @Value(\"${services.distribution.paths.certificate}\")\n private String certificatePath;\n \n @Autowired\n@@ -72,10 +72,10 @@ private static Certificate getCertificateFromBytes(final byte[] bytes)\n * Reads and returns the {@link PrivateKey} configured in the application properties.\n */\n public PrivateKey getPrivateKey() {\n- if (this.privateKey == null) {\n+ if (privateKey == null) {\n Resource privateKeyResource = resourceLoader.getResource(privateKeyPath);\n try (InputStream privateKeyStream = privateKeyResource.getInputStream()) {\n- this.privateKey = getPrivateKeyFromStream(privateKeyStream);\n+ privateKey = getPrivateKeyFromStream(privateKeyStream);\n } catch (IOException e) {\n logger.error(\"Failed to load private key from {}\", privateKeyPath, e);\n throw new RuntimeException(e);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n@@ -0,0 +1,35 @@\n+package app.coronawarn.server.services.distribution.assembly.component;\n+\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexingDecorator;\n+import java.util.Set;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * Assembles the content underneath the {@code /version} path of the CWA API.\n+ */\n+@Component\n+public class CwaApiStructureProvider {\n+\n+ private final String VERSION_DIRECTORY = \"version\";\n+ private final String VERSION_V1 = \"v1\";\n+\n+ @Autowired\n+ private ExposureConfigurationStructureProvider exposureConfigurationStructureProvider;\n+\n+ @Autowired\n+ private DiagnosisKeysStructureProvider diagnosisKeysStructureProvider;\n+\n+ public Directory getDirectory() {\n+ IndexDirectory> versionDirectory =\n+ new IndexDirectoryImpl<>(VERSION_DIRECTORY, __ -> Set.of(VERSION_V1), Object::toString);\n+\n+ versionDirectory.addDirectoryToAll(__ -> exposureConfigurationStructureProvider.getExposureConfiguration());\n+ versionDirectory.addDirectoryToAll(__ -> diagnosisKeysStructureProvider.getDiagnosisKeys());\n+\n+ return new IndexingDecorator<>(versionDirectory);\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n@@ -0,0 +1,37 @@\n+package app.coronawarn.server.services.distribution.assembly.component;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DiagnosisKeysDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import java.util.Collection;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * Retrieves stored diagnosis keys and builds a {@link DiagnosisKeysDirectoryImpl} with them.\n+ */\n+@Component\n+public class DiagnosisKeysStructureProvider {\n+\n+ private static final Logger logger = LoggerFactory.getLogger(DiagnosisKeysStructureProvider.class);\n+\n+ @Autowired\n+ private DiagnosisKeyService diagnosisKeyService;\n+\n+ @Autowired\n+ private CryptoProvider cryptoProvider;\n+\n+ public Directory getDiagnosisKeys() {\n+ Collection diagnosisKeys = readDiagnosisKeys();\n+ return new DiagnosisKeysDirectoryImpl(diagnosisKeys, cryptoProvider);\n+ }\n+\n+ private Collection readDiagnosisKeys() {\n+ logger.debug(\"Querying diagnosis keys from the database...\");\n+ return diagnosisKeyService.getDiagnosisKeys();\n+ }\n+\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/ExposureConfigurationStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/ExposureConfigurationStructureProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/ExposureConfigurationStructureProvider.java\n@@ -0,0 +1,40 @@\n+package app.coronawarn.server.services.distribution.assembly.component;\n+\n+import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n+import app.coronawarn.server.services.distribution.assembly.exposureconfig.ExposureConfigurationProvider;\n+import app.coronawarn.server.services.distribution.assembly.exposureconfig.UnableToLoadFileException;\n+import app.coronawarn.server.services.distribution.assembly.exposureconfig.structure.directory.ExposureConfigurationDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * Reads the exposure configuration parameters from the respective file in the class path and builds\n+ * a {@link ExposureConfigurationDirectoryImpl} with them.\n+ */\n+@Component\n+public class ExposureConfigurationStructureProvider {\n+\n+ private static final Logger logger = LoggerFactory\n+ .getLogger(ExposureConfigurationStructureProvider.class);\n+\n+ @Autowired\n+ private CryptoProvider cryptoProvider;\n+\n+ public Directory getExposureConfiguration() {\n+ var riskScoreParameters = readExposureConfiguration();\n+ return new ExposureConfigurationDirectoryImpl(riskScoreParameters, cryptoProvider);\n+ }\n+\n+ private RiskScoreParameters readExposureConfiguration() {\n+ logger.debug(\"Reading exposure configuration...\");\n+ try {\n+ return ExposureConfigurationProvider.readMasterFile();\n+ } catch (UnableToLoadFileException e) {\n+ logger.error(\"Could not load exposure configuration parameters\", e);\n+ throw new RuntimeException(e);\n+ }\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/OutputDirectoryProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/OutputDirectoryProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/OutputDirectoryProvider.java\n@@ -0,0 +1,37 @@\n+package app.coronawarn.server.services.distribution.assembly.component;\n+\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryImpl;\n+import java.io.IOException;\n+import org.apache.commons.io.FileUtils;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.annotation.Value;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * Creates and clears a {@link Directory} on disk, which is defined by the application properties.\n+ */\n+@Component\n+public class OutputDirectoryProvider {\n+\n+ private static final Logger logger = LoggerFactory.getLogger(OutputDirectoryProvider.class);\n+\n+ @Value(\"${services.distribution.paths.output}\")\n+ private String outputPath;\n+\n+ public Directory getDirectory() {\n+ return new DirectoryImpl(getFileOnDisk());\n+ }\n+\n+ public java.io.File getFileOnDisk() {\n+ return new java.io.File(outputPath);\n+ }\n+\n+ public void clear() throws IOException {\n+ logger.debug(\"Clearing output directory...\");\n+ java.io.File outputDirectory = getFileOnDisk();\n+ FileUtils.deleteDirectory(outputDirectory);\n+ outputDirectory.mkdirs();\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectoryImpl.java\nsimilarity index 55%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectoryImpl.java\n@@ -1,13 +1,13 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.diagnosiskeys.structure.directory.decorator.DateAggregatingDecorator;\n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.decorator.IndexingDecorator;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateAggregatingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.time.LocalDate;\n import java.util.Collection;\n import java.util.Set;\n@@ -17,8 +17,8 @@ public class DiagnosisKeysCountryDirectoryImpl extends IndexDirectoryImpl diagnosisKeys;\n- private CryptoProvider cryptoProvider;\n+ private final Collection diagnosisKeys;\n+ private final CryptoProvider cryptoProvider;\n \n public DiagnosisKeysCountryDirectoryImpl(Collection diagnosisKeys,\n CryptoProvider cryptoProvider) {\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryImpl.java\nsimilarity index 59%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryImpl.java\n@@ -1,13 +1,13 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.diagnosiskeys.util.DateTime;\n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.decorator.IndexingDecorator;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.time.LocalDate;\n import java.time.LocalDateTime;\n import java.time.format.DateTimeFormatter;\n@@ -18,14 +18,14 @@ public class DiagnosisKeysDateDirectoryImpl extends IndexDirectoryImpl diagnosisKeys;\n- private CryptoProvider cryptoProvider;\n+ private final Collection diagnosisKeys;\n+ private final CryptoProvider cryptoProvider;\n \n public DiagnosisKeysDateDirectoryImpl(Collection diagnosisKeys,\n CryptoProvider cryptoProvider) {\n super(DATE_DIRECTORY, __ -> DateTime.getDates(diagnosisKeys), ISO8601::format);\n- this.diagnosisKeys = diagnosisKeys;\n this.cryptoProvider = cryptoProvider;\n+ this.diagnosisKeys = diagnosisKeys;\n }\n \n @Override\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryImpl.java\nsimilarity index 69%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryImpl.java\n@@ -1,12 +1,12 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.directory.DirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.structure.directory.decorator.IndexingDecorator;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.Collection;\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryImpl.java\nsimilarity index 61%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryImpl.java\n@@ -1,13 +1,13 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.diagnosiskeys.structure.file.HourFileImpl;\n-import app.coronawarn.server.services.distribution.diagnosiskeys.util.DateTime;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.file.decorator.SigningDecorator;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.HourFileImpl;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.decorator.SigningDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.time.LocalDate;\n import java.time.LocalDateTime;\n import java.util.Collection;\n@@ -16,9 +16,9 @@ public class DiagnosisKeysHourDirectoryImpl extends IndexDirectoryImpl diagnosisKeys;\n- private LocalDate currentDate;\n- private CryptoProvider cryptoProvider;\n+ private final Collection diagnosisKeys;\n+ private final LocalDate currentDate;\n+ private final CryptoProvider cryptoProvider;\n \n public DiagnosisKeysHourDirectoryImpl(Collection diagnosisKeys,\n LocalDate currentDate, CryptoProvider cryptoProvider) {\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\nsimilarity index 77%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n@@ -1,16 +1,16 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.structure.directory.decorator;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator;\n \n import app.coronawarn.server.common.protocols.internal.FileBucket;\n import app.coronawarn.server.common.protocols.internal.SignedPayload;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.structure.Writable;\n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.directory.decorator.DirectoryDecorator;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.file.FileImpl;\n-import app.coronawarn.server.services.distribution.structure.file.decorator.SigningDecorator;\n-import app.coronawarn.server.services.distribution.structure.functional.CheckedFunction;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.DirectoryDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.FileImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.decorator.SigningDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.CheckedFunction;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.ArrayList;\n import java.util.Comparator;\n import java.util.List;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/file/HourFileImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/file/HourFileImpl.java\nsimilarity index 86%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/file/HourFileImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/file/HourFileImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/structure/file/HourFileImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/file/HourFileImpl.java\n@@ -1,13 +1,13 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.structure.file;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.protocols.external.exposurenotification.File;\n import app.coronawarn.server.common.protocols.external.exposurenotification.Key;\n import app.coronawarn.server.common.protocols.internal.FileBucket;\n-import app.coronawarn.server.services.distribution.diagnosiskeys.util.Batch;\n-import app.coronawarn.server.services.distribution.diagnosiskeys.util.DateTime;\n-import app.coronawarn.server.services.distribution.structure.file.FileImpl;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.Batch;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.FileImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import com.google.protobuf.ByteString;\n import java.time.Instant;\n import java.time.LocalDateTime;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/Batch.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/Batch.java\nsimilarity index 97%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/Batch.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/Batch.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/Batch.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/Batch.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.util;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util;\n \n import app.coronawarn.server.common.protocols.external.exposurenotification.File;\n import app.coronawarn.server.common.protocols.external.exposurenotification.Header;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/DateTime.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\nsimilarity index 95%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/DateTime.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/DateTime.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.util;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import java.time.LocalDate;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/Maths.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/Maths.java\nsimilarity index 64%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/Maths.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/Maths.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/diagnosiskeys/util/Maths.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/Maths.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.diagnosiskeys.util;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util;\n \n public class Maths {\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/ExposureConfigurationProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/ExposureConfigurationProvider.java\nsimilarity index 92%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/ExposureConfigurationProvider.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/ExposureConfigurationProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/ExposureConfigurationProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/ExposureConfigurationProvider.java\n@@ -1,8 +1,8 @@\n-package app.coronawarn.server.services.distribution.exposureconfig;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig;\n \n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters.Builder;\n-import app.coronawarn.server.services.distribution.exposureconfig.parsing.YamlConstructorForProtoBuf;\n+import app.coronawarn.server.services.distribution.assembly.exposureconfig.parsing.YamlConstructorForProtoBuf;\n import java.io.IOException;\n import java.io.InputStream;\n import org.springframework.core.io.ClassPathResource;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/UnableToLoadFileException.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/UnableToLoadFileException.java\nsimilarity index 79%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/UnableToLoadFileException.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/UnableToLoadFileException.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/UnableToLoadFileException.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/UnableToLoadFileException.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig;\n \n /**\n * The file could not be loaded/parsed correctly.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/parsing/YamlConstructorForProtoBuf.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/parsing/YamlConstructorForProtoBuf.java\nsimilarity index 85%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/parsing/YamlConstructorForProtoBuf.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/parsing/YamlConstructorForProtoBuf.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/parsing/YamlConstructorForProtoBuf.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/parsing/YamlConstructorForProtoBuf.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.parsing;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.parsing;\n \n import java.util.Arrays;\n import org.yaml.snakeyaml.constructor.Constructor;\n@@ -20,9 +20,9 @@ public YamlConstructorForProtoBuf() {\n setPropertyUtils(new ProtoBufPropertyUtils());\n }\n \n- private class ProtoBufPropertyUtils extends PropertyUtils {\n+ private static class ProtoBufPropertyUtils extends PropertyUtils {\n \n- public Property getProperty(Class extends Object> type, String name, BeanAccess bAccess) {\n+ public Property getProperty(Class> type, String name, BeanAccess bAccess) {\n return super.getProperty(type, transformToProtoNaming(name), bAccess);\n }\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/structure/ExposureConfigurationDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/structure/ExposureConfigurationDirectoryImpl.java\nsimilarity index 69%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/structure/ExposureConfigurationDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/structure/ExposureConfigurationDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/structure/ExposureConfigurationDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/structure/ExposureConfigurationDirectoryImpl.java\n@@ -1,12 +1,12 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.structure;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.structure;\n \n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.structure.directory.DirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.decorator.IndexingDecorator;\n-import app.coronawarn.server.services.distribution.structure.file.FileImpl;\n-import app.coronawarn.server.services.distribution.structure.file.decorator.SigningDecorator;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.FileImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.decorator.SigningDecorator;\n import java.util.Set;\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/structure/directory/ExposureConfigurationDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/structure/directory/ExposureConfigurationDirectoryImpl.java\nsimilarity index 68%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/structure/directory/ExposureConfigurationDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/structure/directory/ExposureConfigurationDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/structure/directory/ExposureConfigurationDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/structure/directory/ExposureConfigurationDirectoryImpl.java\n@@ -1,12 +1,12 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.structure.directory;\n \n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.structure.directory.DirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.directory.decorator.IndexingDecorator;\n-import app.coronawarn.server.services.distribution.structure.file.FileImpl;\n-import app.coronawarn.server.services.distribution.structure.file.decorator.SigningDecorator;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.FileImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.decorator.SigningDecorator;\n import java.util.Set;\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ExposureConfigurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ExposureConfigurationValidator.java\nsimilarity index 93%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ExposureConfigurationValidator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ExposureConfigurationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ExposureConfigurationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ExposureConfigurationValidator.java\n@@ -1,8 +1,8 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n import app.coronawarn.server.common.protocols.internal.RiskLevel;\n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n-import app.coronawarn.server.services.distribution.exposureconfig.validation.WeightValidationError.ErrorType;\n+import app.coronawarn.server.services.distribution.assembly.exposureconfig.validation.WeightValidationError.ErrorType;\n import java.beans.BeanInfo;\n import java.beans.IntrospectionException;\n import java.beans.Introspector;\n@@ -19,7 +19,7 @@\n */\n public class ExposureConfigurationValidator {\n \n- private RiskScoreParameters config;\n+ private final RiskScoreParameters config;\n \n private ValidationResult errors;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ParameterSpec.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ParameterSpec.java\nsimilarity index 85%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ParameterSpec.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ParameterSpec.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ParameterSpec.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ParameterSpec.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n /**\n * Definition of the spec according to Apple/Google:\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/RiskLevelValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/RiskLevelValidationError.java\nsimilarity index 93%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/RiskLevelValidationError.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/RiskLevelValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/RiskLevelValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/RiskLevelValidationError.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n import java.util.Objects;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationError.java\nsimilarity index 67%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationError.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationError.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n /**\n * A validation error, found during the process of validating the Exposure Configuration. Can either\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationFailedException.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationFailedException.java\nsimilarity index 78%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationFailedException.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationFailedException.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationFailedException.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationFailedException.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n /**\n * The validation could not be executed. Find more information about the root cause in the cause\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationResult.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationResult.java\nsimilarity index 87%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationResult.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationResult.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/ValidationResult.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/ValidationResult.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n import java.util.HashSet;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/WeightValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/WeightValidationError.java\nsimilarity index 94%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/WeightValidationError.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/WeightValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/exposureconfig/validation/WeightValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/exposureconfig/validation/WeightValidationError.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.exposureconfig.validation;\n+package app.coronawarn.server.services.distribution.assembly.exposureconfig.validation;\n \n import java.util.Objects;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/io/IO.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java\nsimilarity index 96%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/io/IO.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/io/IO.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.io;\n+package app.coronawarn.server.services.distribution.assembly.io;\n \n import java.io.File;\n import java.io.FileOutputStream;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/Writable.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/Writable.java\nsimilarity index 74%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/Writable.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/Writable.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/Writable.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/Writable.java\n@@ -1,7 +1,7 @@\n-package app.coronawarn.server.services.distribution.structure;\n+package app.coronawarn.server.services.distribution.assembly.structure;\n \n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n \n /**\n * Something that can be written to disk.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/WritableImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/WritableImpl.java\nsimilarity index 82%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/WritableImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/WritableImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/WritableImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/WritableImpl.java\n@@ -1,6 +1,6 @@\n-package app.coronawarn.server.services.distribution.structure;\n+package app.coronawarn.server.services.distribution.assembly.structure;\n \n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import java.util.Objects;\n \n public abstract class WritableImpl implements Writable {\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/Directory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/Directory.java\nsimilarity index 75%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/Directory.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/Directory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/Directory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/Directory.java\n@@ -1,7 +1,7 @@\n-package app.coronawarn.server.services.distribution.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory;\n \n-import app.coronawarn.server.services.distribution.structure.Writable;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n import java.util.Set;\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/DirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DirectoryImpl.java\nsimilarity index 87%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/DirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/DirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DirectoryImpl.java\n@@ -1,8 +1,8 @@\n-package app.coronawarn.server.services.distribution.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory;\n \n-import app.coronawarn.server.services.distribution.structure.WritableImpl;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.HashSet;\n import java.util.Set;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/IndexDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\nsimilarity index 77%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/IndexDirectory.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/IndexDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n@@ -1,9 +1,9 @@\n-package app.coronawarn.server.services.distribution.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory;\n \n-import app.coronawarn.server.services.distribution.structure.functional.DirectoryFunction;\n-import app.coronawarn.server.services.distribution.structure.functional.FileFunction;\n-import app.coronawarn.server.services.distribution.structure.functional.Formatter;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.DirectoryFunction;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.FileFunction;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.Formatter;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.Set;\n import java.util.Stack;\n \n@@ -32,7 +32,7 @@ public interface IndexDirectory extends Directory {\n void addDirectoryToAll(DirectoryFunction directoryFunction);\n \n /**\n- * Calls the {@link app.coronawarn.server.services.distribution.structure.functional.IndexFunction}\n+ * Calls the {@link app.coronawarn.server.services.distribution.assembly.structure.functional.IndexFunction}\n * with the {@code indices} to calculate and return the elements of the index of this {@link\n * IndexDirectory}.\n *\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/IndexDirectoryImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryImpl.java\nsimilarity index 85%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/IndexDirectoryImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/IndexDirectoryImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryImpl.java\n@@ -1,11 +1,11 @@\n-package app.coronawarn.server.services.distribution.structure.directory;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory;\n \n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.functional.DirectoryFunction;\n-import app.coronawarn.server.services.distribution.structure.functional.FileFunction;\n-import app.coronawarn.server.services.distribution.structure.functional.Formatter;\n-import app.coronawarn.server.services.distribution.structure.functional.IndexFunction;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.DirectoryFunction;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.FileFunction;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.Formatter;\n+import app.coronawarn.server.services.distribution.assembly.structure.functional.IndexFunction;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.HashSet;\n import java.util.Set;\n import java.util.Stack;\n@@ -61,7 +61,7 @@ public void addDirectoryToAll(DirectoryFunction directoryFunction) {\n * Creates a new subdirectory for every element of the {@link IndexDirectory#getIndex index} and\n * writes {@link IndexDirectory#addFileToAll files} and {@link IndexDirectory#addDirectory\n * directories} to those. The respective element of the index will be pushed onto the Stack for\n- * subsequent {@link app.coronawarn.server.services.distribution.structure.Writable#prepare} calls\n+ * subsequent {@link app.coronawarn.server.services.distribution.assembly.structure.Writable#prepare} calls\n * on those files and directories.\n *\n * @param indices A {@link Stack} of parameters from all {@link IndexDirectory IndexDirectories}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/decorator/DirectoryDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/DirectoryDecorator.java\nsimilarity index 75%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/decorator/DirectoryDecorator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/DirectoryDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/decorator/DirectoryDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/DirectoryDecorator.java\n@@ -1,9 +1,9 @@\n-package app.coronawarn.server.services.distribution.structure.directory.decorator;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory.decorator;\n \n-import app.coronawarn.server.services.distribution.structure.Writable;\n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.Set;\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/decorator/IndexingDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/IndexingDecorator.java\nsimilarity index 72%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/decorator/IndexingDecorator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/IndexingDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/directory/decorator/IndexingDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/IndexingDecorator.java\n@@ -1,9 +1,9 @@\n-package app.coronawarn.server.services.distribution.structure.directory.decorator;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory.decorator;\n \n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.structure.directory.IndexDirectoryImpl;\n-import app.coronawarn.server.services.distribution.structure.file.FileImpl;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.FileImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.util.List;\n import java.util.Set;\n import java.util.stream.Collectors;\n@@ -14,7 +14,7 @@\n /**\n * A {@link DirectoryDecorator} that writes a file called {@code \"index\"}, containing a JSON array\n * containing all elements returned {@link IndexDirectoryImpl#getIndex}, formatted with the {@link\n- * IndexDirectoryImpl#getIndexFormatter} on {@link app.coronawarn.server.services.distribution.structure.Writable#prepare}.\n+ * IndexDirectoryImpl#getIndexFormatter} on {@link app.coronawarn.server.services.distribution.assembly.structure.Writable#prepare}.\n */\n public class IndexingDecorator extends DirectoryDecorator {\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/File.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/File.java\nsimilarity index 64%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/File.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/File.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/File.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/File.java\n@@ -1,6 +1,6 @@\n-package app.coronawarn.server.services.distribution.structure.file;\n+package app.coronawarn.server.services.distribution.assembly.structure.file;\n \n-import app.coronawarn.server.services.distribution.structure.Writable;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n \n /**\n * A {@link Writable} containing some bytes.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/FileImpl.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/FileImpl.java\nsimilarity index 69%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/FileImpl.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/FileImpl.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/FileImpl.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/FileImpl.java\n@@ -1,9 +1,9 @@\n-package app.coronawarn.server.services.distribution.structure.file;\n+package app.coronawarn.server.services.distribution.assembly.structure.file;\n \n-import app.coronawarn.server.services.distribution.io.IO;\n-import app.coronawarn.server.services.distribution.structure.Writable;\n-import app.coronawarn.server.services.distribution.structure.WritableImpl;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.io.IO;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableImpl;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n \n /**\n * Implementation of {@link File} that interfaces with {@link java.io.File Files} on disk.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/decorator/FileDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/decorator/FileDecorator.java\nsimilarity index 70%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/decorator/FileDecorator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/decorator/FileDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/decorator/FileDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/decorator/FileDecorator.java\n@@ -1,9 +1,9 @@\n-package app.coronawarn.server.services.distribution.structure.file.decorator;\n+package app.coronawarn.server.services.distribution.assembly.structure.file.decorator;\n \n-import app.coronawarn.server.services.distribution.structure.Writable;\n-import app.coronawarn.server.services.distribution.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n \n /**\n * Decorates a {@link File} (e.g. to modify its content) on {@link Writable#prepare}. This class\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/decorator/SigningDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/decorator/SigningDecorator.java\nsimilarity index 85%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/decorator/SigningDecorator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/decorator/SigningDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/file/decorator/SigningDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/file/decorator/SigningDecorator.java\n@@ -1,9 +1,9 @@\n-package app.coronawarn.server.services.distribution.structure.file.decorator;\n+package app.coronawarn.server.services.distribution.assembly.structure.file.decorator;\n \n import app.coronawarn.server.common.protocols.internal.SignedPayload;\n-import app.coronawarn.server.services.distribution.crypto.CryptoProvider;\n-import app.coronawarn.server.services.distribution.structure.file.File;\n-import app.coronawarn.server.services.distribution.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import com.google.protobuf.ByteString;\n import java.security.GeneralSecurityException;\n import java.security.PrivateKey;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/functional/CheckedFunction.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/functional/CheckedFunction.java\nsimilarity index 85%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/functional/CheckedFunction.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/functional/CheckedFunction.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/structure/functional/CheckedFunction.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/functional/CheckedFunction.java\n@@ -1,4 +1,4 @@\n-package app.coronawarn.server.services.distribution.structure.functional;\n+package app.coronawarn.server.services.distribution.assembly.structure.functional;\n \n import java.util.function.Function;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/functional/DirectoryFunction.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/functional/DirectoryFunction.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/functional/DirectoryFunction.java\n@@ -0,0 +1,14 @@\n+package app.coronawarn.server.services.distribution.assembly.structure.functional;\n+\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import java.util.function.Function;\n+\n+/**\n+ * A {@code Function, Directory>}.\n+ */\n+@FunctionalInterface\n+public interface DirectoryFunction extends Function, Directory> {\n+\n+ Directory apply(ImmutableStack
\n@@ -57,7 +57,7 @@ The docker-compose contains the following services:\n \n Service | Description | Endpoint and Default Credentials\n --------------|-------------|-----------\n-submission | The Corona-Warn-App submission service | http://localhost:8000 \n+submission | The Corona-Warn-App submission service | http://localhost:8000\n distribution | The Corona-Warn-App distribution service | NO ENDPOINT\n postgres | A [postgres] database installation | postgres:8001 Username: postgres Password: postgres\n pgadmin | A [pgadmin](https://www.pgadmin.org/) installation for the postgres database | http://localhost:8002 Username: user@domain.com Password: password\n@@ -99,8 +99,8 @@ To prepare your machine to run the CWA project locally, we recommend that you fi\n \n After you made sure that the specified dependencies are running, configure them in the respective configuration files.\n \n-* Configure the Postgres connection in the [submission config](./services/submission/src/main/resources/application.properties) and in the [distribution config](./services/distribution/src/main/resources/application.properties)\n-* Configure the S3 compatible object storage in the [distribution config](./services/distribution/src/main/resources/application.properties)\n+* Configure the Postgres connection in the [submission config](./services/submission/src/main/resources/application.yaml) and in the [distribution config](./services/distribution/src/main/resources/application.yaml)\n+* Configure the S3 compatible object storage in the [distribution config](./services/distribution/src/main/resources/application.yaml)\n * Configure the certificate and private key for the distribution service, the paths need to be prefixed with `file:`\n * `VAULT_FILESIGNING_SECRET` should be the path to the private key, example available in `/docker-compose-test-secrets/private.pem`\n * `VAULT_FILESIGNING_CERT` should be the path to the certificate, example available in `/docker-compose-test-secrets/certificate.cert`\n@@ -181,7 +181,7 @@ The following public repositories are currently available for the Corona-Warn-Ap\n \n Copyright (c) 2020 SAP SE or an SAP affiliate company.\n \n-Licensed under the **Apache License, Version 2.0** (the \"License\"); you may not use this file except in compliance with the License. \n+Licensed under the **Apache License, Version 2.0** (the \"License\"); you may not use this file except in compliance with the License.\n \n You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0.\n \ndiff --git a/services/distribution/src/main/resources/application-cloud.properties b/services/distribution/src/main/resources/application-cloud.properties\ndeleted file mode 100644\n--- a/services/distribution/src/main/resources/application-cloud.properties\n+++ /dev/null\n@@ -1,9 +0,0 @@\n-spring.flyway.enabled=true\n-spring.flyway.locations=classpath:db/migration/postgres\n-\n-spring.datasource.driver-class-name=org.postgresql.Driver\n-spring.datasource.url=jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n-spring.datasource.username=${POSTGRESQL_USER}\n-spring.datasource.password=${POSTGRESQL_PASSWORD}\n-\n-services.distribution.paths.output=/tmp/distribution\n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/resources/application-cloud.yaml b/services/distribution/src/main/resources/application-cloud.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/application-cloud.yaml\n@@ -0,0 +1,22 @@\n+---\n+spring:\n+ flyway:\n+ enabled: true\n+ locations: classpath:db/migration/postgres\n+ datasource:\n+ driver-class-name: org.postgresql.Driver\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n+ username: ${POSTGRESQL_USER}\n+ password: ${POSTGRESQL_PASSWORD}\n+\n+services:\n+ distribution:\n+ paths:\n+ output: /tmp/distribution\n+ objectstore:\n+ access-key: ${CWA_OBJECTSTORE_ACCESSKEY}\n+ secret-key: ${CWA_OBJECTSTORE_SECRETKEY}\n+ endpoint: ${CWA_OBJECTSTORE_ENDPOINT}\n+ bucket: ${CWA_OBJECTSTORE_BUCKET}\n+ port: ${CWA_OBJECTSTORE_PORT}\n+ set-public-read-acl-on-put-object: false\ndiff --git a/services/distribution/src/main/resources/application-dev.properties b/services/distribution/src/main/resources/application-dev.properties\ndeleted file mode 100644\n--- a/services/distribution/src/main/resources/application-dev.properties\n+++ /dev/null\n@@ -1,2 +0,0 @@\n-logging.level.org.springframework.web=DEBUG\n-logging.level.app.coronawarn=DEBUG\n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/resources/application-dev.yaml b/services/distribution/src/main/resources/application-dev.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/application-dev.yaml\n@@ -0,0 +1,8 @@\n+---\n+logging:\n+ level:\n+ org:\n+ springframework:\n+ web: DEBUG\n+ app:\n+ coronawarn: DEBUG\ndiff --git a/services/distribution/src/main/resources/application-testdata.properties b/services/distribution/src/main/resources/application-testdata.properties\ndeleted file mode 100644\n--- a/services/distribution/src/main/resources/application-testdata.properties\n+++ /dev/null\n@@ -1,2 +0,0 @@\n-services.distribution.testdata.seed=123456\n-services.distribution.testdata.exposures-per-hour=1000\n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/resources/application-testdata.yaml b/services/distribution/src/main/resources/application-testdata.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/application-testdata.yaml\n@@ -0,0 +1,6 @@\n+---\n+services:\n+ distribution:\n+ testdata:\n+ seed: 123456\n+ exposures-per-hour: 1000\ndiff --git a/services/distribution/src/main/resources/application.properties b/services/distribution/src/main/resources/application.properties\ndeleted file mode 100644\n--- a/services/distribution/src/main/resources/application.properties\n+++ /dev/null\n@@ -1,52 +0,0 @@\n-logging.level.org.springframework.web=INFO\n-logging.level.app.coronawarn=INFO\n-spring.main.web-application-type=NONE\n-\n-services.distribution.retention-days=14\n-services.distribution.output-file-name=index\n-services.distribution.tek-export.file-name=export.bin\n-services.distribution.tek-export.file-header=EK Export v1\n-services.distribution.tek-export.file-header-width=16\n-\n-services.distribution.paths.output=out\n-services.distribution.paths.privatekey=${VAULT_FILESIGNING_SECRET}\n-services.distribution.paths.certificate=${VAULT_FILESIGNING_CERT}\n-\n-services.distribution.api.version-path=version\n-services.distribution.api.version-v1=v1\n-services.distribution.api.country-path=country\n-services.distribution.api.country-germany=DE\n-services.distribution.api.date-path=date\n-services.distribution.api.hour-path=hour\n-services.distribution.api.diagnosis-keys-path=diagnosis-keys\n-services.distribution.api.parameters-path=configuration\n-services.distribution.api.parameters-exposure-configuration-file-name=exposure_configuration\n-services.distribution.api.parameters-risk-score-classification-file-name=risk_score_classification\n-\n-services.distribution.signature.app-bundle-id=de.rki.coronawarnapp\n-services.distribution.signature.android-package=de.rki.coronawarnapp\n-services.distribution.signature.verification-key-id=\n-services.distribution.signature.verification-key-version=\n-services.distribution.signature.algorithm-oid=1.2.840.10045.4.3.2\n-services.distribution.signature.algorithm-name=SHA256withECDSA\n-services.distribution.signature.file-name=export.sig\n-services.distribution.signature.security-provider=BC\n-\n-# Configuration for the S3 compatible object storage hosted by Telekom in Germany\n-services.distribution.objectstore.access-key=${CWA_OBJECTSTORE_ACCESSKEY:accessKey1}\n-services.distribution.objectstore.secret-key=${CWA_OBJECTSTORE_SECRETKEY:verySecretKey1}\n-services.distribution.objectstore.endpoint=${CWA_OBJECTSTORE_ENDPOINT:http\\://localhost\\:8003}\n-services.distribution.objectstore.bucket=${CWA_OBJECTSTORE_BUCKET:cwa}\n-services.distribution.objectstore.port=${CWA_OBJECTSTORE_PORT:8003}\n-services.distribution.objectstore.set-public-read-acl-on-put-object=true\n-\n-# Postgres configuration\n-spring.jpa.hibernate.ddl-auto=validate\n-\n-spring.flyway.enabled=true\n-spring.flyway.locations=classpath:db/migration/postgres\n-\n-spring.datasource.driver-class-name=org.postgresql.Driver\n-spring.datasource.url=jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n-spring.datasource.username=${POSTGRESQL_USER:postgres}\n-spring.datasource.password=${POSTGRESQL_PASSWORD:postgres}\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -0,0 +1,66 @@\n+---\n+logging:\n+ level:\n+ org:\n+ springframework:\n+ web: INFO\n+ app:\n+ coronawarn: INFO\n+\n+services:\n+ distribution:\n+ output-file-name: index\n+ retention-days: 14\n+ paths:\n+ output: out\n+ privatekey: ${VAULT_FILESIGNING_SECRET}\n+ certificate: ${VAULT_FILESIGNING_CERT}\n+ tek-export:\n+ file-name: export.bin\n+ file-header: EK Export v1\n+ file-header-width: 16\n+ api:\n+ version-path: version\n+ version-v1: v1\n+ country-path: country\n+ country-germany: DE\n+ date-path: date\n+ hour-path: hour\n+ diagnosis-keys-path: diagnosis-keys\n+ parameters-path: configuration\n+ parameters-exposure-configuration-file-name: exposure_configuration\n+ parameters-risk-score-classification-file-name: risk_score_classification\n+ signature:\n+ app-bundle-id: de.rki.coronawarnapp\n+ android-package: de.rki.coronawarnapp\n+ verification-key-id:\n+ verification-key-version:\n+ algorithm-oid: 1.2.840.10045.4.3.2\n+ algorithm-name: SHA256withECDSA\n+ file-name: export.sig\n+ security-provider: BC\n+ # Configuration for the S3 compatible object storage hosted by Telekom in Germany\n+ objectstore:\n+ access-key: ${CWA_OBJECTSTORE_ACCESSKEY:accessKey1}\n+ secret-key: ${CWA_OBJECTSTORE_SECRETKEY:verySecretKey1}\n+ endpoint: ${CWA_OBJECTSTORE_ENDPOINT:http\\://localhost\\:8003}\n+ bucket: ${CWA_OBJECTSTORE_BUCKET:cwa}\n+ port: ${CWA_OBJECTSTORE_PORT:8003}\n+ set-public-read-acl-on-put-object: true\n+\n+spring:\n+ main:\n+ web-application-type: NONE\n+# Postgres configuration\n+ jpa:\n+ hibernate:\n+ ddl-auto: validate\n+ flyway:\n+ enabled: true\n+ locations: classpath:db/migration/postgres\n+\n+ datasource:\n+ driver-class-name: org.postgresql.Driver\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n+ username: ${POSTGRESQL_USER:postgres}\n+ password: ${POSTGRESQL_PASSWORD:postgres}\ndiff --git a/services/submission/src/main/resources/application-cloud.properties b/services/submission/src/main/resources/application-cloud.properties\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-cloud.properties\n+++ /dev/null\n@@ -1,6 +0,0 @@\n-spring.flyway.locations=classpath:db/migration/postgres\n-\n-spring.datasource.driver-class-name=org.postgresql.Driver\n-spring.datasource.url=jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n-spring.datasource.username=${POSTGRESQL_USER}\n-spring.datasource.password=${POSTGRESQL_PASSWORD}\n\\ No newline at end of file\ndiff --git a/services/submission/src/main/resources/application-cloud.yaml b/services/submission/src/main/resources/application-cloud.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application-cloud.yaml\n@@ -0,0 +1,9 @@\n+---\n+spring:\n+ flyway:\n+ locations: classpath:db/migration/postgres\n+ datasource:\n+ driver-class-name: org.postgresql.Driver\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n+ username: ${POSTGRESQL_USER}\n+ password: ${POSTGRESQL_PASSWORD}\ndiff --git a/services/submission/src/main/resources/application-config-test.properties b/services/submission/src/main/resources/application-config-test.properties\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-config-test.properties\n+++ /dev/null\n@@ -1,4 +0,0 @@\n-services.submission.initial_fake_delay_milliseconds=100.0\n-services.submission.fake_delay_moving_average_samples=1.0\n-services.submission.retention-days=10\n-services.submission.payload.max-number-of-keys=1000\n\\ No newline at end of file\ndiff --git a/services/submission/src/main/resources/application-dev.properties b/services/submission/src/main/resources/application-dev.properties\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-dev.properties\n+++ /dev/null\n@@ -1 +0,0 @@\n-logging.level.org.springframework.web=DEBUG\ndiff --git a/services/submission/src/main/resources/application-dev.yaml b/services/submission/src/main/resources/application-dev.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application-dev.yaml\n@@ -0,0 +1,6 @@\n+---\n+logging:\n+ level:\n+ org:\n+ springframework:\n+ web: DEBUG\ndiff --git a/services/submission/src/main/resources/application.properties b/services/submission/src/main/resources/application.properties\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application.properties\n+++ /dev/null\n@@ -1,20 +0,0 @@\n-logging.level.org.springframework.web=INFO\n-\n-# The initial value of the moving average for fake request delays.\n-services.submission.initial_fake_delay_milliseconds=10\n-# The number of samples for the calculation of the moving average for fake request delays.\n-services.submission.fake_delay_moving_average_samples=10\n-\n-services.submission.retention-days=14\n-services.submission.payload.max-number-of-keys=14\n-\n-spring.jpa.hibernate.ddl-auto=validate\n-spring.flyway.enabled=true\n-\n-spring.flyway.locations=classpath:db/migration/postgres\n-\n-# Postgres configuration\n-spring.datasource.driver-class-name=org.postgresql.Driver\n-spring.datasource.url=jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n-spring.datasource.username=${POSTGRESQL_USER:postgres}\n-spring.datasource.password=${POSTGRESQL_PASSWORD:postgres}\ndiff --git a/services/submission/src/main/resources/application.yaml b/services/submission/src/main/resources/application.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application.yaml\n@@ -0,0 +1,30 @@\n+---\n+logging:\n+ level:\n+ org:\n+ springframework:\n+ web: INFO\n+\n+# The initial value of the moving average for fake request delays.\n+services:\n+ submission:\n+ initial-fake-delay-milliseconds: 10\n+ # The number of samples for the calculation of the moving average for fake request delays.\n+ fake-delay-moving-average-samples: 10\n+ retention-days: 14\n+ payload:\n+ max-number-of-keys: 14\n+\n+spring:\n+ jpa:\n+ hibernate:\n+ ddl-auto: validate\n+ flyway:\n+ enabled: true\n+ locations: classpath:db/migration/postgres\n+# Postgres configuration\n+ datasource:\n+ driver-class-name: org.postgresql.Driver\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n+ username: ${POSTGRESQL_USER:postgres}\n+ password: ${POSTGRESQL_PASSWORD:postgres}\n", "test_patch": "diff --git a/common/persistence/src/test/resources/application.properties b/common/persistence/src/test/resources/application.properties\ndeleted file mode 100644\n--- a/common/persistence/src/test/resources/application.properties\n+++ /dev/null\n@@ -1,6 +0,0 @@\n-spring.flyway.enabled=false\n-spring.jpa.hibernate.ddl-auto=create\n-spring.jpa.properties.hibernate.show_sql=false\n-spring.main.banner-mode=off\n-logging.level.org.springframework=off\n-logging.level.root=off\n\\ No newline at end of file\ndiff --git a/common/persistence/src/test/resources/application.yaml b/common/persistence/src/test/resources/application.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/test/resources/application.yaml\n@@ -0,0 +1,17 @@\n+---\n+spring:\n+ flyway:\n+ enabled: false\n+ jpa:\n+ hibernate:\n+ ddl-auto: create\n+ properties:\n+ hibernate:\n+ show-sql: false\n+ main:\n+ banner-mode: off\n+logging:\n+ level:\n+ org:\n+ springframework: off\n+ root: off\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProviderTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProviderTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProviderTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/component/CryptoProviderTest.java\n@@ -28,7 +28,6 @@\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n import org.springframework.test.context.ContextConfiguration;\n-import org.springframework.test.context.TestPropertySource;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n@@ -50,7 +50,6 @@\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n import org.springframework.test.context.ContextConfiguration;\n-import org.springframework.test.context.TestPropertySource;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfigTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfigTest.java\ndeleted file mode 100644\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfigTest.java\n+++ /dev/null\n@@ -1,91 +0,0 @@\n-package app.coronawarn.server.services.distribution.config;\n-\n-import static org.springframework.test.util.AssertionErrors.assertNotNull;\n-import static org.springframework.test.util.AssertionErrors.assertNull;\n-\n-import static org.assertj.core.api.Assertions.assertThat;\n-import java.io.IOException;\n-import java.io.InputStream;\n-import java.util.HashMap;\n-import java.util.Map;\n-import java.util.Properties;\n-import org.junit.jupiter.api.AfterEach;\n-import org.junit.jupiter.api.BeforeEach;\n-import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.api.extension.ExtendWith;\n-import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.context.properties.EnableConfigurationProperties;\n-import org.springframework.test.context.TestPropertySource;\n-import org.springframework.test.context.junit.jupiter.SpringExtension;\n-\n-@ExtendWith(SpringExtension.class)\n-@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n-@TestPropertySource(\"classpath:application.properties\")\n-public class DistributionServiceConfigTest {\n-\n- @Autowired\n- private DistributionServiceConfig dsc;\n-\n- private final Properties properties = new Properties();\n-\n- @BeforeEach\n- public void setup() throws IOException {\n- InputStream is = getClass().getClassLoader().getResourceAsStream(\"application.properties\");\n- properties.load(is);\n- }\n-\n- @AfterEach\n- public void tearDown() {\n- properties.clear();\n- }\n-\n- @Test\n- void whenDistributionConfigBeanCreatedThenPropertiesLoadedCorrectly() {\n-\n- assertNotNull(\"Configuration should not be null\", dsc);\n- assertNotNull(\"Paths should not be null\", dsc.getPaths());\n- assertNull(\"TestData should be null\", dsc.getTestData());\n- assertNotNull(\"Signature should not be null\", dsc.getSignature());\n- assertNotNull(\"API should not be null\", dsc.getApi());\n-\n- Map cp = new HashMap<>();\n- cp.put(\"services.distribution.retention-days\", dsc.getRetentionDays().toString());\n- cp.put(\"services.distribution.output-file-name\", dsc.getOutputFileName());\n- cp.put(\"services.distribution.tek-export.file-name\", dsc.getTekExport().getFileName());\n- cp.put(\"services.distribution.tek-export.file-header\", dsc.getTekExport().getFileHeader());\n- cp.put(\"services.distribution.tek-export.file-header-width\", dsc.getTekExport().getFileHeaderWidth().toString());\n- cp.put(\"services.distribution.paths.privatekey\", dsc.getPaths().getPrivateKey());\n- cp.put(\"services.distribution.paths.certificate\", dsc.getPaths().getCertificate());\n- cp.put(\"services.distribution.paths.output\", dsc.getPaths().getOutput());\n- cp.put(\"services.distribution.signature.app-bundle-id\", dsc.getSignature().getAppBundleId());\n- cp.put(\"services.distribution.signature.android-package\", dsc.getSignature().getAndroidPackage());\n- cp.put(\"services.distribution.signature.verification-key-id\", dsc.getSignature().getVerificationKeyId());\n- cp.put(\"services.distribution.signature.verification-key-version\", dsc.getSignature().getVerificationKeyVersion());\n- cp.put(\"services.distribution.signature.algorithm-oid\", dsc.getSignature().getAlgorithmOid());\n- cp.put(\"services.distribution.signature.algorithm-name\", dsc.getSignature().getAlgorithmName());\n- cp.put(\"services.distribution.signature.file-name\", dsc.getSignature().getFileName());\n- cp.put(\"services.distribution.signature.security-provider\", dsc.getSignature().getSecurityProvider());\n- cp.put(\"services.distribution.api.version-path\", dsc.getApi().getVersionPath());\n- cp.put(\"services.distribution.api.version-v1\", dsc.getApi().getVersionV1());\n- cp.put(\"services.distribution.api.country-path\", dsc.getApi().getCountryPath());\n- cp.put(\"services.distribution.api.country-germany\", dsc.getApi().getCountryGermany());\n- cp.put(\"services.distribution.api.date-path\", dsc.getApi().getDatePath());\n- cp.put(\"services.distribution.api.hour-path\", dsc.getApi().getHourPath());\n- cp.put(\"services.distribution.api.diagnosis-keys-path\", dsc.getApi().getDiagnosisKeysPath());\n- cp.put(\"services.distribution.api.parameters-path\", dsc.getApi().getParametersPath());\n- cp.put(\"services.distribution.api.parameters-exposure-configuration-file-name\",\n- dsc.getApi().getParametersExposureConfigurationFileName());\n- cp.put(\"services.distribution.api.parameters-risk-score-classification-file-name\",\n- dsc.getApi().getParametersRiskScoreClassificationFileName());\n- cp.put(\"services.distribution.objectstore.access-key\", dsc.getObjectStore().getAccessKey());\n- cp.put(\"services.distribution.objectstore.secret-key\", dsc.getObjectStore().getSecretKey());\n- cp.put(\"services.distribution.objectstore.endpoint\", dsc.getObjectStore().getEndpoint());\n- cp.put(\"services.distribution.objectstore.bucket\", dsc.getObjectStore().getBucket());\n- cp.put(\"services.distribution.objectstore.port\", dsc.getObjectStore().getPort().toString());\n- cp.put(\"services.distribution.objectstore.set-public-read-acl-on-put-object\",\n- dsc.getObjectStore().isSetPublicReadAclOnPutObject().toString());\n-\n- cp.forEach((key, value) -> assertThat(properties.getProperty(key)).isEqualTo(value));\n- }\n-\n-}\ndiff --git a/services/distribution/src/test/resources/application.properties b/services/distribution/src/test/resources/application.properties\ndeleted file mode 100644\n--- a/services/distribution/src/test/resources/application.properties\n+++ /dev/null\n@@ -1,47 +0,0 @@\n-logging.level.org.springframework=off\n-logging.level.root=info\n-spring.main.banner-mode=off\n-\n-services.distribution.retention-days=14\n-services.distribution.output-file-name=index\n-services.distribution.tek-export.file-name=export.bin\n-services.distribution.tek-export.file-header=EK Export v1\n-services.distribution.tek-export.file-header-width=16\n-\n-services.distribution.paths.output=out\n-services.distribution.paths.privatekey=classpath:certificates/client/private.pem\n-services.distribution.paths.certificate=classpath:certificates/chain/certificate.crt\n-\n-services.distribution.api.version-path=version\n-services.distribution.api.version-v1=v1\n-services.distribution.api.country-path=country\n-services.distribution.api.country-germany=DE\n-services.distribution.api.date-path=date\n-services.distribution.api.hour-path=hour\n-services.distribution.api.diagnosis-keys-path=diagnosis-keys\n-services.distribution.api.parameters-path=configuration\n-services.distribution.api.parameters-exposure-configuration-file-name=exposure_configuration\n-services.distribution.api.parameters-risk-score-classification-file-name=risk_score_classification\n-\n-services.distribution.signature.app-bundle-id=de.rki.coronawarnapp\n-services.distribution.signature.android-package=de.rki.coronawarnapp\n-services.distribution.signature.verification-key-id=\n-services.distribution.signature.verification-key-version=\n-services.distribution.signature.algorithm-oid=1.2.840.10045.4.3.2\n-services.distribution.signature.algorithm-name=SHA256withECDSA\n-services.distribution.signature.file-name=export.sig\n-services.distribution.signature.security-provider=BC\n-\n-spring.flyway.enabled=true\n-# default case is H2 - value will be overwritten by profile cloud or postgres\n-spring.flyway.locations=classpath:db/migration/h2\n-\n-spring.jpa.hibernate.ddl-auto=validate\n-\n-# S3 object store configuration\n-services.distribution.objectstore.access-key=accessKey1\n-services.distribution.objectstore.secret-key=verySecretKey1\n-services.distribution.objectstore.endpoint=http\\://localhost\\:8003\n-services.distribution.objectstore.bucket=cwa\n-services.distribution.objectstore.port=8003\n-services.distribution.objectstore.set-public-read-acl-on-put-object=true\ndiff --git a/services/distribution/src/test/resources/application.yaml b/services/distribution/src/test/resources/application.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/application.yaml\n@@ -0,0 +1,57 @@\n+---\n+logging:\n+ level:\n+ org:\n+ springframework: off\n+ root: info\n+\n+services:\n+ distribution:\n+ output-file-name: index\n+ retention-days: 14\n+ paths:\n+ output: out\n+ privatekey: classpath:certificates/client/private.pem\n+ certificate: classpath:certificates/chain/certificate.crt\n+ tek-export:\n+ file-name: export.bin\n+ file-header: EK Export v1\n+ file-header-width: 16\n+ api:\n+ version-path: version\n+ version-v1: v1\n+ country-path: country\n+ country-germany: DE\n+ date-path: date\n+ hour-path: hour\n+ diagnosis-keys-path: diagnosis-keys\n+ parameters-path: configuration\n+ parameters-exposure-configuration-file-name: exposure_configuration\n+ parameters-risk-score-classification-file-name: risk_score_classification\n+ signature:\n+ app-bundle-id: de.rki.coronawarnapp\n+ android-package: de.rki.coronawarnapp\n+ verification-key-id:\n+ verification-key-version:\n+ algorithm-oid: 1.2.840.10045.4.3.2\n+ algorithm-name: SHA256withECDSA\n+ file-name: export.sig\n+ security-provider: BC\n+ # S3 object store configuration\n+ objectstore:\n+ access-key: ${CWA_OBJECTSTORE_ACCESSKEY:accessKey1}\n+ secret-key: ${CWA_OBJECTSTORE_SECRETKEY:verySecretKey1}\n+ endpoint: ${WA_OBJECTSTORE_ENDPOINT:http\\://localhost\\:8003}\n+ bucket: ${CWA_OBJECTSTORE_BUCKET:cwa}\n+ port: ${CWA_OBJECTSTORE_PORT:8003}\n+ set-public-read-acl-on-put-object: true\n+spring:\n+ main:\n+ banner-mode: off\n+ flyway:\n+ enabled: true\n+# default case is H2 - value will be overwritten by profile cloud or postgres\n+ locations: classpath:db/migration/h2\n+ jpa:\n+ hibernate:\n+ ddl-auto: validate\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigTest.java\ndeleted file mode 100644\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigTest.java\n+++ /dev/null\n@@ -1,59 +0,0 @@\n-package app.coronawarn.server.services.submission.config;\n-\n-import static org.springframework.test.util.AssertionErrors.assertEquals;\n-import static org.springframework.test.util.AssertionErrors.assertNotNull;\n-\n-import java.io.IOException;\n-import java.io.InputStream;\n-import java.util.Properties;\n-import org.junit.jupiter.api.AfterEach;\n-import org.junit.jupiter.api.BeforeEach;\n-import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.api.extension.ExtendWith;\n-import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.context.properties.EnableConfigurationProperties;\n-import org.springframework.test.context.TestPropertySource;\n-import org.springframework.test.context.junit.jupiter.SpringExtension;\n-\n-@ExtendWith(SpringExtension.class)\n-@EnableConfigurationProperties(value = SubmissionServiceConfig.class)\n-@TestPropertySource(\"classpath:application-config-test.properties\")\n-public class SubmissionServiceConfigTest {\n-\n- @Autowired\n- private SubmissionServiceConfig config;\n-\n- private final Properties properties = new Properties();\n-\n- @BeforeEach\n- public void setup() throws IOException {\n- InputStream is = getClass().getClassLoader()\n- .getResourceAsStream(\"application-config-test.properties\");\n- properties.load(is);\n- }\n-\n- @AfterEach\n- public void tearDown() {\n- properties.clear();\n- }\n-\n- @Test\n- void whenDistributionConfigBeanCreatedThenPropertiesLoadedCorrectly() {\n-\n- assertNotNull(\"Configuration should not be null\", config);\n-\n- assertEquals(\"Fake Delay value should be loaded correctly.\",\n- properties.getProperty(\"services.submission.initial_fake_delay_milliseconds\"),\n- String.valueOf(config.getInitialFakeDelayMilliseconds()));\n- assertEquals(\"Fake Delay Moving Average value should be loaded correctly.\",\n- properties.getProperty(\"services.submission.fake_delay_moving_average_samples\"),\n- String.valueOf(config.getFakeDelayMovingAverageSamples()));\n- assertEquals(\"Retention Days should be loaded correctly.\",\n- properties.getProperty(\"services.submission.retention-days\"),\n- String.valueOf(config.getRetentionDays()));\n- assertEquals(\"Max Number of Days value should be loaded correctly.\",\n- properties.getProperty(\"services.submission.payload.max-number-of-keys\"),\n- String.valueOf(config.getMaxNumberOfKeys()));\n-\n- }\n-}\n\\ No newline at end of file\ndiff --git a/services/submission/src/test/resources/application.properties b/services/submission/src/test/resources/application.properties\ndeleted file mode 100644\n--- a/services/submission/src/test/resources/application.properties\n+++ /dev/null\n@@ -1,15 +0,0 @@\n-logging.level.org.springframework=off\n-logging.level.root=off\n-spring.main.banner-mode=off\n-\n-services.submission.initial_fake_delay_milliseconds=1\n-services.submission.fake_delay_moving_average_samples=1\n-\n-spring.flyway.enabled=true\n-# default case is H2 - value will be overwritten by profile cloud or postgres\n-spring.flyway.locations=classpath:db/migration/h2\n-\n-spring.jpa.hibernate.ddl-auto=validate\n-\n-services.submission.retention-days=14\n-services.submission.payload.max-number-of-keys=14\ndiff --git a/services/submission/src/test/resources/application.yaml b/services/submission/src/test/resources/application.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/resources/application.yaml\n@@ -0,0 +1,25 @@\n+---\n+logging:\n+ level:\n+ org:\n+ springframework: off\n+ root: off\n+spring:\n+ main:\n+ banner-mode: off\n+ flyway:\n+ enabled: true\n+ # default case is H2 - value will be overwritten by profile cloud or postgres\n+ locations: classpath:db/migration/h2\n+\n+ jpa:\n+ hibernate:\n+ ddl-auto: validate\n+\n+services:\n+ submission:\n+ initial-fake-delay-milliseconds: 1\n+ fake-delay-moving-average-samples: 1\n+ retention-days: 14\n+ payload:\n+ max-number-of-keys: 14\n", "problem_statement": "Switch application*.properties files to Yaml\nLet's switch over to YAML for better readability.\r\n\r\nAffected files:\r\n common/persistence/src/test/resources/application.properties\r\n services/submission/src/main/resources/application.properties\r\n services/submission/src/test/resources/application.properties\r\n services/distribution/src/main/resources/application.properties\r\n services/distribution/src/test/resources/application.properties\r\n services/submission/src/main/resources/application-dev.properties\r\n services/distribution/src/main/resources/application-dev.properties\r\n services/submission/src/main/resources/application-cloud.properties\r\n services/distribution/src/main/resources/application-cloud.properties\r\n services/distribution/src/main/resources/application-testdata.properties\n", "hints_text": "", "created_at": "2020-05-23T21:07:14Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 299, "instance_id": "corona-warn-app__cwa-server-299", "issue_numbers": ["298"], "base_commit": "c5991b2fcb894aa4a8eec41c51a2f2cc366a13b5", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidator.java\n@@ -82,7 +82,7 @@ private void validateScore(\n try {\n RiskLevel level = (RiskLevel) propertyDescriptor.getReadMethod().invoke(object);\n \n- if (level == RiskLevel.UNRECOGNIZED || level == RiskLevel.RISK_LEVEL_UNSPECIFIED) {\n+ if (level == RiskLevel.UNRECOGNIZED) {\n this.errors.add(new RiskLevelValidationError(parameter, propertyDescriptor.getName()));\n }\n } catch (IllegalAccessException | InvocationTargetException e) {\ndiff --git a/services/distribution/src/main/resources/master-config/exposure-config.yaml b/services/distribution/src/main/resources/master-config/exposure-config.yaml\n--- a/services/distribution/src/main/resources/master-config/exposure-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/exposure-config.yaml\n@@ -2,7 +2,7 @@\n # Change this file with caution.\n #\n # Weights must be in range of 0.001 to 100\n-# Parameter Scores must be in range of 1 to 8.\n+# Parameter Scores must be in range of 0 to 8.\n #\n # Further documentation:\n # https://developer.apple.com/documentation/exposurenotification/enexposureconfiguration\n@@ -28,31 +28,31 @@ transmission:\n app_defined_8: 8\n \n duration:\n- eq_0_min: 1\n- gt_0_le_5_min: 2\n- gt_5_le_10_min: 3\n+ eq_0_min: 0\n+ gt_0_le_5_min: 1\n+ gt_5_le_10_min: 2\n gt_10_le_15_min: 4\n gt_15_le_20_min: 5\n- gt_20_le_25_min: 6\n- gt_25_le_30_min: 7\n+ gt_20_le_25_min: 7\n+ gt_25_le_30_min: 8\n gt_30_min: 8\n \n days_since_last_exposure:\n ge_14_days: 1\n- ge_12_lt_14_days: 2\n- ge_10_lt_12_days: 3\n- ge_8_lt_10_days: 4\n- ge_6_lt_8_days: 5\n+ ge_12_lt_14_days: 1\n+ ge_10_lt_12_days: 1\n+ ge_8_lt_10_days: 1\n+ ge_6_lt_8_days: 2\n ge_4_lt_6_days: 6\n- ge_2_lt_4_days: 7\n- ge_0_lt_2_days: 8\n+ ge_2_lt_4_days: 8\n+ ge_0_lt_2_days: 6\n \n attenuation:\n- gt_73_dbm: 1\n- gt_63_le_73_dbm: 2\n- gt_51_le_63_dbm: 3\n- gt_33_le_51_dbm: 4\n+ gt_73_dbm: 0\n+ gt_63_le_73_dbm: 0\n+ gt_51_le_63_dbm: 1\n+ gt_33_le_51_dbm: 2\n gt_27_le_33_dbm: 5\n- gt_15_le_27_dbm: 6\n- gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ gt_15_le_27_dbm: 7\n+ gt_10_le_15_dbm: 8\n+ lt_10_dbm: 8\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n@@ -72,7 +72,8 @@ private static Stream createOkTests() {\n private static Stream createFailedTests() {\n return Stream.of(\n ScoreTooHigh(),\n- ScoreNegative(),\n+ // TODO cwa-server/#320 Validate that no attributes are missing in .yaml\n+ // ScoreNegative(),\n WeightNegative(),\n WeightTooHigh()\n ).map(Arguments::of);\n@@ -107,9 +108,8 @@ public static TestWithExpectedResult WeightTooHigh() {\n \n public static TestWithExpectedResult ScoreNegative() {\n return new TestWithExpectedResult(\"score_negative.yaml\")\n- .with(new RiskLevelValidationError(\"transmission\", \"appDefined1\"))\n- .with(new RiskLevelValidationError(\"transmission\", \"appDefined2\"))\n- .with(new RiskLevelValidationError(\"transmission\", \"appDefined3\"));\n+ .with(new RiskLevelValidationError(\"transmission\", \"appDefined1\"))\n+ .with(new RiskLevelValidationError(\"transmission\", \"appDefined3\"));\n }\n \n public static TestWithExpectedResult ScoreTooHigh() {\ndiff --git a/services/distribution/src/test/resources/parameters/score_negative.yaml b/services/distribution/src/test/resources/parameters/score_negative.yaml\n--- a/services/distribution/src/test/resources/parameters/score_negative.yaml\n+++ b/services/distribution/src/test/resources/parameters/score_negative.yaml\n@@ -5,7 +5,7 @@ attenuation_weight: 80\n \n transmission:\n app_defined_1: -2 # not ok, negative\n- app_defined_2: 0 # not ok, unspecified\n+ app_defined_2: 0\n #app_defined_3: 3 # not ok (missing -> unspecified)\n app_defined_4: 5\n app_defined_5: 5\n", "problem_statement": "RKI: Adjust Risk Score Parameters in master config\nRKI decided for the following risk score parameter values:\r\n\r\n```\r\n1 2 3 4 5 6 7 8 // Bucket No.\r\n----------------------------------------------------------\r\n0 1 2 4 5 7 8 8 // Duration\r\n0 0 1 2 5 7 8 8 // Attenuation\r\n1 1 1 1 2 6 8 6 // Days\r\n1 2 3 4 5 6 7 8 // Transmission Risk \r\n```\r\n\n", "hints_text": "Config file that needs updating: [master.yaml](https://github.com/corona-warn-app/cwa-server/blob/master/services/distribution/src/main/resources/exposure-config/master.yaml)", "created_at": "2020-05-25T09:41:14Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 308, "instance_id": "corona-warn-app__cwa-server-308", "issue_numbers": ["179"], "base_commit": "9ef96cbec24163360512f3d4748a248d6eddd078", "patch": "diff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n@@ -36,7 +36,6 @@\n import javax.validation.ConstraintViolation;\n import javax.validation.Validation;\n import javax.validation.Validator;\n-import javax.validation.constraints.Min;\n import javax.validation.constraints.Size;\n import org.hibernate.validator.constraints.Range;\n \n@@ -46,6 +45,14 @@\n @Entity\n @Table(name = \"diagnosis_key\")\n public class DiagnosisKey {\n+\n+ /**\n+ * According to \"Setting Up an Exposure Notification Server\" by Apple, exposure notification servers are expected to\n+ * reject any diagnosis keys that do not have a rolling period of a certain fixed value. See\n+ * https://developer.apple.com/documentation/exposurenotification/setting_up_an_exposure_notification_server\n+ */\n+ public static final int EXPECTED_ROLLING_PERIOD = 144;\n+\n private static final Validator VALIDATOR = Validation.buildDefaultValidatorFactory().getValidator();\n \n @Id\n@@ -58,7 +65,8 @@ public class DiagnosisKey {\n @ValidRollingStartIntervalNumber\n private int rollingStartIntervalNumber;\n \n- @Min(value = 1, message = \"Rolling period must be greater than 0.\")\n+ @Range(min = EXPECTED_ROLLING_PERIOD, max = EXPECTED_ROLLING_PERIOD,\n+ message = \"Rolling period must be \" + EXPECTED_ROLLING_PERIOD + \".\")\n private int rollingPeriod;\n \n @Range(min = 0, max = 8, message = \"Risk level must be between 0 and 8.\")\n@@ -135,7 +143,7 @@ public long getSubmissionTimestamp() {\n * Checks if this diagnosis key falls into the period between now, and the retention threshold.\n *\n * @param daysToRetain the number of days before a key is outdated\n- * @return true, if the rolling start number is in the time span between now, and the given days to retain\n+ * @return true, if the rolling start interval number is within the time between now, and the given days to retain\n * @throws IllegalArgumentException if {@code daysToRetain} is negative.\n */\n public boolean isYoungerThanRetentionThreshold(int daysToRetain) {\n@@ -155,7 +163,7 @@ public boolean isYoungerThanRetentionThreshold(int daysToRetain) {\n *\n *
\n *
Risk level must be between 0 and 8\n- *
Rolling start number must be greater than 0\n+ *
Rolling start interval number must be greater than 0\n *
Rolling start number cannot be in the future\n *
Rolling period must be positive number\n *
Key data must be byte array of length 16\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n@@ -21,7 +21,6 @@\n \n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.Builder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.FinalBuilder;\n-import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.RollingPeriodBuilder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.RollingStartIntervalNumberBuilder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.TransmissionRiskLevelBuilder;\n \n@@ -38,14 +37,14 @@\n * An instance of this builder can be retrieved by calling {@link DiagnosisKey#builder()}. A {@link DiagnosisKey} can\n * then be build by either providing the required member values or by passing the respective protocol buffer object.\n */\n-public class DiagnosisKeyBuilder implements Builder, RollingStartIntervalNumberBuilder,\n- RollingPeriodBuilder, TransmissionRiskLevelBuilder, FinalBuilder {\n+public class DiagnosisKeyBuilder implements\n+ Builder, RollingStartIntervalNumberBuilder, TransmissionRiskLevelBuilder, FinalBuilder {\n \n private static final Logger logger = LoggerFactory.getLogger(DiagnosisKeyBuilder.class);\n \n private byte[] keyData;\n private int rollingStartIntervalNumber;\n- private int rollingPeriod;\n+ private int rollingPeriod = DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n private int transmissionRiskLevel;\n private long submissionTimestamp = -1L;\n \n@@ -59,17 +58,11 @@ public RollingStartIntervalNumberBuilder withKeyData(byte[] keyData) {\n }\n \n @Override\n- public RollingPeriodBuilder withRollingStartIntervalNumber(int rollingStartIntervalNumber) {\n+ public TransmissionRiskLevelBuilder withRollingStartIntervalNumber(int rollingStartIntervalNumber) {\n this.rollingStartIntervalNumber = rollingStartIntervalNumber;\n return this;\n }\n \n- @Override\n- public TransmissionRiskLevelBuilder withRollingPeriod(int rollingPeriod) {\n- this.rollingPeriod = rollingPeriod;\n- return this;\n- }\n-\n @Override\n public FinalBuilder withTransmissionRiskLevel(int transmissionRiskLevel) {\n this.transmissionRiskLevel = transmissionRiskLevel;\n@@ -81,8 +74,8 @@ public FinalBuilder fromProtoBuf(TemporaryExposureKey protoBufObject) {\n return this\n .withKeyData(protoBufObject.getKeyData().toByteArray())\n .withRollingStartIntervalNumber(protoBufObject.getRollingStartIntervalNumber())\n- .withRollingPeriod(protoBufObject.getRollingPeriod())\n- .withTransmissionRiskLevel(protoBufObject.getTransmissionRiskLevel());\n+ .withTransmissionRiskLevel(protoBufObject.getTransmissionRiskLevel())\n+ .withRollingPeriod(protoBufObject.getRollingPeriod());\n }\n \n @Override\n@@ -91,6 +84,12 @@ public FinalBuilder withSubmissionTimestamp(long submissionTimestamp) {\n return this;\n }\n \n+ @Override\n+ public FinalBuilder withRollingPeriod(int rollingPeriod) {\n+ this.rollingPeriod = rollingPeriod;\n+ return this;\n+ }\n+\n @Override\n public DiagnosisKey build() {\n if (submissionTimestamp < 0) {\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilders.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilders.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilders.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilders.java\n@@ -48,25 +48,13 @@ interface Builder {\n interface RollingStartIntervalNumberBuilder {\n \n /**\n- * Adds the specified rolling start number to this builder.\n+ * Adds the specified rolling start interval number to this builder.\n *\n * @param rollingStartIntervalNumber number describing when a key starts. It is equal to\n * startTimeOfKeySinceEpochInSecs / (60 * 10).\n * @return this Builder instance.\n */\n- RollingPeriodBuilder withRollingStartIntervalNumber(int rollingStartIntervalNumber);\n- }\n-\n- interface RollingPeriodBuilder {\n-\n- /**\n- * Adds the specified rolling period to this builder.\n- *\n- * @param rollingPeriod Number describing how long a key is valid. It is expressed in increments\n- * of 10 minutes (e.g. 144 for 24 hours).\n- * @return this Builder instance.\n- */\n- TransmissionRiskLevelBuilder withRollingPeriod(int rollingPeriod);\n+ TransmissionRiskLevelBuilder withRollingStartIntervalNumber(int rollingStartIntervalNumber);\n }\n \n interface TransmissionRiskLevelBuilder {\n@@ -90,6 +78,16 @@ interface FinalBuilder {\n */\n FinalBuilder withSubmissionTimestamp(long submissionTimestamp);\n \n+ /**\n+ * Adds the specified rolling period to this builder. If not specified, the rolling period defaults to {@link\n+ * DiagnosisKey#EXPECTED_ROLLING_PERIOD}\n+ *\n+ * @param rollingPeriod Number describing how long a key is valid. It is expressed in increments of 10 minutes (e.g.\n+ * 144 for 24 hours).\n+ * @return this Builder instance.\n+ */\n+ FinalBuilder withRollingPeriod(int rollingPeriod);\n+\n /**\n * Builds a {@link DiagnosisKey} instance. If no submission timestamp has been specified it will be set to \"now\" as\n * hours since epoch.\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidRollingStartIntervalNumber.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidRollingStartIntervalNumber.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidRollingStartIntervalNumber.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidRollingStartIntervalNumber.java\n@@ -35,7 +35,7 @@\n *\n * @return the error message\n */\n- String message() default \"Rolling start number must be greater 0 and cannot be in the future.\";\n+ String message() default \"Rolling start interval number must be greater 0 and cannot be in the future.\";\n \n /**\n * Groups.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n@@ -71,7 +71,7 @@ public class TestDataGeneration implements ApplicationRunner {\n // The submission timestamp is counted in 1 hour intervals since epoch\n private static final long ONE_HOUR_INTERVAL_SECONDS = TimeUnit.HOURS.toSeconds(1);\n \n- // The rolling start number is counted in 10 minute intervals since epoch\n+ // The rolling start interval number is counted in 10 minute intervals since epoch\n private static final long TEN_MINUTES_INTERVAL_SECONDS = TimeUnit.MINUTES.toSeconds(10);\n \n /**\n@@ -166,7 +166,6 @@ private DiagnosisKey generateDiagnosisKey(long submissionTimestamp) {\n return DiagnosisKey.builder()\n .withKeyData(generateDiagnosisKeyBytes())\n .withRollingStartIntervalNumber(generateRollingStartIntervalNumber(submissionTimestamp))\n- .withRollingPeriod(generateRollingPeriod())\n .withTransmissionRiskLevel(generateTransmissionRiskLevel())\n .withSubmissionTimestamp(submissionTimestamp)\n .build();\n@@ -182,8 +181,8 @@ private byte[] generateDiagnosisKeyBytes() {\n }\n \n /**\n- * Returns a random rolling start number (timestamp since when a key was active, represented by a 10 minute interval\n- * counter.) between a specific submission timestamp and the beginning of the retention period.\n+ * Returns a random rolling start interval number (timestamp since when a key was active, represented by a 10 minute\n+ * interval counter) between a specific submission timestamp and the beginning of the retention period.\n */\n private int generateRollingStartIntervalNumber(long submissionTimestamp) {\n long maxRollingStartIntervalNumber =\n@@ -194,13 +193,6 @@ private int generateRollingStartIntervalNumber(long submissionTimestamp) {\n return Math.toIntExact(getRandomBetween(minRollingStartIntervalNumber, maxRollingStartIntervalNumber));\n }\n \n- /**\n- * Returns a rolling period (number of 10 minute intervals that a key was active for) of 1 day.\n- */\n- private int generateRollingPeriod() {\n- return Math.toIntExact(TimeUnit.DAYS.toSeconds(1) / TEN_MINUTES_INTERVAL_SECONDS);\n- }\n-\n /**\n * Returns a random number between {@link RiskLevel#RISK_LEVEL_LOWEST_VALUE} and {@link\n * RiskLevel#RISK_LEVEL_HIGHEST_VALUE}.\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/ApiExceptionHandler.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/ApiExceptionHandler.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/ApiExceptionHandler.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/ApiExceptionHandler.java\n@@ -20,8 +20,8 @@\n package app.coronawarn.server.services.submission.controller;\n \n import app.coronawarn.server.common.persistence.exception.InvalidDiagnosisKeyException;\n-import app.coronawarn.server.services.submission.exception.InvalidPayloadException;\n import com.google.protobuf.InvalidProtocolBufferException;\n+import javax.validation.ConstraintViolationException;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n import org.springframework.http.HttpStatus;\n@@ -50,7 +50,7 @@ public void bindingExceptions(Exception ex, WebRequest wr) {\n logger.error(\"Binding failed {}\", wr.getDescription(false), ex);\n }\n \n- @ExceptionHandler({InvalidDiagnosisKeyException.class, InvalidPayloadException.class})\n+ @ExceptionHandler({InvalidDiagnosisKeyException.class, ConstraintViolationException.class})\n @ResponseStatus(HttpStatus.BAD_REQUEST)\n public void diagnosisKeyExceptions(Exception ex, WebRequest wr) {\n logger.error(\"Erroneous Submission Payload {}\", wr.getDescription(false), ex);\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n@@ -24,7 +24,7 @@\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n import app.coronawarn.server.common.protocols.internal.SubmissionPayload;\n import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n-import app.coronawarn.server.services.submission.exception.InvalidPayloadException;\n+import app.coronawarn.server.services.submission.validation.ValidSubmissionPayload;\n import app.coronawarn.server.services.submission.verification.TanVerifier;\n import java.util.ArrayList;\n import java.util.List;\n@@ -39,6 +39,7 @@\n import org.springframework.http.HttpStatus;\n import org.springframework.http.ResponseEntity;\n import org.springframework.util.StopWatch;\n+import org.springframework.validation.annotation.Validated;\n import org.springframework.web.bind.annotation.PostMapping;\n import org.springframework.web.bind.annotation.RequestBody;\n import org.springframework.web.bind.annotation.RequestHeader;\n@@ -48,6 +49,7 @@\n \n @RestController\n @RequestMapping(\"/version/v1\")\n+@Validated\n public class SubmissionController {\n \n private static final Logger logger = LoggerFactory.getLogger(SubmissionController.class);\n@@ -62,7 +64,6 @@ public class SubmissionController {\n private final TanVerifier tanVerifier;\n private final Double fakeDelayMovingAverageSamples;\n private final Integer retentionDays;\n- private final Integer maxNumberOfKeys;\n private Double fakeDelay;\n \n @Autowired\n@@ -73,7 +74,6 @@ public class SubmissionController {\n fakeDelay = submissionServiceConfig.getInitialFakeDelayMilliseconds();\n fakeDelayMovingAverageSamples = submissionServiceConfig.getFakeDelayMovingAverageSamples();\n retentionDays = submissionServiceConfig.getRetentionDays();\n- maxNumberOfKeys = submissionServiceConfig.getMaxNumberOfKeys();\n }\n \n /**\n@@ -86,7 +86,7 @@ public class SubmissionController {\n */\n @PostMapping(SUBMISSION_ROUTE)\n public DeferredResult> submitDiagnosisKey(\n- @RequestBody SubmissionPayload exposureKeys,\n+ @ValidSubmissionPayload @RequestBody SubmissionPayload exposureKeys,\n @RequestHeader(\"cwa-fake\") Integer fake,\n @RequestHeader(\"cwa-authorization\") String tan) {\n if (fake != 0) {\n@@ -147,9 +147,8 @@ private ResponseEntity buildTanInvalidResponseEntity() {\n */\n public void persistDiagnosisKeysPayload(SubmissionPayload protoBufDiagnosisKeys) {\n List protoBufferKeysList = protoBufDiagnosisKeys.getKeysList();\n- validatePayload(protoBufferKeysList);\n-\n List diagnosisKeys = new ArrayList<>();\n+\n for (TemporaryExposureKey protoBufferKey : protoBufferKeysList) {\n DiagnosisKey diagnosisKey = DiagnosisKey.builder().fromProtoBuf(protoBufferKey).build();\n if (diagnosisKey.isYoungerThanRetentionThreshold(retentionDays)) {\n@@ -162,13 +161,6 @@ public void persistDiagnosisKeysPayload(SubmissionPayload protoBufDiagnosisKeys)\n diagnosisKeyService.saveDiagnosisKeys(diagnosisKeys);\n }\n \n- private void validatePayload(List protoBufKeysList) {\n- if (protoBufKeysList.isEmpty() || protoBufKeysList.size() > maxNumberOfKeys) {\n- throw new InvalidPayloadException(\n- String.format(\"Number of keys must be between 1 and %s, but is %s.\", maxNumberOfKeys, protoBufKeysList));\n- }\n- }\n-\n private synchronized void updateFakeDelay(long realRequestDuration) {\n fakeDelay = fakeDelay + (1 / fakeDelayMovingAverageSamples) * (realRequestDuration - fakeDelay);\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/exception/InvalidPayloadException.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/exception/InvalidPayloadException.java\ndeleted file mode 100644\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/exception/InvalidPayloadException.java\n+++ /dev/null\n@@ -1,32 +0,0 @@\n-/*\n- * Corona-Warn-App\n- *\n- * SAP SE and all other contributors /\n- * copyright owners license this file to you under the Apache\n- * License, Version 2.0 (the \"License\"); you may not use this\n- * file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing,\n- * software distributed under the License is distributed on an\n- * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n- * KIND, either express or implied. See the License for the\n- * specific language governing permissions and limitations\n- * under the License.\n- */\n-\n-package app.coronawarn.server.services.submission.exception;\n-\n-/**\n- * Exception thrown to indicate an invalid payload of a\n- * {@link app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey}.\n- */\n-public class InvalidPayloadException extends RuntimeException {\n-\n- public InvalidPayloadException(String message) {\n- super(message);\n- }\n-\n-}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java\n@@ -0,0 +1,148 @@\n+/*\n+ * Corona-Warn-App\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.submission.validation;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n+import app.coronawarn.server.common.protocols.internal.SubmissionPayload;\n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n+import java.lang.annotation.Documented;\n+import java.lang.annotation.ElementType;\n+import java.lang.annotation.Retention;\n+import java.lang.annotation.RetentionPolicy;\n+import java.lang.annotation.Target;\n+import java.util.Arrays;\n+import java.util.List;\n+import java.util.Objects;\n+import javax.validation.Constraint;\n+import javax.validation.ConstraintValidator;\n+import javax.validation.ConstraintValidatorContext;\n+import javax.validation.Payload;\n+\n+@Constraint(validatedBy = ValidSubmissionPayload.SubmissionPayloadValidator.class)\n+@Target({ElementType.PARAMETER})\n+@Retention(RetentionPolicy.RUNTIME)\n+@Documented\n+public @interface ValidSubmissionPayload {\n+\n+ /**\n+ * Error message.\n+ *\n+ * @return the error message\n+ */\n+ String message() default \"Invalid diagnosis key submission payload.\";\n+\n+ /**\n+ * Groups.\n+ *\n+ * @return\n+ */\n+ Class>[] groups() default {};\n+\n+ /**\n+ * Payload.\n+ *\n+ * @return\n+ */\n+ Class extends Payload>[] payload() default {};\n+\n+ class SubmissionPayloadValidator implements\n+ ConstraintValidator {\n+\n+ private final int maxNumberOfKeys;\n+\n+ public SubmissionPayloadValidator(SubmissionServiceConfig submissionServiceConfig) {\n+ maxNumberOfKeys = submissionServiceConfig.getMaxNumberOfKeys();\n+ }\n+\n+ /**\n+ * Validates the following constraints.\n+ *
\n+ *
StartIntervalNumber values from the same {@link SubmissionPayload} shall be unique.
\n+ *
There must be no gaps for StartIntervalNumber values for a user.
\n+ *
There must not be any keys in the {@link SubmissionPayload} have overlapping time windows.
\n+ *
The period of time covered by the data file must not exceed the configured maximum number of days.
\n+ *
\n+ */\n+ @Override\n+ public boolean isValid(SubmissionPayload submissionPayload, ConstraintValidatorContext validatorContext) {\n+ List exposureKeys = submissionPayload.getKeysList();\n+ validatorContext.disableDefaultConstraintViolation();\n+\n+ if (Objects.isNull(exposureKeys)) {\n+ addViolation(validatorContext, \"Field 'keys' points to Null.\");\n+ return false;\n+ }\n+\n+ boolean isValid = checkKeyCollectionSize(exposureKeys, validatorContext);\n+ isValid &= checkUniqueStartIntervalNumbers(exposureKeys, validatorContext);\n+ isValid &= checkNoGapsInTimeWindow(exposureKeys, validatorContext);\n+\n+ return isValid;\n+ }\n+\n+ private void addViolation(ConstraintValidatorContext validatorContext, String message) {\n+ validatorContext.buildConstraintViolationWithTemplate(message).addConstraintViolation();\n+ }\n+\n+ private boolean checkKeyCollectionSize(List exposureKeys,\n+ ConstraintValidatorContext validatorContext) {\n+ if (exposureKeys.isEmpty() || exposureKeys.size() > maxNumberOfKeys) {\n+ addViolation(validatorContext, String.format(\n+ \"Number of keys must be between 1 and %s, but is %s.\", maxNumberOfKeys, exposureKeys.size()));\n+ return false;\n+ }\n+ return true;\n+ }\n+\n+ private boolean checkUniqueStartIntervalNumbers(List exposureKeys,\n+ ConstraintValidatorContext validatorContext) {\n+ Integer[] startIntervalNumbers = exposureKeys.stream()\n+ .mapToInt(TemporaryExposureKey::getRollingStartIntervalNumber).boxed().toArray(Integer[]::new);\n+ long distinctSize = Arrays.stream(startIntervalNumbers)\n+ .distinct()\n+ .count();\n+\n+ if (distinctSize < exposureKeys.size()) {\n+ addViolation(validatorContext, String.format(\n+ \"Duplicate StartIntervalNumber found. StartIntervalNumbers: %s\", startIntervalNumbers));\n+ return false;\n+ }\n+ return true;\n+ }\n+\n+ private boolean checkNoGapsInTimeWindow(List exposureKeys,\n+ ConstraintValidatorContext validatorContext) {\n+ if (exposureKeys.size() < 2) {\n+ return true;\n+ }\n+\n+ Integer[] sortedStartIntervalNumbers = exposureKeys.stream()\n+ .mapToInt(TemporaryExposureKey::getRollingStartIntervalNumber)\n+ .sorted().boxed().toArray(Integer[]::new);\n+\n+ for (int i = 1; i < sortedStartIntervalNumbers.length; i++) {\n+ if (sortedStartIntervalNumbers[i] != sortedStartIntervalNumbers[i - 1] + DiagnosisKey.EXPECTED_ROLLING_PERIOD) {\n+ addViolation(validatorContext, String.format(\n+ \"Subsequent intervals do not align. StartIntervalNumbers: %s\", sortedStartIntervalNumbers));\n+ return false;\n+ }\n+ }\n+ return true;\n+ }\n+ }\n+}\n", "test_patch": "diff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n@@ -38,7 +38,6 @@ class DiagnosisKeyBuilderTest {\n \n private final byte[] expKeyData = \"16-bytelongarray\".getBytes(Charset.defaultCharset());\n private final int expRollingStartIntervalNumber = 73800;\n- private final int expRollingPeriod = 144;\n private final int expTransmissionRiskLevel = 1;\n private final long expSubmissionTimestamp = 2L;\n \n@@ -48,7 +47,7 @@ void buildFromProtoBufObjWithSubmissionTimestamp() {\n .newBuilder()\n .setKeyData(ByteString.copyFrom(this.expKeyData))\n .setRollingStartIntervalNumber(this.expRollingStartIntervalNumber)\n- .setRollingPeriod(this.expRollingPeriod)\n+ .setRollingPeriod(DiagnosisKey.EXPECTED_ROLLING_PERIOD)\n .setTransmissionRiskLevel(this.expTransmissionRiskLevel)\n .build();\n \n@@ -66,7 +65,7 @@ void buildFromProtoBufObjWithoutSubmissionTimestamp() {\n .newBuilder()\n .setKeyData(ByteString.copyFrom(this.expKeyData))\n .setRollingStartIntervalNumber(this.expRollingStartIntervalNumber)\n- .setRollingPeriod(this.expRollingPeriod)\n+ .setRollingPeriod(DiagnosisKey.EXPECTED_ROLLING_PERIOD)\n .setTransmissionRiskLevel(this.expTransmissionRiskLevel)\n .build();\n \n@@ -80,7 +79,6 @@ void buildSuccessivelyWithSubmissionTimestamp() {\n DiagnosisKey actDiagnosisKey = DiagnosisKey.builder()\n .withKeyData(this.expKeyData)\n .withRollingStartIntervalNumber(this.expRollingStartIntervalNumber)\n- .withRollingPeriod(this.expRollingPeriod)\n .withTransmissionRiskLevel(this.expTransmissionRiskLevel)\n .withSubmissionTimestamp(this.expSubmissionTimestamp).build();\n \n@@ -92,18 +90,27 @@ void buildSuccessivelyWithoutSubmissionTimestamp() {\n DiagnosisKey actDiagnosisKey = DiagnosisKey.builder()\n .withKeyData(this.expKeyData)\n .withRollingStartIntervalNumber(this.expRollingStartIntervalNumber)\n- .withRollingPeriod(this.expRollingPeriod)\n .withTransmissionRiskLevel(this.expTransmissionRiskLevel).build();\n \n assertDiagnosisKeyEquals(actDiagnosisKey);\n }\n \n @Test\n- void rollingStartIntervalNumberDoesNotThrowForValid() {\n- assertThatCode(() -> keyWithRollingStartIntervalNumber(4200)).doesNotThrowAnyException();\n+ void buildSuccessivelyWithRollingPeriod() {\n+ DiagnosisKey actDiagnosisKey = DiagnosisKey.builder()\n+ .withKeyData(this.expKeyData)\n+ .withRollingStartIntervalNumber(this.expRollingStartIntervalNumber)\n+ .withTransmissionRiskLevel(this.expTransmissionRiskLevel)\n+ .withSubmissionTimestamp(this.expSubmissionTimestamp)\n+ .withRollingPeriod(DiagnosisKey.EXPECTED_ROLLING_PERIOD).build();\n \n- // Timestamp: 05/16/2020 @ 00:00 in hours\n- assertThatCode(() -> keyWithRollingStartIntervalNumber(441552)).doesNotThrowAnyException();\n+ assertDiagnosisKeyEquals(actDiagnosisKey, this.expSubmissionTimestamp);\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(ints = {4200, 441552})\n+ void rollingStartIntervalNumberDoesNotThrowForValid(int validRollingStartIntervalNumber) {\n+ assertThatCode(() -> keyWithRollingStartIntervalNumber(validRollingStartIntervalNumber)).doesNotThrowAnyException();\n }\n \n @Test\n@@ -111,7 +118,7 @@ void rollingStartIntervalNumberCannotBeInFuture() {\n assertThat(catchThrowable(() -> keyWithRollingStartIntervalNumber(Integer.MAX_VALUE)))\n .isInstanceOf(InvalidDiagnosisKeyException.class)\n .hasMessage(\n- \"[Rolling start number must be greater 0 and cannot be in the future. Invalid Value: \"\n+ \"[Rolling start interval number must be greater 0 and cannot be in the future. Invalid Value: \"\n + Integer.MAX_VALUE + \"]\");\n \n long tomorrow = LocalDate\n@@ -123,7 +130,7 @@ void rollingStartIntervalNumberCannotBeInFuture() {\n .isInstanceOf(InvalidDiagnosisKeyException.class)\n .hasMessage(\n String.format(\n- \"[Rolling start number must be greater 0 and cannot be in the future. Invalid Value: %s]\",\n+ \"[Rolling start interval number must be greater 0 and cannot be in the future. Invalid Value: %s]\",\n tomorrow));\n }\n \n@@ -133,7 +140,6 @@ void failsForInvalidRollingStartIntervalNumber() {\n catchThrowable(() -> DiagnosisKey.builder()\n .withKeyData(this.expKeyData)\n .withRollingStartIntervalNumber(0)\n- .withRollingPeriod(this.expRollingPeriod)\n .withTransmissionRiskLevel(this.expTransmissionRiskLevel).build()\n )\n ).isInstanceOf(InvalidDiagnosisKeyException.class);\n@@ -155,17 +161,17 @@ void transmissionRiskLevelDoesNotThrowForValid(int validRiskLevel) {\n }\n \n @ParameterizedTest\n- @ValueSource(ints = {0, -3})\n- void rollingPeriodMustBeLargerThanZero(int invalidRollingPeriod) {\n+ @ValueSource(ints = {-3, 143, 145})\n+ void rollingPeriodMustBeEpectedValue(int invalidRollingPeriod) {\n assertThat(catchThrowable(() -> keyWithRollingPeriod(invalidRollingPeriod)))\n .isInstanceOf(InvalidDiagnosisKeyException.class)\n- .hasMessage(\n- \"[Rolling period must be greater than 0. Invalid Value: \" + invalidRollingPeriod + \"]\");\n+ .hasMessage(\"[Rolling period must be \" + DiagnosisKey.EXPECTED_ROLLING_PERIOD\n+ + \". Invalid Value: \" + invalidRollingPeriod + \"]\");\n }\n \n @Test\n void rollingPeriodDoesNotThrowForValid() {\n- assertThatCode(() -> keyWithRollingPeriod(144)).doesNotThrowAnyException();\n+ assertThatCode(() -> keyWithRollingPeriod(DiagnosisKey.EXPECTED_ROLLING_PERIOD)).doesNotThrowAnyException();\n }\n \n @ParameterizedTest\n@@ -186,7 +192,6 @@ private DiagnosisKey keyWithKeyData(byte[] expKeyData) {\n return DiagnosisKey.builder()\n .withKeyData(expKeyData)\n .withRollingStartIntervalNumber(expRollingStartIntervalNumber)\n- .withRollingPeriod(expRollingPeriod)\n .withTransmissionRiskLevel(expTransmissionRiskLevel).build();\n }\n \n@@ -194,7 +199,6 @@ private DiagnosisKey keyWithRollingStartIntervalNumber(int expRollingStartInterv\n return DiagnosisKey.builder()\n .withKeyData(expKeyData)\n .withRollingStartIntervalNumber(expRollingStartIntervalNumber)\n- .withRollingPeriod(expRollingPeriod)\n .withTransmissionRiskLevel(expTransmissionRiskLevel).build();\n }\n \n@@ -202,15 +206,14 @@ private DiagnosisKey keyWithRollingPeriod(int expRollingPeriod) {\n return DiagnosisKey.builder()\n .withKeyData(expKeyData)\n .withRollingStartIntervalNumber(expRollingStartIntervalNumber)\n- .withRollingPeriod(expRollingPeriod)\n- .withTransmissionRiskLevel(expTransmissionRiskLevel).build();\n+ .withTransmissionRiskLevel(expTransmissionRiskLevel)\n+ .withRollingPeriod(expRollingPeriod).build();\n }\n \n private DiagnosisKey keyWithRiskLevel(int expTransmissionRiskLevel) {\n return DiagnosisKey.builder()\n .withKeyData(expKeyData)\n .withRollingStartIntervalNumber(expRollingStartIntervalNumber)\n- .withRollingPeriod(expRollingPeriod)\n .withTransmissionRiskLevel(expTransmissionRiskLevel).build();\n }\n \n@@ -226,7 +229,7 @@ private void assertDiagnosisKeyEquals(DiagnosisKey actDiagnosisKey, long expSubm\n assertThat(actDiagnosisKey.getSubmissionTimestamp()).isEqualTo(expSubmissionTimestamp);\n assertThat(actDiagnosisKey.getKeyData()).isEqualTo(this.expKeyData);\n assertThat(actDiagnosisKey.getRollingStartIntervalNumber()).isEqualTo(this.expRollingStartIntervalNumber);\n- assertThat(actDiagnosisKey.getRollingPeriod()).isEqualTo(this.expRollingPeriod);\n+ assertThat(actDiagnosisKey.getRollingPeriod()).isEqualTo(DiagnosisKey.EXPECTED_ROLLING_PERIOD);\n assertThat(actDiagnosisKey.getTransmissionRiskLevel()).isEqualTo(this.expTransmissionRiskLevel);\n }\n }\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java\n@@ -37,7 +37,6 @@ class DiagnosisKeyServiceMockedRepositoryTest {\n \n static final byte[] expKeyData = \"16-bytelongarray\".getBytes(Charset.defaultCharset());\n static final int expRollingStartIntervalNumber = 73800;\n- static final int expRollingPeriod = 144;\n static final int expTransmissionRiskLevel = 1;\n \n @Autowired\n@@ -82,12 +81,12 @@ private void mockInvalidKeyInDb(List keys) {\n \n private DiagnosisKey validKey(long expSubmissionTimestamp) {\n return new DiagnosisKey(expKeyData, expRollingStartIntervalNumber,\n- expRollingPeriod, expTransmissionRiskLevel, expSubmissionTimestamp);\n+ DiagnosisKey.EXPECTED_ROLLING_PERIOD, expTransmissionRiskLevel, expSubmissionTimestamp);\n }\n \n private DiagnosisKey invalidKey(long expSubmissionTimestamp) {\n byte[] expKeyData = \"17--bytelongarray\".getBytes(Charset.defaultCharset());\n return new DiagnosisKey(expKeyData, expRollingStartIntervalNumber,\n- expRollingPeriod, expTransmissionRiskLevel, expSubmissionTimestamp);\n+ DiagnosisKey.EXPECTED_ROLLING_PERIOD, expTransmissionRiskLevel, expSubmissionTimestamp);\n }\n }\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n@@ -137,7 +137,6 @@ void testNoPersistOnValidationError() {\n var keys = List.of(DiagnosisKey.builder()\n .withKeyData(new byte[16])\n .withRollingStartIntervalNumber((int) (OffsetDateTime.now(UTC).toEpochSecond() / 600))\n- .withRollingPeriod(1)\n .withTransmissionRiskLevel(2)\n .withSubmissionTimestamp(0L).build());\n \n@@ -153,7 +152,6 @@ public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissi\n return DiagnosisKey.builder()\n .withKeyData(new byte[16])\n .withRollingStartIntervalNumber(600)\n- .withRollingPeriod(1)\n .withTransmissionRiskLevel(2)\n .withSubmissionTimestamp(submissionTimeStamp).build();\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n@@ -36,7 +36,6 @@ public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissi\n return DiagnosisKey.builder()\n .withKeyData(new byte[16])\n .withRollingStartIntervalNumber(600)\n- .withRollingPeriod(1)\n .withTransmissionRiskLevel(2)\n .withSubmissionTimestamp(submissionTimeStamp).build();\n }\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n@@ -25,6 +25,8 @@\n import org.junit.jupiter.api.Test;\n import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.boot.test.web.client.TestRestTemplate;\n \n @SpringBootTest\n class ServerApplicationTests {\n@@ -32,6 +34,9 @@ class ServerApplicationTests {\n @Autowired\n private SubmissionController controller;\n \n+ @MockBean\n+ private TestRestTemplate testRestTemplate;\n+\n @Test\n void contextLoads() {\n assertThat(this.controller).isNotNull();\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java\n@@ -0,0 +1,136 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.submission.controller;\n+\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.VALID_KEY_DATA_1;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.VALID_KEY_DATA_2;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.VALID_KEY_DATA_3;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.buildOkHeaders;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.buildTemporaryExposureKey;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.createRollingStartIntervalNumber;\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.mockito.ArgumentMatchers.anyString;\n+import static org.mockito.Mockito.when;\n+import static org.springframework.http.HttpStatus.BAD_REQUEST;\n+import static org.springframework.http.HttpStatus.OK;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n+import app.coronawarn.server.services.submission.verification.TanVerifier;\n+import java.util.ArrayList;\n+import java.util.Collection;\n+import org.assertj.core.util.Lists;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.http.ResponseEntity;\n+\n+@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n+class PayloadValidationTest {\n+\n+ @MockBean\n+ private TanVerifier tanVerifier;\n+\n+ @BeforeEach\n+ public void setUpMocks() {\n+ when(tanVerifier.verifyTan(anyString())).thenReturn(true);\n+ }\n+\n+ @Autowired\n+ RequestExecutor executor;\n+\n+ @Test\n+ void check400ResponseStatusForMissingKeys() {\n+ ResponseEntity actResponse = executor.executeRequest(Lists.emptyList(), buildOkHeaders());\n+ assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n+ }\n+\n+ @Test\n+ void check400ResponseStatusForTooManyKeys() {\n+ ResponseEntity actResponse = executor.executeRequest(buildPayloadWithTooManyKeys(), buildOkHeaders());\n+\n+ assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n+ }\n+\n+ private Collection buildPayloadWithTooManyKeys() {\n+ ArrayList tooMany = new ArrayList<>();\n+ for (int i = 0; i <= 20; i++) {\n+ tooMany.add(buildTemporaryExposureKey(VALID_KEY_DATA_1, createRollingStartIntervalNumber(2), 3));\n+ }\n+ return tooMany;\n+ }\n+\n+ @Test\n+ void check400ResponseStatusForDuplicateStartIntervalNumber() {\n+ int rollingStartIntervalNumber = createRollingStartIntervalNumber(2);\n+ var keysWithDuplicateStartIntervalNumber = Lists.list(\n+ buildTemporaryExposureKey(VALID_KEY_DATA_1, rollingStartIntervalNumber, 1),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_2, rollingStartIntervalNumber, 2));\n+\n+ ResponseEntity actResponse = executor.executeRequest(keysWithDuplicateStartIntervalNumber, buildOkHeaders());\n+\n+ assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n+ }\n+\n+ @Test\n+ void check400ResponseStatusForGapsInTimeIntervals() {\n+ int rollingStartIntervalNumber1 = createRollingStartIntervalNumber(6);\n+ int rollingStartIntervalNumber2 = rollingStartIntervalNumber1 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n+ int rollingStartIntervalNumber3 = rollingStartIntervalNumber2 + 2 * DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n+ var keysWithDuplicateStartIntervalNumber = Lists.list(\n+ buildTemporaryExposureKey(VALID_KEY_DATA_1, rollingStartIntervalNumber1, 1),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_3, rollingStartIntervalNumber3, 3),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_2, rollingStartIntervalNumber2, 2));\n+\n+ ResponseEntity actResponse = executor.executeRequest(keysWithDuplicateStartIntervalNumber, buildOkHeaders());\n+\n+ assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n+ }\n+\n+ @Test\n+ void check400ResponseStatusForOverlappingTimeIntervals() {\n+ int rollingStartIntervalNumber1 = createRollingStartIntervalNumber(6);\n+ int rollingStartIntervalNumber2 = rollingStartIntervalNumber1 + (DiagnosisKey.EXPECTED_ROLLING_PERIOD / 2);\n+ var keysWithDuplicateStartIntervalNumber = Lists.list(\n+ buildTemporaryExposureKey(VALID_KEY_DATA_1, rollingStartIntervalNumber1, 1),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_2, rollingStartIntervalNumber2, 2));\n+\n+ ResponseEntity actResponse = executor.executeRequest(keysWithDuplicateStartIntervalNumber, buildOkHeaders());\n+\n+ assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n+ }\n+\n+ @Test\n+ void check200ResponseStatusForValidSubmissionPayload() {\n+ int rollingStartIntervalNumber1 = createRollingStartIntervalNumber(6);\n+ int rollingStartIntervalNumber2 = rollingStartIntervalNumber1 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n+ int rollingStartIntervalNumber3 = rollingStartIntervalNumber2 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n+ var keysWithDuplicateStartIntervalNumber = Lists.list(\n+ buildTemporaryExposureKey(VALID_KEY_DATA_1, rollingStartIntervalNumber1, 1),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_3, rollingStartIntervalNumber3, 3),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_2, rollingStartIntervalNumber2, 2));\n+\n+ ResponseEntity actResponse = executor.executeRequest(keysWithDuplicateStartIntervalNumber, buildOkHeaders());\n+\n+ assertThat(actResponse.getStatusCode()).isEqualTo(OK);\n+ }\n+}\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n@@ -0,0 +1,99 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.submission.controller;\n+\n+import static java.time.ZoneOffset.UTC;\n+\n+import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n+import app.coronawarn.server.common.protocols.internal.SubmissionPayload;\n+import com.google.protobuf.ByteString;\n+import java.net.URI;\n+import java.time.Instant;\n+import java.time.LocalDate;\n+import java.util.Collection;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.test.web.client.TestRestTemplate;\n+import org.springframework.http.HttpHeaders;\n+import org.springframework.http.HttpMethod;\n+import org.springframework.http.MediaType;\n+import org.springframework.http.RequestEntity;\n+import org.springframework.http.ResponseEntity;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * RequestExecutor executes requests against the diagnosis key submission endpoint and holds a various methods for test\n+ * request generation.\n+ */\n+@Component\n+public class RequestExecutor {\n+ public static final String VALID_KEY_DATA_1 = \"testKey111111111\";\n+ public static final String VALID_KEY_DATA_2 = \"testKey222222222\";\n+ public static final String VALID_KEY_DATA_3 = \"testKey333333333\";\n+ private static final URI SUBMISSION_URL = URI.create(\"/version/v1/diagnosis-keys\");\n+ private final TestRestTemplate testRestTemplate;\n+\n+ @Autowired\n+ public RequestExecutor(TestRestTemplate testRestTemplate) {\n+ this.testRestTemplate = testRestTemplate;\n+ }\n+\n+ public ResponseEntity executeRequest(Collection keys, HttpHeaders headers) {\n+ SubmissionPayload body = SubmissionPayload.newBuilder().addAllKeys(keys).build();\n+ RequestEntity request =\n+ new RequestEntity<>(body, headers, HttpMethod.POST, SUBMISSION_URL);\n+ return testRestTemplate.postForEntity(SUBMISSION_URL, request, Void.class);\n+ }\n+\n+ public static HttpHeaders buildOkHeaders() {\n+ HttpHeaders headers = setCwaAuthHeader(setContentTypeProtoBufHeader(new HttpHeaders()));\n+\n+ return setCwaFakeHeader(headers, \"0\");\n+ }\n+\n+ public static HttpHeaders setContentTypeProtoBufHeader(HttpHeaders headers) {\n+ headers.setContentType(MediaType.valueOf(\"application/x-protobuf\"));\n+ return headers;\n+ }\n+\n+ public static HttpHeaders setCwaAuthHeader(HttpHeaders headers) {\n+ headers.set(\"cwa-authorization\", \"TAN okTan\");\n+ return headers;\n+ }\n+\n+ public static HttpHeaders setCwaFakeHeader(HttpHeaders headers, String value) {\n+ headers.set(\"cwa-fake\", value);\n+ return headers;\n+ }\n+\n+ public static TemporaryExposureKey buildTemporaryExposureKey(\n+ String keyData, int rollingStartIntervalNumber, int transmissionRiskLevel) {\n+ return TemporaryExposureKey.newBuilder()\n+ .setKeyData(ByteString.copyFromUtf8(keyData))\n+ .setRollingStartIntervalNumber(rollingStartIntervalNumber)\n+ .setTransmissionRiskLevel(transmissionRiskLevel).build();\n+ }\n+\n+ public static int createRollingStartIntervalNumber(Integer daysAgo) {\n+ return Math.toIntExact(LocalDate\n+ .ofInstant(Instant.now(), UTC)\n+ .minusDays(daysAgo).atStartOfDay()\n+ .toEpochSecond(UTC) / (60 * 10));\n+ }\n+}\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n@@ -19,7 +19,15 @@\n \n package app.coronawarn.server.services.submission.controller;\n \n-import static java.time.ZoneOffset.UTC;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.VALID_KEY_DATA_1;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.VALID_KEY_DATA_2;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.VALID_KEY_DATA_3;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.buildOkHeaders;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.buildTemporaryExposureKey;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.createRollingStartIntervalNumber;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.setContentTypeProtoBufHeader;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.setCwaAuthHeader;\n+import static app.coronawarn.server.services.submission.controller.RequestExecutor.setCwaFakeHeader;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.mockito.Mockito.any;\n import static org.mockito.Mockito.anyString;\n@@ -36,12 +44,10 @@\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n-import app.coronawarn.server.common.protocols.internal.SubmissionPayload;\n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n import app.coronawarn.server.services.submission.verification.TanVerifier;\n import com.google.protobuf.ByteString;\n import java.net.URI;\n-import java.time.Instant;\n-import java.time.LocalDate;\n import java.util.ArrayList;\n import java.util.Arrays;\n import java.util.Collection;\n@@ -63,8 +69,6 @@\n import org.springframework.http.HttpHeaders;\n import org.springframework.http.HttpMethod;\n import org.springframework.http.HttpStatus;\n-import org.springframework.http.MediaType;\n-import org.springframework.http.RequestEntity;\n import org.springframework.http.ResponseEntity;\n \n @SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n@@ -81,6 +85,12 @@ class SubmissionControllerTest {\n @Autowired\n private TestRestTemplate testRestTemplate;\n \n+ @Autowired\n+ private RequestExecutor executor;\n+\n+ @Autowired\n+ private SubmissionServiceConfig config;\n+\n @BeforeEach\n public void setUpMocks() {\n when(tanVerifier.verifyTan(anyString())).thenReturn(true);\n@@ -88,33 +98,13 @@ public void setUpMocks() {\n \n @Test\n void checkResponseStatusForValidParameters() {\n- ResponseEntity actResponse =\n- executeRequest(buildPayloadWithMultipleKeys(), buildOkHeaders());\n-\n+ ResponseEntity actResponse = executor.executeRequest(buildPayloadWithMultipleKeys(), buildOkHeaders());\n assertThat(actResponse.getStatusCode()).isEqualTo(OK);\n }\n \n @Test\n void check400ResponseStatusForInvalidParameters() {\n- ResponseEntity actResponse =\n- executeRequest(buildPayloadWithInvalidKey(), buildOkHeaders());\n-\n- assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n- }\n-\n- @Test\n- void check400ResponseStatusForMissingKeys() {\n- ResponseEntity actResponse =\n- executeRequest(new ArrayList<>(), buildOkHeaders());\n-\n- assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n- }\n-\n- @Test\n- void check400ResponseStatusForTooManyKeys() {\n- ResponseEntity actResponse =\n- executeRequest(buildPayloadWithTooManyKeys(), buildOkHeaders());\n-\n+ ResponseEntity actResponse = executor.executeRequest(buildPayloadWithInvalidKey(), buildOkHeaders());\n assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n }\n \n@@ -123,7 +113,7 @@ void singleKeyWithOutdatedRollingStartIntervalNumberDoesNotGetSaved() {\n Collection keys = buildPayloadWithSingleOutdatedKey();\n ArgumentCaptor> argument = ArgumentCaptor.forClass(Collection.class);\n \n- executeRequest(keys, buildOkHeaders());\n+ executor.executeRequest(keys, buildOkHeaders());\n \n verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(argument.capture());\n assertThat(argument.getValue()).isEmpty();\n@@ -136,7 +126,7 @@ void keysWithOutdatedRollingStartIntervalNumberDoNotGetSaved() {\n keys.add(outdatedKey);\n ArgumentCaptor> argument = ArgumentCaptor.forClass(Collection.class);\n \n- executeRequest(keys, buildOkHeaders());\n+ executor.executeRequest(keys, buildOkHeaders());\n \n verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(argument.capture());\n keys.remove(outdatedKey);\n@@ -148,7 +138,7 @@ void checkSaveOperationCallForValidParameters() {\n Collection keys = buildPayloadWithMultipleKeys();\n ArgumentCaptor> argument = ArgumentCaptor.forClass(Collection.class);\n \n- executeRequest(keys, buildOkHeaders());\n+ executor.executeRequest(keys, buildOkHeaders());\n \n verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(argument.capture());\n assertElementsCorrespondToEachOther(keys, argument.getValue());\n@@ -157,7 +147,7 @@ void checkSaveOperationCallForValidParameters() {\n @ParameterizedTest\n @MethodSource(\"createIncompleteHeaders\")\n void badRequestIfCwaHeadersMissing(HttpHeaders headers) {\n- ResponseEntity actResponse = executeRequest(buildPayloadWithOneKey(), headers);\n+ ResponseEntity actResponse = executor.executeRequest(buildPayloadWithOneKey(), headers);\n \n verify(diagnosisKeyService, never()).saveDiagnosisKeys(any());\n assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n@@ -197,8 +187,7 @@ private static Stream createDeniedHttpMethods() {\n void invalidTanHandling() {\n when(tanVerifier.verifyTan(anyString())).thenReturn(false);\n \n- ResponseEntity actResponse =\n- executeRequest(buildPayloadWithOneKey(), buildOkHeaders());\n+ ResponseEntity actResponse = executor.executeRequest(buildPayloadWithOneKey(), buildOkHeaders());\n \n verify(diagnosisKeyService, never()).saveDiagnosisKeys(any());\n assertThat(actResponse.getStatusCode()).isEqualTo(FORBIDDEN);\n@@ -209,90 +198,44 @@ void fakeRequestHandling() {\n HttpHeaders headers = buildOkHeaders();\n setCwaFakeHeader(headers, \"1\");\n \n- ResponseEntity actResponse = executeRequest(buildPayloadWithOneKey(), headers);\n+ ResponseEntity actResponse = executor.executeRequest(buildPayloadWithOneKey(), headers);\n \n verify(diagnosisKeyService, never()).saveDiagnosisKeys(any());\n assertThat(actResponse.getStatusCode()).isEqualTo(OK);\n }\n \n- private static HttpHeaders buildOkHeaders() {\n- HttpHeaders headers = setCwaAuthHeader(setContentTypeProtoBufHeader(new HttpHeaders()));\n-\n- return setCwaFakeHeader(headers, \"0\");\n- }\n-\n- private static HttpHeaders setContentTypeProtoBufHeader(HttpHeaders headers) {\n- headers.setContentType(MediaType.valueOf(\"application/x-protobuf\"));\n- return headers;\n- }\n-\n- private static HttpHeaders setCwaAuthHeader(HttpHeaders headers) {\n- headers.set(\"cwa-authorization\", \"TAN okTan\");\n- return headers;\n- }\n-\n- private static HttpHeaders setCwaFakeHeader(HttpHeaders headers, String value) {\n- headers.set(\"cwa-fake\", value);\n- return headers;\n- }\n-\n private static Collection buildPayloadWithOneKey() {\n- return Collections.singleton(buildTemporaryExposureKey(\"testKey111111111\", 1, 2, 3));\n+ return Collections.singleton(buildTemporaryExposureKey(VALID_KEY_DATA_1, 1, 3));\n }\n \n- private static Collection buildPayloadWithMultipleKeys() {\n+ private Collection buildPayloadWithMultipleKeys() {\n+ int rollingStartIntervalNumber1 = createRollingStartIntervalNumber(config.getRetentionDays() - 1);\n+ int rollingStartIntervalNumber2 = rollingStartIntervalNumber1 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n+ int rollingStartIntervalNumber3 = rollingStartIntervalNumber2 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n return Stream.of(\n- buildTemporaryExposureKey(\"testKey111111111\", createRollingStartIntervalNumber(2), 2, 3),\n- buildTemporaryExposureKey(\"testKey222222222\", createRollingStartIntervalNumber(4), 5, 6),\n- buildTemporaryExposureKey(\"testKey333333333\", createRollingStartIntervalNumber(10), 8, 8))\n+ buildTemporaryExposureKey(VALID_KEY_DATA_1, rollingStartIntervalNumber1, 3),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_2, rollingStartIntervalNumber3, 6),\n+ buildTemporaryExposureKey(VALID_KEY_DATA_3, rollingStartIntervalNumber2, 8))\n .collect(Collectors.toCollection(ArrayList::new));\n }\n \n- private static Collection buildPayloadWithSingleOutdatedKey() {\n+ private Collection buildPayloadWithSingleOutdatedKey() {\n TemporaryExposureKey outdatedKey = createOutdatedKey();\n return Stream.of(outdatedKey).collect(Collectors.toCollection(ArrayList::new));\n }\n \n- private static TemporaryExposureKey createOutdatedKey() {\n+ private TemporaryExposureKey createOutdatedKey() {\n return TemporaryExposureKey.newBuilder()\n- .setKeyData(ByteString.copyFromUtf8(\"testKey222222222\"))\n- .setRollingStartIntervalNumber(createRollingStartIntervalNumber(99))\n- .setRollingPeriod(10)\n+ .setKeyData(ByteString.copyFromUtf8(VALID_KEY_DATA_2))\n+ .setRollingStartIntervalNumber(createRollingStartIntervalNumber(config.getRetentionDays()))\n+ .setRollingPeriod(DiagnosisKey.EXPECTED_ROLLING_PERIOD)\n .setTransmissionRiskLevel(5).build();\n }\n-\n- private Collection buildPayloadWithTooManyKeys() {\n- ArrayList tooMany = new ArrayList<>();\n- for (int i = 0; i <= 99; i++) {\n- tooMany.add(\n- buildTemporaryExposureKey(\"testKey111111111\", createRollingStartIntervalNumber(2), 2, 3));\n- }\n-\n- return tooMany;\n- }\n-\n private static Collection buildPayloadWithInvalidKey() {\n return Stream.of(\n- buildTemporaryExposureKey(\"testKey111111111\", createRollingStartIntervalNumber(2), 2, 999))\n+ buildTemporaryExposureKey(VALID_KEY_DATA_1, createRollingStartIntervalNumber(2), 999))\n .collect(Collectors.toCollection(ArrayList::new));\n }\n-\n- private static int createRollingStartIntervalNumber(Integer daysAgo) {\n- return Math.toIntExact(LocalDate\n- .ofInstant(Instant.now(), UTC)\n- .minusDays(daysAgo).atStartOfDay()\n- .toEpochSecond(UTC) / (60 * 10));\n- }\n-\n- private static TemporaryExposureKey buildTemporaryExposureKey(\n- String keyData, int rollingStartIntervalNumber, int rollingPeriod, int transmissionRiskLevel) {\n- return TemporaryExposureKey.newBuilder()\n- .setKeyData(ByteString.copyFromUtf8(keyData))\n- .setRollingStartIntervalNumber(rollingStartIntervalNumber)\n- .setRollingPeriod(rollingPeriod)\n- .setTransmissionRiskLevel(transmissionRiskLevel).build();\n- }\n-\n private void assertElementsCorrespondToEachOther\n (Collection submittedKeys, Collection keyEntities) {\n Set expKeys = submittedKeys.stream()\n@@ -307,11 +250,4 @@ private static TemporaryExposureKey buildTemporaryExposureKey(\n .contains(anActKey)\n );\n }\n-\n- private ResponseEntity executeRequest(Collection keys, HttpHeaders headers) {\n- SubmissionPayload body = SubmissionPayload.newBuilder().addAllKeys(keys).build();\n- RequestEntity request =\n- new RequestEntity<>(body, headers, HttpMethod.POST, SUBMISSION_URL);\n- return testRestTemplate.postForEntity(SUBMISSION_URL, request, Void.class);\n- }\n }\n", "problem_statement": "Apple's Proposal for Exposure Key Validation\n#92 Current Implementation\r\n\r\nWe used sensible assumptions for key validation.\r\n\r\n## Suggested Enhancement\r\n\r\n[Apple proposes](https://developer.apple.com/documentation/exposurenotification/setting_up_an_exposure_notification_server?changes=latest_beta): \r\n\r\n> An EN server must reject invalid key files uploaded from a client app. Uploaded key data is considered invalid if:\r\n>\r\n> Any ENIntervalNumber values from the same user are not unique\r\n> \r\n> There are any gaps in the ENIntervalNumber values for a user\r\n> \r\n> Any keys in the file have overlapping time windows\r\n> \r\n> The period of time covered by the data file exceeds 14 days\r\n> \r\n> The TEKRollingPeriod value is not 144\r\n> \r\n> You may optionally want to validate the clock time the device submits.\r\n\r\n## Expected Benefits\r\n\r\nAdherence to reference implementations.\n", "hints_text": "Part of https://github.com/corona-warn-app/cwa-server/issues/168", "created_at": "2020-05-25T20:36:01Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 346, "instance_id": "corona-warn-app__cwa-server-346", "issue_numbers": ["329"], "base_commit": "92f3c9bd98420cd26c4216cace3e481874be6140", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n@@ -129,7 +129,7 @@ public void putObject(LocalFile localFile)\n *\n * @param prefix the prefix, e.g. my/folder/\n */\n- public List deleteObjectsWithPrefix(String prefix)\n+ public void deleteObjectsWithPrefix(String prefix)\n throws MinioException, GeneralSecurityException, IOException {\n List toDelete = getObjectsWithPrefix(prefix)\n .stream()\n@@ -144,9 +144,9 @@ public List deleteObjectsWithPrefix(String prefix)\n errors.add(deleteErrorResult.get());\n }\n \n- logger.info(\"Deletion result: {}\", errors.size());\n-\n- return errors;\n+ if (!errors.isEmpty()) {\n+ throw new MinioException(\"Can't delete files, number of errors: \" + errors.size());\n+ }\n }\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n@@ -0,0 +1,90 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.Api;\n+import io.minio.errors.MinioException;\n+import java.io.IOException;\n+import java.io.UncheckedIOException;\n+import java.security.GeneralSecurityException;\n+import java.time.LocalDate;\n+import java.time.ZoneOffset;\n+import java.time.format.DateTimeFormatter;\n+import java.util.List;\n+import java.util.regex.Matcher;\n+import java.util.regex.Pattern;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * Creates an S3RetentionPolicy object, which applies the retention policy to the S3 compatible storage.\n+ */\n+@Component\n+public class S3RetentionPolicy {\n+\n+ private final ObjectStoreAccess objectStoreAccess;\n+ private final Api api;\n+\n+ @Autowired\n+ public S3RetentionPolicy(ObjectStoreAccess objectStoreAccess, DistributionServiceConfig distributionServiceConfig) {\n+ this.objectStoreAccess = objectStoreAccess;\n+ this.api = distributionServiceConfig.getApi();\n+ }\n+\n+ /**\n+ * Deletes all diagnosis-key files from S3 that are older than retentionDays.\n+ *\n+ * @param retentionDays the number of days, that files should be retained on S3.\n+ */\n+ public void applyRetentionPolicy(int retentionDays) throws MinioException, GeneralSecurityException, IOException {\n+ List diagnosisKeysObjects = objectStoreAccess.getObjectsWithPrefix(\"version/v1/\"\n+ + api.getDiagnosisKeysPath() + \"/\"\n+ + api.getCountryPath() + \"/\"\n+ + api.getCountryGermany() + \"/\"\n+ + api.getDatePath() + \"/\");\n+ final String regex = \".*([0-9]{4}-[0-9]{2}-[0-9]{2}).*\";\n+ final Pattern pattern = Pattern.compile(regex);\n+\n+ final LocalDate cutOffDate = LocalDate.now(ZoneOffset.UTC).minusDays(retentionDays);\n+\n+ diagnosisKeysObjects.stream()\n+ .filter(diagnosisKeysObject -> {\n+ Matcher matcher = pattern.matcher(diagnosisKeysObject.getObjectName());\n+ return matcher.matches() && LocalDate.parse(matcher.group(1), DateTimeFormatter.ISO_LOCAL_DATE)\n+ .isBefore(cutOffDate);\n+ })\n+ .forEach(this::deleteDiagnosisKey);\n+ }\n+\n+ /**\n+ * Java stream do not support checked exceptions within streams. This helper method rethrows them as unchecked\n+ * expressions, so they can be passed up to the Retention Policy.\n+ *\n+ * @param diagnosisKey the diagnosis key, that should be deleted.\n+ */\n+ public void deleteDiagnosisKey(S3Object diagnosisKey) {\n+ try {\n+ objectStoreAccess.deleteObjectsWithPrefix(diagnosisKey.getObjectName());\n+ } catch (Exception e) {\n+ throw new UncheckedIOException(new IOException(e));\n+ }\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicy.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicy.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicy.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/RetentionPolicy.java\n@@ -22,6 +22,7 @@\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n import app.coronawarn.server.services.distribution.Application;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.objectstore.S3RetentionPolicy;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n import org.springframework.boot.ApplicationArguments;\n@@ -46,27 +47,32 @@ public class RetentionPolicy implements ApplicationRunner {\n \n private final Integer retentionDays;\n \n+ private final S3RetentionPolicy s3RetentionPolicy;\n+\n /**\n * Creates a new RetentionPolicy.\n */\n RetentionPolicy(DiagnosisKeyService diagnosisKeyService,\n ApplicationContext applicationContext,\n- DistributionServiceConfig distributionServiceConfig) {\n+ DistributionServiceConfig distributionServiceConfig,\n+ S3RetentionPolicy s3RetentionPolicy) {\n this.diagnosisKeyService = diagnosisKeyService;\n this.applicationContext = applicationContext;\n this.retentionDays = distributionServiceConfig.getRetentionDays();\n+ this.s3RetentionPolicy = s3RetentionPolicy;\n }\n \n @Override\n public void run(ApplicationArguments args) {\n try {\n diagnosisKeyService.applyRetentionPolicy(retentionDays);\n+ s3RetentionPolicy.applyRetentionPolicy(retentionDays);\n } catch (Exception e) {\n logger.error(\"Application of retention policy failed.\", e);\n Application.killApplication(applicationContext);\n }\n \n- logger.debug(\"Retention policy applied successfully. Deleted all entries older that {} days.\",\n+ logger.debug(\"Retention policy applied successfully. Deleted all entries older than {} days.\",\n retentionDays);\n }\n }\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java\n@@ -0,0 +1,92 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import static org.mockito.ArgumentMatchers.any;\n+import static org.mockito.ArgumentMatchers.eq;\n+import static org.mockito.Mockito.atLeastOnce;\n+import static org.mockito.Mockito.never;\n+import static org.mockito.Mockito.verify;\n+import static org.mockito.Mockito.when;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.ObjectStore;\n+import io.minio.errors.MinioException;\n+import java.io.IOException;\n+import java.security.GeneralSecurityException;\n+import java.time.LocalDate;\n+import java.util.List;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {S3RetentionPolicy.class, ObjectStore.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class S3RetentionPolicyTest {\n+\n+ @MockBean\n+ private ObjectStoreAccess objectStoreAccess;\n+\n+ @Autowired\n+ private S3RetentionPolicy s3RetentionPolicy;\n+\n+ @Autowired DistributionServiceConfig distributionServiceConfig;\n+\n+ @Test\n+ void shouldDeleteOldFiles() throws IOException, GeneralSecurityException, MinioException {\n+ String expectedFileToBeDeleted = generateFileName(LocalDate.now().minusDays(2));\n+\n+ when(objectStoreAccess.getObjectsWithPrefix(any())).thenReturn(List.of(\n+ new S3Object(expectedFileToBeDeleted),\n+ new S3Object(generateFileName(LocalDate.now())),\n+ new S3Object(\"version/v1/configuration/country/DE/app_config\")));\n+\n+ s3RetentionPolicy.applyRetentionPolicy(1);\n+\n+ verify(objectStoreAccess, atLeastOnce()).deleteObjectsWithPrefix(eq(expectedFileToBeDeleted));\n+ }\n+\n+ @Test\n+ void shouldNotDeleteFilesIfAllAreValid() throws IOException, GeneralSecurityException, MinioException {\n+ when(objectStoreAccess.getObjectsWithPrefix(any())).thenReturn(List.of(\n+ new S3Object(generateFileName(LocalDate.now().minusDays(1))),\n+ new S3Object(generateFileName(LocalDate.now().plusDays(1))),\n+ new S3Object(generateFileName(LocalDate.now())),\n+ new S3Object(\"version/v1/configuration/country/DE/app_config\")));\n+\n+ s3RetentionPolicy.applyRetentionPolicy(1);\n+\n+ verify(objectStoreAccess, never()).deleteObjectsWithPrefix(any());\n+ }\n+\n+ private String generateFileName(LocalDate date) {\n+ var api = distributionServiceConfig.getApi();\n+\n+ return \"version/v1/\" + api.getDiagnosisKeysPath() + \"/\" + api.getCountryPath() + \"/\"\n+ + api.getCountryGermany() + \"/\" + api.getDatePath() + \"/\" + date.toString() + \"/hour/0\";\n+ }\n+}\n", "problem_statement": "Retention: Enforce period on Object Store\nCurrently, the retention period is only enforced for keys on the database, but it should be enforced on the S3 as well.\r\n\r\nTherefore, we need to delete the items on the S3, when the retention policy is reached.\r\n\r\nWhen the retention mechanism is kicked off, and then delete the following keys with the prefix:\r\n`version/v1/diagnosis-keys/country/DE/date/`\r\nWhere RETENTIONDATE is `current date - retention period`.\r\n\r\nIdeally, we should also try to delete older items as well, in case the retention run did not succeed or did not run at all.\n", "hints_text": "I propose to just remove the \"delta upload\" feature from the S3Publisher (see [here](https://github.com/corona-warn-app/cwa-server/blob/master/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java#L75)) and instead just wipe the whole bucket on every distribution run and to upload everything anew. This way, the only place where retention policies need to be applied is the DB as a single source of truth (which is already done) and we remove some moving parts and complexity that could potentially cause problems. Also see review comment [here](https://github.com/corona-warn-app/cwa-server/pull/147#discussion_r426311639).", "created_at": "2020-05-27T15:03:01Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 349, "instance_id": "corona-warn-app__cwa-server-349", "issue_numbers": ["149"], "base_commit": "ef4edb4c92fb9bf65544e22e2b4f2e8f8a55fa97", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n@@ -20,19 +20,17 @@\n package app.coronawarn.server.services.distribution.objectstore;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.ObjectStore;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import io.minio.MinioClient;\n import io.minio.PutObjectOptions;\n import io.minio.Result;\n-import io.minio.errors.InvalidEndpointException;\n-import io.minio.errors.InvalidPortException;\n import io.minio.errors.MinioException;\n import io.minio.messages.DeleteError;\n import io.minio.messages.Item;\n import java.io.IOException;\n import java.security.GeneralSecurityException;\n import java.util.ArrayList;\n+import java.util.HashMap;\n import java.util.List;\n import java.util.Map;\n import java.util.stream.Collectors;\n@@ -58,7 +56,11 @@ public class ObjectStoreAccess {\n \n private static final Logger logger = LoggerFactory.getLogger(ObjectStoreAccess.class);\n \n- private static final String DEFAULT_REGION = \"eu-west-1\";\n+ /**\n+ * Specifies the default maximum amount of time in seconds that a published resource can be considered \"fresh\" when\n+ * held in a cache.\n+ */\n+ public static final int DEFAULT_MAX_CACHE_AGE = 300;\n \n private final boolean isSetPublicReadAclOnPutObject;\n \n@@ -71,14 +73,14 @@ public class ObjectStoreAccess {\n * bucket.\n *\n * @param distributionServiceConfig The config properties\n+ * @param minioClient The client used for interaction with the object store\n * @throws IOException When there were problems creating the S3 client\n * @throws GeneralSecurityException When there were problems creating the S3 client\n * @throws MinioException When there were problems creating the S3 client\n */\n- ObjectStoreAccess(DistributionServiceConfig distributionServiceConfig)\n+ ObjectStoreAccess(DistributionServiceConfig distributionServiceConfig, MinioClient minioClient)\n throws IOException, GeneralSecurityException, MinioException {\n- this.client = createClient(distributionServiceConfig.getObjectStore());\n-\n+ this.client = minioClient;\n this.bucket = distributionServiceConfig.getObjectStore().getBucket();\n this.isSetPublicReadAclOnPutObject = distributionServiceConfig.getObjectStore().isSetPublicReadAclOnPutObject();\n \n@@ -87,38 +89,25 @@ public class ObjectStoreAccess {\n }\n }\n \n- private MinioClient createClient(ObjectStore objectStore)\n- throws InvalidPortException, InvalidEndpointException {\n- if (isSsl(objectStore)) {\n- return new MinioClient(\n- objectStore.getEndpoint(),\n- objectStore.getPort(),\n- objectStore.getAccessKey(), objectStore.getSecretKey(),\n- DEFAULT_REGION,\n- true\n- );\n- } else {\n- return new MinioClient(\n- objectStore.getEndpoint(),\n- objectStore.getPort(),\n- objectStore.getAccessKey(), objectStore.getSecretKey()\n- );\n- }\n- }\n-\n- private boolean isSsl(ObjectStore objectStore) {\n- return objectStore.getEndpoint().startsWith(\"https://\");\n+ /**\n+ * Stores the target file on the S3 and sets cache control headers according to the default maximum age value.\n+ *\n+ * @param localFile The file to be published.\n+ */\n+ public void putObject(LocalFile localFile) throws IOException, GeneralSecurityException, MinioException {\n+ putObject(localFile, DEFAULT_MAX_CACHE_AGE);\n }\n \n /**\n- * Stores the target file on the S3.\n+ * Stores the target file on the S3 and sets cache control headers according to the specified maximum age value.\n *\n- * @param localFile the file to be published\n+ * @param localFile The file to be published.\n+ * @param maxAge A cache control parameter that specifies the maximum amount of time in seconds that a resource can\n+ * be considered \"fresh\" when held in a cache.\n */\n- public void putObject(LocalFile localFile)\n- throws IOException, GeneralSecurityException, MinioException {\n+ public void putObject(LocalFile localFile, int maxAge) throws IOException, GeneralSecurityException, MinioException {\n String s3Key = localFile.getS3Key();\n- PutObjectOptions options = createOptionsFor(localFile);\n+ PutObjectOptions options = createOptionsFor(localFile, maxAge);\n \n logger.info(\"... uploading {}\", s3Key);\n this.client.putObject(bucket, s3Key, localFile.getFile().toString(), options);\n@@ -167,12 +156,14 @@ public List getObjectsWithPrefix(String prefix)\n return list;\n }\n \n- private PutObjectOptions createOptionsFor(LocalFile file) {\n+ private PutObjectOptions createOptionsFor(LocalFile file, int maxAge) {\n var options = new PutObjectOptions(file.getFile().toFile().length(), -1);\n \n+ Map headers = new HashMap<>(Map.of(\"cache-control\", \"public,max-age=\" + maxAge));\n if (this.isSetPublicReadAclOnPutObject) {\n- options.setHeaders(Map.of(\"x-amz-acl\", \"public-read\"));\n+ headers.put(\"x-amz-acl\", \"public-read\");\n }\n+ options.setHeaders(headers);\n \n return options;\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreClientConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreClientConfig.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreClientConfig.java\n@@ -0,0 +1,66 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.ObjectStore;\n+import io.minio.MinioClient;\n+import io.minio.errors.InvalidEndpointException;\n+import io.minio.errors.InvalidPortException;\n+import org.springframework.context.annotation.Bean;\n+import org.springframework.context.annotation.Configuration;\n+\n+/**\n+ * Manages the instantiation of the {@link MinioClient} bean.\n+ */\n+@Configuration\n+public class ObjectStoreClientConfig {\n+\n+ private static final String DEFAULT_REGION = \"eu-west-1\";\n+\n+ @Bean\n+ public MinioClient createMinioClient(DistributionServiceConfig distributionServiceConfig)\n+ throws InvalidPortException, InvalidEndpointException {\n+ return createClient(distributionServiceConfig.getObjectStore());\n+ }\n+\n+ private MinioClient createClient(ObjectStore objectStore)\n+ throws InvalidPortException, InvalidEndpointException {\n+ if (isSsl(objectStore)) {\n+ return new MinioClient(\n+ objectStore.getEndpoint(),\n+ objectStore.getPort(),\n+ objectStore.getAccessKey(), objectStore.getSecretKey(),\n+ DEFAULT_REGION,\n+ true\n+ );\n+ } else {\n+ return new MinioClient(\n+ objectStore.getEndpoint(),\n+ objectStore.getPort(),\n+ objectStore.getAccessKey(), objectStore.getSecretKey()\n+ );\n+ }\n+ }\n+\n+ private boolean isSsl(ObjectStore objectStore) {\n+ return objectStore.getEndpoint().startsWith(\"https://\");\n+ }\n+}\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java\n@@ -0,0 +1,113 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import static java.util.Map.entry;\n+import static org.mockito.ArgumentMatchers.eq;\n+import static org.mockito.Mockito.any;\n+import static org.mockito.Mockito.atLeastOnce;\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.verify;\n+import static org.mockito.Mockito.when;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n+import io.minio.MinioClient;\n+import io.minio.PutObjectOptions;\n+import java.io.File;\n+import java.nio.file.Path;\n+import org.assertj.core.api.Assertions;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.mockito.ArgumentCaptor;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {MinioClient.class}, initializers = ConfigFileApplicationContextInitializer.class)\n+class ObjectStoreAccessUnitTest {\n+\n+ private static final String EXP_S3_KEY = \"fooS3Key\";\n+ private static final String EXP_FILE_CONTENT = \"barFileContent\";\n+\n+ private final DistributionServiceConfig distributionServiceConfig;\n+ private final String expBucketName;\n+ private LocalFile testLocalFile;\n+ private ObjectStoreAccess objectStoreAccess;\n+\n+ @MockBean\n+ private MinioClient minioClient;\n+\n+ @Autowired\n+ public ObjectStoreAccessUnitTest(DistributionServiceConfig distributionServiceConfig) {\n+ this.distributionServiceConfig = distributionServiceConfig;\n+ this.expBucketName = distributionServiceConfig.getObjectStore().getBucket();\n+ }\n+\n+ @BeforeEach\n+ public void setUpMocks() throws Exception {\n+ when(minioClient.bucketExists(any())).thenReturn(true);\n+ this.objectStoreAccess = new ObjectStoreAccess(distributionServiceConfig, minioClient);\n+ this.testLocalFile = setUpLocalFileMock();\n+ }\n+\n+ private LocalFile setUpLocalFileMock() {\n+ var testLocalFile = mock(LocalFile.class);\n+ var testPath = mock(Path.class);\n+\n+ when(testLocalFile.getS3Key()).thenReturn(EXP_S3_KEY);\n+ when(testLocalFile.getFile()).thenReturn(testPath);\n+ when(testPath.toFile()).thenReturn(mock(File.class));\n+ when(testPath.toString()).thenReturn(EXP_FILE_CONTENT);\n+\n+ return testLocalFile;\n+ }\n+\n+ @Test\n+ void testPutObjectSetsDefaultCacheControlHeader() throws Exception {\n+ ArgumentCaptor options = ArgumentCaptor.forClass(PutObjectOptions.class);\n+ var expHeader = entry(\"cache-control\", \"public,max-age=\" + ObjectStoreAccess.DEFAULT_MAX_CACHE_AGE);\n+\n+ objectStoreAccess.putObject(testLocalFile);\n+\n+ verify(minioClient, atLeastOnce())\n+ .putObject(eq(expBucketName), eq(EXP_S3_KEY), eq(EXP_FILE_CONTENT), options.capture());\n+ Assertions.assertThat(options.getValue().headers()).contains(expHeader);\n+ }\n+\n+ @Test\n+ void testPutObjectSetsSpecifiedCacheControlHeader() throws Exception {\n+ ArgumentCaptor options = ArgumentCaptor.forClass(PutObjectOptions.class);\n+ var expMaxAge = 1337;\n+ var expHeader = entry(\"cache-control\", \"public,max-age=\" + expMaxAge);\n+\n+ objectStoreAccess.putObject(testLocalFile, expMaxAge);\n+\n+ verify(minioClient, atLeastOnce())\n+ .putObject(eq(expBucketName), eq(EXP_S3_KEY), eq(EXP_FILE_CONTENT), options.capture());\n+ Assertions.assertThat(options.getValue().headers()).contains(expHeader);\n+ }\n+}\n", "problem_statement": "S3Publisher should set Cache Control Headers\nThe S3Publisher is currently not setting Cache Control Headers. We should cache-control: public, maxage=N\r\n\r\nN depends on the type of file:\r\n- for hours index files, it should be rather low (5 minutes)\r\n- for days index files, it should be higher (2 hours)\r\n- for all generated aggregate files, it should be 24 hours\r\n\r\nE-Tag should already been set, but should also be verified.\n", "hints_text": "For the sake of simplicity, I think we can get away with just setting everything to 5 minutes. In the worst case, we need to expect requests for all available files by all 4 CDN master cache servers every 5 minutes. We serve a peak total of 356\u202c files (1 version index, 1 version OpenAPI JSON, 2 country indices for diagnosis keys and parameters, 1 date index, 14 date aggregates, 14 hour indices, 14*24 hour aggregates, 1 parameter configuration). If we set everything to 5 minutes, this would lead to an average of:\r\n* 1424\u202c requests per 5 minutes\r\n* ~285 requests per minute\r\n* ~5 requests per second\r\n\r\nI think the object storage should easily be able to handle that, even if for some reason the CDN edge cache servers decided to request stuff themselves.\n5 Minutes is OK for now - let's keep it simple in the first iteration.", "created_at": "2020-05-27T19:29:49Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 350, "instance_id": "corona-warn-app__cwa-server-350", "issue_numbers": ["341"], "base_commit": "8d8a0a5e16bc252364812017a85418b054d739f7", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n@@ -87,12 +87,10 @@ private void validateRiskScoreValueBounds(int value) {\n }\n \n private void validateUrl(String url) {\n- if (!url.isBlank()) {\n- try {\n- new URL(url);\n- } catch (MalformedURLException e) {\n- errors.add(new RiskScoreClassificationValidationError(\"url\", url, INVALID_URL));\n- }\n+ try {\n+ new URL(url.trim());\n+ } catch (MalformedURLException e) {\n+ errors.add(new RiskScoreClassificationValidationError(\"url\", url, INVALID_URL));\n }\n }\n \n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n@@ -39,19 +39,19 @@ class RiskScoreClassificationValidatorTest {\n \n private final static int MAX_SCORE = ParameterSpec.RISK_SCORE_MAX;\n private final static String VALID_LABEL = \"myLabel\";\n- private final static String VALID_URL = \"\";\n+ private final static String VALID_URL = \"https://www.my.url\";\n \n @ParameterizedTest\n @ValueSource(strings = {\"\", \" \"})\n void failsForBlankLabels(String invalidLabel) {\n- var validator = buildValidator(buildRiskClass(invalidLabel, 0, MAX_SCORE, \"\"));\n+ var validator = buildValidator(buildRiskClass(invalidLabel, 0, MAX_SCORE, VALID_URL));\n var expectedResult = buildExpectedResult(buildError(\"label\", invalidLabel, ErrorType.BLANK_LABEL));\n \n assertThat(validator.validate()).isEqualTo(expectedResult);\n }\n \n @ParameterizedTest\n- @ValueSource(strings = {\"invalid.Url\", \"invalid-url\", \"$$$://invalid.url\"})\n+ @ValueSource(strings = {\"invalid.Url\", \"invalid-url\", \"$$$://invalid.url\", \"\", \" \"})\n void failsForInvalidUrl(String invalidUrl) {\n var validator = buildValidator(buildRiskClass(VALID_LABEL, 0, MAX_SCORE, invalidUrl));\n var expectedResult = buildExpectedResult(buildError(\"url\", invalidUrl, ErrorType.INVALID_URL));\n@@ -133,10 +133,8 @@ void doesNotFailForValidClassification(RiskScoreClassification validClassificati\n \n private static Stream createValidClassifications() {\n return Stream.of(\n- // blank url\n- buildClassification(buildRiskClass(VALID_LABEL, 0, MAX_SCORE, \"\")),\n- // legit url\n- buildClassification(buildRiskClass(VALID_LABEL, 0, MAX_SCORE, \"http://www.sap.com\")),\n+ // valid url\n+ buildClassification(buildRiskClass(VALID_LABEL, 0, MAX_SCORE, VALID_URL)),\n // [0:MAX_SCORE/2][MAX_SCORE/2:MAX_SCORE]\n buildClassification(\n buildRiskClass(VALID_LABEL, 0, MAX_SCORE / 2, VALID_URL),\n", "problem_statement": "Blank URL in RiskScoreClassificationValidator\nIn `app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidator#validateUrl` [(link to source code)](https://github.com/corona-warn-app/cwa-server/blob/63dda0c2a5e1ff09fe998dd05637d76dea2e3833/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java#L89) an empty URL does not lead to an error. This is not in line with e.g. validation of a label. In case the label is blank, an error is added. Maybe you can check that this is implemented as intended.\n", "hints_text": "Confirmed URL should **not** be empty - It should be a valid URL with http/https as allowed protocol", "created_at": "2020-05-27T19:55:53Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 352, "instance_id": "corona-warn-app__cwa-server-352", "issue_numbers": ["271"], "base_commit": "207bdd8d4d701ab8df608db7caa9f2613fa86b84", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n@@ -24,7 +24,6 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.Formatter;\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.WritableFunction;\n import java.util.Set;\n-import java.util.Stack;\n \n /**\n * A \"meta {@link Directory directory}\" that maps its on-disk subdirectories to some list of elements. This list of\n@@ -38,7 +37,7 @@ public interface IndexDirectory> extends Directory {\n /**\n * Adds a writable under the name {@code name}, whose content is calculated by the {@code writableFunction} to each\n * one of the directories created from the index. The {@code fileFunction} calculates the file content from a {@link\n- * java.util.Stack} of parent {@link IndexDirectoryOnDisk} indices. File content calculation happens on {@link\n+ * ImmutableStack} of parent {@link IndexDirectoryOnDisk} indices. File content calculation happens on {@link\n * DirectoryOnDisk#write}.\n *\n * @param writableFunction A function that can output a new writable.\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n@@ -27,7 +27,6 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.WritableFunction;\n import java.util.HashSet;\n import java.util.Set;\n-import java.util.Stack;\n \n /**\n * An {@link IndexDirectory} that can be written to disk.\n@@ -47,7 +46,7 @@ public class IndexDirectoryOnDisk extends DirectoryOnDisk implements IndexDir\n *\n * @param name The name that this directory should have on disk.\n * @param indexFunction An {@link IndexFunction} that calculates the index of this {@link IndexDirectoryOnDisk} from\n- * a {@link java.util.Stack} of parent {@link IndexDirectoryOnDisk} indices. The top element of\n+ * a {@link ImmutableStack} of parent {@link IndexDirectoryOnDisk} indices. The top element of\n * the stack is from the closest {@link IndexDirectoryOnDisk} in the parent chain.\n * @param indexFormatter A {@link Formatter} used to format the directory name for each index element returned by the\n * {@link IndexDirectoryOnDisk#indexFunction}.\n@@ -78,9 +77,9 @@ public void addWritableToAll(WritableFunction writableFunction)\n * {@link IndexDirectory#addWritableToAll writables} to those. The respective element of the index will be pushed\n * onto the Stack for subsequent {@link Writable#prepare} calls.\n *\n- * @param indices A {@link Stack} of parameters from all {@link IndexDirectory IndexDirectories} further up in the\n- * hierarchy. The Stack may contain different types, depending on the types {@code T} of\n- * {@link IndexDirectory IndexDirectories} further up in the hierarchy.\n+ * @param indices A {@link ImmutableStack} of parameters from all {@link IndexDirectory IndexDirectories} further up\n+ * in the hierarchy. The Stack may contain different types, depending on the types {@code T} of {@link\n+ * IndexDirectory IndexDirectories} further up in the hierarchy.\n */\n @Override\n public void prepare(ImmutableStack indices) {\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStack.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStack.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStack.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStack.java\n@@ -19,21 +19,22 @@\n \n package app.coronawarn.server.services.distribution.assembly.structure.util;\n \n-import java.util.Stack;\n+import java.util.ArrayDeque;\n+import java.util.Deque;\n \n public class ImmutableStack {\n \n- private final Stack stack;\n+ private final Deque stack;\n \n public ImmutableStack() {\n- this.stack = new Stack<>();\n+ this.stack = new ArrayDeque<>();\n }\n \n /**\n * Creates a clone of the specified {@link ImmutableStack}.\n */\n public ImmutableStack(ImmutableStack other) {\n- this.stack = (Stack) other.stack.clone();\n+ this.stack = new ArrayDeque<>(other.stack);\n }\n \n /**\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n@@ -0,0 +1,69 @@\n+/*\n+ * Corona-Warn-App\n+ *\n+ * SAP SE and all other contributors /\n+ * copyright owners license this file to you under the Apache\n+ * License, Version 2.0 (the \"License\"); you may not use this\n+ * file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing,\n+ * software distributed under the License is distributed on an\n+ * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n+ * KIND, either express or implied. See the License for the\n+ * specific language governing permissions and limitations\n+ * under the License.\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.structure.util;\n+\n+import org.assertj.core.api.Assertions;\n+import org.junit.jupiter.api.Test;\n+\n+import java.util.ArrayDeque;\n+import java.util.NoSuchElementException;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n+\n+class ImmutableStackTest {\n+\n+ private final ImmutableStack stack =\n+ new ImmutableStack().push(\"Joker\").push(\"Queen\").push(\"King\");\n+\n+ @Test\n+ void checkPushes() {\n+ var newStack = stack.push(\"Ace\");\n+\n+ assertThat(newStack).isNotSameAs(stack);\n+ assertThat(newStack.peek()).isEqualTo(\"Ace\");\n+ assertThat(stack.peek()).isEqualTo(\"King\");\n+ }\n+\n+ @Test\n+ void checkPops() {\n+ var newStack = stack.pop();\n+\n+ assertThat(newStack).isNotSameAs(stack);\n+ assertThat(newStack.peek()).isEqualTo(\"Queen\");\n+ assertThat(stack.peek()).isEqualTo(\"King\");\n+ }\n+\n+ @Test\n+ void checkPeeks() {\n+ assertThat(stack.peek()).isEqualTo(\"King\");\n+ }\n+\n+ @Test\n+ void checksEmptyStackHasNoting() {\n+ assertThat(new ImmutableStack<>().peek()).isNull();\n+ }\n+\n+ @Test\n+ void throwsExceptionWhenPopsFromEmptyStack() {\n+ assertThatExceptionOfType(NoSuchElementException.class)\n+ .isThrownBy(() -> new ImmutableStack<>().pop());\n+ }\n+}\n", "problem_statement": "Sonar - Mitigate/Audit synchronized class \"Stack\"\nSee https://sonarcloud.io/project/issues?id=corona-warn-app_cwa-server&issues=AXI3CJu7vPFV4POpyUFA&open=AXI3CJu7vPFV4POpyUFA\r\n\r\nStrongly consider using existing [data structure implementations.](https://www.eclipse.org/collections/javadoc/9.2.0/org/eclipse/collections/api/stack/ImmutableStack.html)\n", "hints_text": "", "created_at": "2020-05-27T23:46:21Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 378, "instance_id": "corona-warn-app__cwa-server-378", "issue_numbers": ["363"], "base_commit": "79eef3fa06e3e6bd1bfa9a97c0959d62551295b8", "patch": "diff --git a/services/distribution/pom.xml b/services/distribution/pom.xml\n--- a/services/distribution/pom.xml\n+++ b/services/distribution/pom.xml\n@@ -54,9 +54,9 @@\n distribution\n \n \n- io.minio\n- minio\n- 7.0.2\n+ software.amazon.awssdk\n+ s3\n+ 2.13.25\n \n \n bcpkix-jdk15on\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/MinioClientWrapper.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/MinioClientWrapper.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/MinioClientWrapper.java\n+++ /dev/null\n@@ -1,106 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- * \n- * http://www.apache.org/licenses/LICENSE-2.0\n- * \n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.objectstore.client;\n-\n-import io.minio.MinioClient;\n-import io.minio.PutObjectOptions;\n-import io.minio.Result;\n-import io.minio.errors.ErrorResponseException;\n-import io.minio.errors.InsufficientDataException;\n-import io.minio.errors.InternalException;\n-import io.minio.errors.InvalidBucketNameException;\n-import io.minio.errors.InvalidResponseException;\n-import io.minio.errors.XmlParserException;\n-import io.minio.messages.Item;\n-import java.io.IOException;\n-import java.nio.file.Files;\n-import java.nio.file.Path;\n-import java.security.InvalidKeyException;\n-import java.security.NoSuchAlgorithmException;\n-import java.util.ArrayList;\n-import java.util.List;\n-import java.util.Map;\n-import java.util.Map.Entry;\n-import java.util.stream.Collectors;\n-\n-/**\n- * Implementation of {@link ObjectStoreClient} that encapsulates a {@link MinioClient}.\n- */\n-public class MinioClientWrapper implements ObjectStoreClient {\n-\n- private final MinioClient minioClient;\n-\n- public MinioClientWrapper(MinioClient minioClient) {\n- this.minioClient = minioClient;\n- }\n-\n- @Override\n- public List getObjects(String bucket, String prefix) {\n- Iterable> objects = this.minioClient.listObjects(bucket, prefix, true);\n-\n- var list = new ArrayList();\n- for (Result item : objects) {\n- try {\n- list.add(S3Object.of(item.get()));\n- } catch (ErrorResponseException | NoSuchAlgorithmException | InternalException | IOException | InvalidKeyException\n- | InvalidResponseException | InvalidBucketNameException | InsufficientDataException | XmlParserException\n- | IllegalArgumentException e) {\n- throw new ObjectStoreOperationFailedException(\"Failed to download objects from object store.\", e);\n- }\n- }\n- return list;\n- }\n-\n- @Override\n- public void putObject(String bucket, String objectName, Path filePath, Map headers) {\n- try {\n- var options = new PutObjectOptions(Files.size(filePath), -1);\n- Map minioHeaders = headers.entrySet().stream()\n- .map(entry -> Map.entry(entry.getKey().keyValue, entry.getValue()))\n- .collect(Collectors.toMap(Entry::getKey, Entry::getValue));\n-\n- options.setHeaders(minioHeaders);\n- minioClient.putObject(bucket, objectName, filePath.toString(), options);\n- } catch (ErrorResponseException | NoSuchAlgorithmException | InternalException | IOException | InvalidKeyException\n- | InvalidResponseException | InvalidBucketNameException | InsufficientDataException | XmlParserException\n- | IllegalArgumentException e) {\n- throw new ObjectStoreOperationFailedException(\"Failed to upload object to object store.\", e);\n- }\n- }\n-\n- @Override\n- public void removeObjects(String bucket, List objectNames) {\n- if (!objectNames.isEmpty() && minioClient.removeObjects(bucket, objectNames).iterator().hasNext()) {\n- throw new ObjectStoreOperationFailedException(\"Failed to remove objects from object store\");\n- }\n- }\n-\n- @Override\n- public boolean bucketExists(String bucket) {\n- try {\n- return minioClient.bucketExists(bucket);\n- } catch (ErrorResponseException | NoSuchAlgorithmException | InternalException | IOException | InvalidKeyException\n- | InvalidResponseException | InvalidBucketNameException | InsufficientDataException | XmlParserException\n- | IllegalArgumentException e) {\n- throw new ObjectStoreOperationFailedException(\"Failed to check if object store bucket exists.\", e);\n- }\n- }\n-}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n@@ -22,14 +22,16 @@\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.ObjectStore;\n-import io.minio.MinioClient;\n-import io.minio.errors.InvalidEndpointException;\n-import io.minio.errors.InvalidPortException;\n+import java.net.URI;\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.Configuration;\n+import software.amazon.awssdk.auth.credentials.AwsCredentials;\n+import software.amazon.awssdk.auth.credentials.AwsCredentialsProvider;\n+import software.amazon.awssdk.regions.Region;\n+import software.amazon.awssdk.services.s3.S3Client;\n \n /**\n- * Manages the instantiation of the {@link MinioClient} bean.\n+ * Manages the instantiation of the {@link ObjectStoreClient} bean.\n */\n @Configuration\n public class ObjectStoreClientConfig {\n@@ -37,29 +39,44 @@ public class ObjectStoreClientConfig {\n private static final String DEFAULT_REGION = \"eu-west-1\";\n \n @Bean\n- public ObjectStoreClient createObjectStoreClient(DistributionServiceConfig distributionServiceConfig)\n- throws InvalidPortException, InvalidEndpointException {\n+ public ObjectStoreClient createObjectStoreClient(DistributionServiceConfig distributionServiceConfig) {\n return createClient(distributionServiceConfig.getObjectStore());\n }\n \n- private MinioClientWrapper createClient(ObjectStore objectStore)\n- throws InvalidPortException, InvalidEndpointException {\n- if (isSsl(objectStore)) {\n- return new MinioClientWrapper(new MinioClient(\n- objectStore.getEndpoint(),\n- objectStore.getPort(),\n- objectStore.getAccessKey(), objectStore.getSecretKey(),\n- DEFAULT_REGION,\n- true));\n- } else {\n- return new MinioClientWrapper(new MinioClient(\n- objectStore.getEndpoint(),\n- objectStore.getPort(),\n- objectStore.getAccessKey(), objectStore.getSecretKey()));\n- }\n+ private ObjectStoreClient createClient(ObjectStore objectStore) {\n+ return new S3ClientWrapper(S3Client.builder()\n+ .region(Region.of(DEFAULT_REGION))\n+ .endpointOverride(URI.create(objectStore.getEndpoint() + \":\" + objectStore.getPort()))\n+ .credentialsProvider(new CredentialsProvider(objectStore.getAccessKey(), objectStore.getSecretKey()))\n+ .build());\n }\n \n- private boolean isSsl(ObjectStore objectStore) {\n- return objectStore.getEndpoint().startsWith(\"https://\");\n+ /**\n+ * Statically serves credentials based on construction arguments.\n+ */\n+ static class CredentialsProvider implements AwsCredentialsProvider {\n+\n+ final String accessKeyId;\n+ final String secretAccessKey;\n+\n+ public CredentialsProvider(String accessKeyId, String secretAccessKey) {\n+ this.accessKeyId = accessKeyId;\n+ this.secretAccessKey = secretAccessKey;\n+ }\n+\n+ @Override\n+ public AwsCredentials resolveCredentials() {\n+ return new AwsCredentials() {\n+ @Override\n+ public String accessKeyId() {\n+ return accessKeyId;\n+ }\n+\n+ @Override\n+ public String secretAccessKey() {\n+ return secretAccessKey;\n+ }\n+ };\n+ }\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n@@ -0,0 +1,123 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore.client;\n+\n+import static java.util.stream.Collectors.toList;\n+\n+import java.nio.file.Path;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Map;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import software.amazon.awssdk.core.exception.SdkException;\n+import software.amazon.awssdk.core.sync.RequestBody;\n+import software.amazon.awssdk.services.s3.S3Client;\n+import software.amazon.awssdk.services.s3.model.Delete;\n+import software.amazon.awssdk.services.s3.model.DeleteObjectsRequest;\n+import software.amazon.awssdk.services.s3.model.DeleteObjectsResponse;\n+import software.amazon.awssdk.services.s3.model.ListObjectsV2Request;\n+import software.amazon.awssdk.services.s3.model.ListObjectsV2Response;\n+import software.amazon.awssdk.services.s3.model.ObjectIdentifier;\n+import software.amazon.awssdk.services.s3.model.PutObjectRequest;\n+\n+/**\n+ * Implementation of {@link ObjectStoreClient} that encapsulates an {@link S3Client}.\n+ */\n+public class S3ClientWrapper implements ObjectStoreClient {\n+\n+ private static final Logger logger = LoggerFactory.getLogger(S3ClientWrapper.class);\n+\n+ private final S3Client s3Client;\n+\n+ public S3ClientWrapper(S3Client s3Client) {\n+ this.s3Client = s3Client;\n+ }\n+\n+ @Override\n+ public boolean bucketExists(String bucketName) {\n+ try {\n+ return !s3Client.listBuckets().buckets().stream().findFirst().isEmpty();\n+ } catch (SdkException e) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to determine if bucket exists.\", e);\n+ }\n+ }\n+\n+ @Override\n+ public List getObjects(String bucket, String prefix) {\n+ try {\n+ ListObjectsV2Response response =\n+ s3Client.listObjectsV2(ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).build());\n+ return response.contents().stream().map(S3ClientWrapper::buildS3Object).collect(toList());\n+ } catch (SdkException e) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to upload object to object store\", e);\n+ }\n+ }\n+\n+ @Override\n+ public void putObject(String bucket, String objectName, Path filePath, Map headers) {\n+ RequestBody bodyFile = RequestBody.fromFile(filePath);\n+\n+ var requestBuilder = PutObjectRequest.builder().bucket(bucket).key(objectName);\n+ if (headers.containsKey(HeaderKey.AMZ_ACL)) {\n+ requestBuilder.acl(headers.get(HeaderKey.AMZ_ACL));\n+ }\n+ if (headers.containsKey(HeaderKey.CACHE_CONTROL)) {\n+ requestBuilder.cacheControl(headers.get(HeaderKey.CACHE_CONTROL));\n+ }\n+\n+ try {\n+ s3Client.putObject(requestBuilder.build(), bodyFile);\n+ } catch (SdkException e) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to upload object to object store\", e);\n+ }\n+ }\n+\n+ @Override\n+ public void removeObjects(String bucket, List objectNames) {\n+ if (objectNames.isEmpty()) {\n+ return;\n+ }\n+\n+ Collection identifiers = objectNames.stream()\n+ .map(key -> ObjectIdentifier.builder().key(key).build()).collect(toList());\n+\n+ try {\n+ DeleteObjectsResponse response = s3Client.deleteObjects(\n+ DeleteObjectsRequest.builder()\n+ .bucket(bucket)\n+ .delete(Delete.builder().objects(identifiers).build()).build());\n+\n+ if (response.hasErrors()) {\n+ String errMessage = \"Failed to remove objects from object store.\";\n+ logger.error(\"{} {}\", errMessage, response.errors());\n+ throw new ObjectStoreOperationFailedException(errMessage);\n+ }\n+ } catch (SdkException e) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to remove objects from object store.\", e);\n+ }\n+ }\n+\n+ private static S3Object buildS3Object(software.amazon.awssdk.services.s3.model.S3Object s3Object) {\n+ String etag = s3Object.eTag().replaceAll(\"\\\"\", \"\");\n+ return new S3Object(s3Object.key(), etag);\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3Object.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3Object.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3Object.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3Object.java\n@@ -20,7 +20,6 @@\n \n package app.coronawarn.server.services.distribution.objectstore.client;\n \n-import io.minio.messages.Item;\n import java.util.Objects;\n \n /**\n@@ -64,17 +63,6 @@ public String getEtag() {\n return etag;\n }\n \n- /**\n- * Returns a new instance of an S3Object based on the given item.\n- *\n- * @param item the item (as provided by MinIO)\n- * @return the S3Object representation\n- */\n- public static S3Object of(Item item) {\n- String etag = item.etag().replaceAll(\"\\\"\", \"\");\n- return new S3Object(item.objectName(), etag);\n- }\n-\n @Override\n public boolean equals(Object o) {\n if (this == o) {\ndiff --git a/services/distribution/src/main/java/io/minio/messages/Item.java b/services/distribution/src/main/java/io/minio/messages/Item.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/io/minio/messages/Item.java\n+++ /dev/null\n@@ -1,131 +0,0 @@\n-/*\n- * MinIO Java SDK for Amazon S3 Compatible Cloud Storage, (C) 2015 MinIO, Inc.\n- *\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- */\n-\n-package io.minio.messages;\n-\n-import java.time.ZonedDateTime;\n-import java.util.Map;\n-import org.simpleframework.xml.Element;\n-import org.simpleframework.xml.Root;\n-\n-/* ----------------------------------------------------------------\n- * Copied from MinIO due to patch not yet available.\n- * https://github.com/minio/minio-java/pull/921\n- * Waiting for new release version: 7.0.3\n- * ----------------------------------------------------------------\n- */\n-\n-/**\n- * Helper class to denote Object information in {@link ListBucketResult} and {@link ListBucketResultV1}.\n- */\n-@Root(name = \"Contents\", strict = false)\n-public class Item {\n-\n- @Element(name = \"Key\")\n- private String objectName;\n-\n- @Element(name = \"LastModified\")\n- private ResponseDate lastModified;\n-\n- @Element(name = \"ETag\")\n- private String etag;\n-\n- @Element(name = \"Size\")\n- private long size;\n-\n- @Element(name = \"StorageClass\")\n- private String storageClass;\n-\n- @Element(name = \"Owner\", required = false) /* Monkeypatch: Owner should be optional */\n- private Owner owner;\n-\n- @Element(name = \"UserMetadata\", required = false)\n- private Metadata userMetadata;\n-\n- private boolean isDir = false;\n-\n- public Item() {\n-\n- }\n-\n- /**\n- * Constructs a new Item for prefix i.e. directory.\n- */\n- public Item(String prefix) {\n- this.objectName = prefix;\n- this.isDir = true;\n- }\n-\n- /**\n- * Returns object name.\n- */\n- public String objectName() {\n- return objectName;\n- }\n-\n- /**\n- * Returns last modified time of the object.\n- */\n- public ZonedDateTime lastModified() {\n- return lastModified.zonedDateTime();\n- }\n-\n- /**\n- * Returns ETag of the object.\n- */\n- public String etag() {\n- return etag;\n- }\n-\n- /**\n- * Returns object size.\n- */\n- public long size() {\n- return size;\n- }\n-\n- /**\n- * Returns storage class of the object.\n- */\n- public String storageClass() {\n- return storageClass;\n- }\n-\n- /**\n- * Returns owner object of given the object.\n- */\n- public Owner owner() {\n- return owner;\n- }\n-\n- /**\n- * Returns user metadata. This is MinIO specific extension to ListObjectsV2.\n- */\n- public Map userMetadata() {\n- if (userMetadata == null) {\n- return null;\n- }\n-\n- return userMetadata.get();\n- }\n-\n- /**\n- * Returns whether the object is a directory or not.\n- */\n- public boolean isDir() {\n- return isDir;\n- }\n-}\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/MinioClientWrapperTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/MinioClientWrapperTest.java\ndeleted file mode 100644\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/MinioClientWrapperTest.java\n+++ /dev/null\n@@ -1,235 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.objectstore.client;\n-\n-import static java.util.Collections.emptyMap;\n-import static java.util.Map.entry;\n-import static org.assertj.core.api.Assertions.assertThat;\n-import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n-import static org.assertj.core.util.IterableUtil.iterable;\n-import static org.assertj.core.util.Lists.list;\n-import static org.assertj.core.util.Maps.newHashMap;\n-import static org.mockito.ArgumentMatchers.any;\n-import static org.mockito.ArgumentMatchers.anyBoolean;\n-import static org.mockito.ArgumentMatchers.anyList;\n-import static org.mockito.ArgumentMatchers.anyString;\n-import static org.mockito.ArgumentMatchers.eq;\n-import static org.mockito.Mockito.atLeastOnce;\n-import static org.mockito.Mockito.doThrow;\n-import static org.mockito.Mockito.mock;\n-import static org.mockito.Mockito.verify;\n-import static org.mockito.Mockito.when;\n-\n-import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClient.HeaderKey;\n-import com.fasterxml.jackson.core.JsonParseException;\n-import com.fasterxml.jackson.databind.JsonMappingException;\n-import io.minio.MinioClient;\n-import io.minio.PutObjectOptions;\n-import io.minio.Result;\n-import io.minio.errors.ErrorResponseException;\n-import io.minio.errors.InsufficientDataException;\n-import io.minio.errors.InternalException;\n-import io.minio.errors.InvalidBucketNameException;\n-import io.minio.errors.InvalidResponseException;\n-import io.minio.errors.XmlParserException;\n-import io.minio.messages.DeleteError;\n-import io.minio.messages.Item;\n-import java.io.IOException;\n-import java.nio.file.Path;\n-import java.security.InvalidKeyException;\n-import java.security.NoSuchAlgorithmException;\n-import java.util.ArrayList;\n-import java.util.List;\n-import java.util.stream.Stream;\n-import org.assertj.core.util.Lists;\n-import org.junit.jupiter.api.BeforeEach;\n-import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.params.ParameterizedTest;\n-import org.junit.jupiter.params.provider.Arguments;\n-import org.junit.jupiter.params.provider.MethodSource;\n-import org.junit.jupiter.params.provider.ValueSource;\n-import org.mockito.ArgumentCaptor;\n-\n-class MinioClientWrapperTest {\n-\n- private static final String VALID_BUCKET_NAME = \"myBucket\";\n- private static final String VALID_PREFIX = \"prefix\";\n- private static final String VALID_NAME = \"object key\";\n-\n- private MinioClient minioClient;\n- private MinioClientWrapper minioClientWrapper;\n-\n- @BeforeEach\n- public void setUpMocks() {\n- minioClient = mock(MinioClient.class);\n- minioClientWrapper = new MinioClientWrapper(minioClient);\n- }\n-\n- @Test\n- void testBucketExistsIfBucketExists() throws Exception {\n- when(minioClient.bucketExists(any())).thenReturn(true);\n- assertThat(minioClientWrapper.bucketExists(VALID_BUCKET_NAME)).isTrue();\n- }\n-\n- @Test\n- void testBucketExistsIfBucketDoesNotExist() throws Exception {\n- when(minioClient.bucketExists(any())).thenReturn(false);\n- assertThat(minioClientWrapper.bucketExists(VALID_BUCKET_NAME)).isFalse();\n- }\n-\n- @ParameterizedTest\n- @ValueSource(classes = {ErrorResponseException.class, InsufficientDataException.class,\n- InternalException.class, IllegalArgumentException.class, InvalidBucketNameException.class,\n- InvalidKeyException.class, InvalidResponseException.class,\n- IOException.class, NoSuchAlgorithmException.class, XmlParserException.class})\n- void bucketExistsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) throws Exception {\n- when(minioClient.bucketExists(any())).thenThrow(cause);\n- assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n- .isThrownBy(() -> minioClientWrapper.bucketExists(VALID_BUCKET_NAME));\n- }\n-\n- @Test\n- void testGetObjectsSendsCorrectRequest() {\n- when(minioClient.listObjects(anyString(), anyString(), anyBoolean())).thenReturn(iterable());\n- minioClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n- verify(minioClient, atLeastOnce()).listObjects(eq(VALID_BUCKET_NAME), eq(VALID_PREFIX), eq(true));\n- }\n-\n- @ParameterizedTest\n- @MethodSource(\"createGetObjectsResults\")\n- void testGetObjects(List expResult) throws Exception {\n- Iterable> actResponse = buildListObjectsResponse(expResult);\n- when(minioClient.listObjects(anyString(), anyString(), anyBoolean())).thenReturn(actResponse);\n-\n- List actResult = minioClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n-\n- assertThat(actResult).isEqualTo(expResult);\n- }\n-\n- private static Stream createGetObjectsResults() {\n- return Stream.of(\n- Lists.emptyList(),\n- list(new S3Object(\"objName\", \"eTag\")),\n- list(new S3Object(\"objName1\", \"eTag1\"), new S3Object(\"objName2\", \"eTag2\"))\n- ).map(Arguments::of);\n- }\n-\n- private Iterable> buildListObjectsResponse(List s3Objects) throws Exception {\n- List> response = new ArrayList<>(s3Objects.size());\n-\n- for (S3Object s3Object : s3Objects) {\n- Item item = mock(Item.class);\n- Result result = mock(Result.class);\n- when(result.get()).thenReturn(item);\n- when(item.etag()).thenReturn(s3Object.getEtag());\n- when(item.objectName()).thenReturn(s3Object.getObjectName());\n- response.add(result);\n- }\n-\n- return iterable(response.toArray(new Result[response.size()]));\n- }\n-\n- @Test\n- void getObjectsRemovesDoubleQuotesFromEtags() throws Exception {\n- String expEtag = \"eTag\";\n- Iterable> actResponse = buildListObjectsResponse(\n- List.of(new S3Object(VALID_NAME, \"\\\"\" + expEtag + \"\\\"\")));\n- when(minioClient.listObjects(anyString(), anyString(), anyBoolean())).thenReturn(actResponse);\n-\n- List actResult = minioClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n-\n- assertThat(actResult).isEqualTo(List.of(new S3Object(VALID_NAME, expEtag)));\n- }\n-\n- @ParameterizedTest\n- @ValueSource(classes = {ErrorResponseException.class, InsufficientDataException.class, XmlParserException.class,\n- InternalException.class, InvalidBucketNameException.class, InvalidKeyException.class, JsonParseException.class,\n- InvalidResponseException.class, JsonMappingException.class, IOException.class, NoSuchAlgorithmException.class,\n- IllegalArgumentException.class})\n- void getObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) throws Exception {\n- Result actResult = mock(Result.class);\n- when(actResult.get()).thenThrow(cause);\n- when(minioClient.listObjects(anyString(), anyString(), anyBoolean())).thenReturn(iterable(actResult));\n- assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n- .isThrownBy(() -> minioClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX));\n- }\n-\n- @Test\n- void testPutObjectForNoHeaders() throws Exception {\n- minioClientWrapper.putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"), emptyMap());\n- ArgumentCaptor options = ArgumentCaptor.forClass(PutObjectOptions.class);\n- verify(minioClient, atLeastOnce()).putObject(eq(VALID_BUCKET_NAME), eq(VALID_NAME), eq(\"\"), options.capture());\n- assertThat(options.getValue().headers()).isEmpty();\n- }\n-\n- @Test\n- void testPutObjectForCacheControlHeader() throws Exception {\n- String expCacheControl = \"foo-cache-control\";\n-\n- minioClientWrapper.putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"),\n- newHashMap(HeaderKey.CACHE_CONTROL, expCacheControl));\n-\n- ArgumentCaptor options = ArgumentCaptor.forClass(PutObjectOptions.class);\n- verify(minioClient, atLeastOnce()).putObject(eq(VALID_BUCKET_NAME), eq(VALID_NAME), eq(\"\"), options.capture());\n- assertThat(options.getValue().headers()).hasSize(1);\n- assertThat(options.getValue().headers()).contains(entry(HeaderKey.CACHE_CONTROL.keyValue, expCacheControl));\n- }\n-\n- @Test\n- void testPutObjectForAmzAclHeader() throws Exception {\n- String expAcl = \"foo-acl\";\n-\n- minioClientWrapper.putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"), newHashMap(HeaderKey.AMZ_ACL, expAcl));\n-\n- ArgumentCaptor options = ArgumentCaptor.forClass(PutObjectOptions.class);\n- verify(minioClient, atLeastOnce()).putObject(eq(VALID_BUCKET_NAME), eq(VALID_NAME), eq(\"\"), options.capture());\n- assertThat(options.getValue().headers()).hasSize(1);\n- assertThat(options.getValue().headers()).contains(entry(HeaderKey.AMZ_ACL.keyValue, expAcl));\n- }\n-\n- @ParameterizedTest\n- @ValueSource(classes = {ErrorResponseException.class, IllegalArgumentException.class, InsufficientDataException.class,\n- InternalException.class, InvalidBucketNameException.class, InvalidKeyException.class, XmlParserException.class,\n- IOException.class, NoSuchAlgorithmException.class, InvalidResponseException.class})\n- void putObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) throws Exception {\n- doThrow(cause).when(minioClient).putObject(anyString(), anyString(), anyString(), any(PutObjectOptions.class));\n- assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n- .isThrownBy(() -> minioClientWrapper.putObject(VALID_BUCKET_NAME, VALID_PREFIX, Path.of(\"\"), emptyMap()));\n- }\n-\n- @Test\n- void testRemoveObjects() {\n- when(minioClient.removeObjects(anyString(), anyList())).thenReturn(iterable());\n- List expObjectNames = List.of(\"obj1\", \"obj2\");\n-\n- minioClientWrapper.removeObjects(VALID_BUCKET_NAME, expObjectNames);\n-\n- verify(minioClient, atLeastOnce()).removeObjects(eq(VALID_BUCKET_NAME), eq(expObjectNames));\n- }\n-\n- @Test\n- void removeObjectsThrowsObjectStoreOperationFailedExceptionOnDeleteErrors() {\n- Result result = mock(Result.class);\n- when(minioClient.removeObjects(anyString(), anyList())).thenReturn(iterable(result));\n- assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n- .isThrownBy(() -> minioClientWrapper.removeObjects(VALID_BUCKET_NAME, list(VALID_NAME)));\n- }\n-}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n@@ -0,0 +1,238 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore.client;\n+\n+import static java.util.Collections.emptyMap;\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n+import static org.assertj.core.util.Maps.newHashMap;\n+import static org.mockito.ArgumentMatchers.any;\n+import static org.mockito.ArgumentMatchers.eq;\n+import static org.mockito.Mockito.atLeastOnce;\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.verify;\n+import static org.mockito.Mockito.when;\n+\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClient.HeaderKey;\n+import java.nio.file.Path;\n+import java.util.ArrayList;\n+import java.util.List;\n+import java.util.stream.Collectors;\n+import java.util.stream.Stream;\n+import org.assertj.core.util.Lists;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.Arguments;\n+import org.junit.jupiter.params.provider.MethodSource;\n+import org.junit.jupiter.params.provider.ValueSource;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+import software.amazon.awssdk.core.exception.SdkClientException;\n+import software.amazon.awssdk.core.exception.SdkException;\n+import software.amazon.awssdk.core.sync.RequestBody;\n+import software.amazon.awssdk.services.s3.S3Client;\n+import software.amazon.awssdk.services.s3.model.Bucket;\n+import software.amazon.awssdk.services.s3.model.Delete;\n+import software.amazon.awssdk.services.s3.model.DeleteObjectsRequest;\n+import software.amazon.awssdk.services.s3.model.DeleteObjectsResponse;\n+import software.amazon.awssdk.services.s3.model.ListBucketsResponse;\n+import software.amazon.awssdk.services.s3.model.ListObjectsV2Request;\n+import software.amazon.awssdk.services.s3.model.ListObjectsV2Response;\n+import software.amazon.awssdk.services.s3.model.NoSuchBucketException;\n+import software.amazon.awssdk.services.s3.model.ObjectIdentifier;\n+import software.amazon.awssdk.services.s3.model.PutObjectRequest;\n+import software.amazon.awssdk.services.s3.model.S3Error;\n+import software.amazon.awssdk.services.s3.model.S3Exception;\n+import software.amazon.awssdk.utils.builder.SdkBuilder;\n+\n+@ExtendWith(SpringExtension.class)\n+class S3ClientWrapperTest {\n+\n+ private static final String VALID_BUCKET_NAME = \"myBucket\";\n+ private static final String VALID_PREFIX = \"prefix\";\n+ private static final String VALID_NAME = \"object key\";\n+\n+ private S3Client s3Client;\n+ private S3ClientWrapper s3ClientWrapper;\n+ private List existingBuckets;\n+\n+ @BeforeEach\n+ public void setUpMocks() {\n+ s3Client = mock(S3Client.class);\n+ s3ClientWrapper = new S3ClientWrapper(s3Client);\n+ existingBuckets = new ArrayList<>();\n+ ListBucketsResponse listBucketsResponse = mock(ListBucketsResponse.class);\n+\n+ when(listBucketsResponse.buckets()).thenReturn(existingBuckets);\n+ when(s3Client.listBuckets()).thenReturn(listBucketsResponse);\n+ }\n+\n+ @Test\n+ void testBucketExistsIfBucketExists() {\n+ existingBuckets.add(Bucket.builder().name(VALID_BUCKET_NAME).build());\n+ assertThat(s3ClientWrapper.bucketExists(VALID_BUCKET_NAME)).isTrue();\n+ }\n+\n+ @Test\n+ void testBucketExistsIfBucketDoesNotExist() {\n+ assertThat(s3ClientWrapper.bucketExists(VALID_BUCKET_NAME)).isFalse();\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(classes = {S3Exception.class, SdkClientException.class, SdkException.class})\n+ void bucketExistsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) {\n+ when(s3Client.listBuckets()).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.bucketExists(VALID_BUCKET_NAME));\n+ }\n+\n+ @Test\n+ void testGetObjectsSendsCorrectRequest() {\n+ when(s3Client.listObjectsV2(any(ListObjectsV2Request.class))).thenReturn(ListObjectsV2Response.builder().build());\n+\n+ s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n+\n+ ListObjectsV2Request expRequest = ListObjectsV2Request.builder()\n+ .prefix(VALID_PREFIX).bucket(VALID_BUCKET_NAME).build();\n+ verify(s3Client, atLeastOnce()).listObjectsV2(eq(expRequest));\n+ }\n+\n+ @ParameterizedTest\n+ @MethodSource(\"createGetObjectsResults\")\n+ void testGetObjects(List expResult) {\n+ ListObjectsV2Response actResponse = buildListObjectsResponse(expResult);\n+ when(s3Client.listObjectsV2(any(ListObjectsV2Request.class))).thenReturn(actResponse);\n+\n+ List actResult = s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n+\n+ assertThat(actResult).isEqualTo(expResult);\n+ }\n+\n+ private static Stream createGetObjectsResults() {\n+ return Stream.of(\n+ Lists.emptyList(),\n+ Lists.list(new S3Object(\"objName\", \"eTag\")),\n+ Lists.list(new S3Object(\"objName1\", \"eTag1\"), new S3Object(\"objName2\", \"eTag2\"))\n+ ).map(Arguments::of);\n+ }\n+\n+ private ListObjectsV2Response buildListObjectsResponse(List s3Objects) {\n+ var responseObjects = s3Objects.stream().map(\n+ s3Object -> software.amazon.awssdk.services.s3.model.S3Object.builder()\n+ .key(s3Object.getObjectName())\n+ .eTag(s3Object.getEtag()))\n+ .map(SdkBuilder::build).collect(Collectors.toList());\n+ return ListObjectsV2Response.builder().contents(responseObjects).build();\n+ }\n+\n+ @Test\n+ void getObjectsRemovesDoubleQuotesFromEtags() {\n+ String expEtag = \"eTag\";\n+ ListObjectsV2Response actResponse =\n+ buildListObjectsResponse(List.of(new S3Object(VALID_NAME, \"\\\"\" + expEtag + \"\\\"\")));\n+ when(s3Client.listObjectsV2(any(ListObjectsV2Request.class))).thenReturn(actResponse);\n+\n+ List actResult = s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n+\n+ assertThat(actResult).isEqualTo(List.of(new S3Object(VALID_NAME, expEtag)));\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(classes = {NoSuchBucketException.class, S3Exception.class, SdkClientException.class, SdkException.class})\n+ void getObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) {\n+ when(s3Client.listObjectsV2(any(ListObjectsV2Request.class))).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX));\n+ }\n+\n+ @Test\n+ void testPutObjectForNoHeaders() {\n+ s3ClientWrapper.putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"), emptyMap());\n+\n+ PutObjectRequest expRequest = PutObjectRequest.builder().bucket(VALID_BUCKET_NAME).key(VALID_NAME).build();\n+ verify(s3Client, atLeastOnce()).putObject(eq(expRequest), any(RequestBody.class));\n+ }\n+\n+ @Test\n+ void testPutObjectForCacheControlHeader() {\n+ var expCacheControl = \"foo-cache-control\";\n+ s3ClientWrapper\n+ .putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"), newHashMap(HeaderKey.CACHE_CONTROL, expCacheControl));\n+\n+ PutObjectRequest expRequest =\n+ PutObjectRequest.builder().bucket(VALID_BUCKET_NAME).key(VALID_NAME).cacheControl(expCacheControl).build();\n+ verify(s3Client, atLeastOnce()).putObject(eq(expRequest), any(RequestBody.class));\n+ }\n+\n+ @Test\n+ void testPutObjectForAmzAclHeader() {\n+ String expAcl = \"foo-acl\";\n+ s3ClientWrapper.putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"), newHashMap(HeaderKey.AMZ_ACL, expAcl));\n+\n+ PutObjectRequest expRequest =\n+ PutObjectRequest.builder().bucket(VALID_BUCKET_NAME).key(VALID_NAME).acl(expAcl).build();\n+ verify(s3Client, atLeastOnce()).putObject(eq(expRequest), any(RequestBody.class));\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(classes = {NoSuchBucketException.class, S3Exception.class, SdkClientException.class, SdkException.class})\n+ void putObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) {\n+ when(s3Client.putObject(any(PutObjectRequest.class), any(RequestBody.class))).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.putObject(VALID_BUCKET_NAME, VALID_PREFIX, Path.of(\"\"), emptyMap()));\n+ }\n+\n+ @Test\n+ void testRemoveObjects() {\n+ when(s3Client.deleteObjects(any(DeleteObjectsRequest.class))).thenReturn(DeleteObjectsResponse.builder().build());\n+ List expObjectNames = List.of(\"obj1\", \"obj2\");\n+\n+ s3ClientWrapper.removeObjects(VALID_BUCKET_NAME, expObjectNames);\n+\n+ DeleteObjectsRequest expRequest = DeleteObjectsRequest.builder()\n+ .bucket(VALID_BUCKET_NAME).delete(buildDeleteObject(expObjectNames)).build();\n+ verify(s3Client, atLeastOnce()).deleteObjects(eq(expRequest));\n+ }\n+\n+ private Delete buildDeleteObject(List objectNames) {\n+ return Delete.builder().objects(objectNames.stream().map(\n+ key -> ObjectIdentifier.builder().key(key).build()).collect(Collectors.toList())).build();\n+ }\n+\n+ @Test\n+ void removeObjectsThrowsOnDeletionErrors() {\n+ DeleteObjectsResponse actResponse = DeleteObjectsResponse.builder().errors(S3Error.builder().build()).build();\n+\n+ when(s3Client.deleteObjects(any(DeleteObjectsRequest.class))).thenReturn(actResponse);\n+\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.removeObjects(VALID_BUCKET_NAME, List.of(VALID_NAME)));\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(classes = {NoSuchBucketException.class, S3Exception.class, SdkClientException.class, SdkException.class})\n+ void removeObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class cause) {\n+ when(s3Client.deleteObjects(any(DeleteObjectsRequest.class))).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.removeObjects(VALID_BUCKET_NAME, List.of(VALID_NAME)));\n+ }\n+}\n", "problem_statement": "Remove MinIO SDK and use AWS SDK instead\nSince MinIO SDK still hasn't released a fix version for fixing the XML vulnerability in the SimpleXML library, we need to consider alternative S3 SDK's. Therefore, prepare an alternative approach with AWS SDK, which is then used by the ObjectStoreAccess class.\r\n\n", "hints_text": "", "created_at": "2020-05-29T21:57:57Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 386, "instance_id": "corona-warn-app__cwa-server-386", "issue_numbers": ["367"], "base_commit": "943a9cea975f6395f99217bb380e526e937f093e", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n@@ -88,9 +88,7 @@ public void prepare(ImmutableStack indices) {\n \n private Set getDiagnosisKeysForHour(LocalDateTime hour) {\n return this.diagnosisKeys.stream()\n- .filter(diagnosisKey -> DateTime\n- .getLocalDateTimeFromHoursSinceEpoch(diagnosisKey.getSubmissionTimestamp())\n- .equals(hour))\n+ .filter(diagnosisKey -> DistributionDateTimeCalculator.getDistributionDateTime(diagnosisKey).equals(hour))\n .collect(Collectors.toSet());\n }\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DistributionDateTimeCalculator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DistributionDateTimeCalculator.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DistributionDateTimeCalculator.java\n@@ -0,0 +1,62 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n+\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.ONE_HOUR_INTERVAL_SECONDS;\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.TEN_MINUTES_INTERVAL_SECONDS;\n+import static java.time.ZoneOffset.UTC;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import java.time.Duration;\n+import java.time.LocalDateTime;\n+import java.time.temporal.ChronoUnit;\n+\n+public class DistributionDateTimeCalculator {\n+\n+ /**\n+ * Minimum time in minutes after key expiration after which it can be distributed.\n+ */\n+ public static final long DISTRIBUTION_PADDING = 120L;\n+\n+ private DistributionDateTimeCalculator() {\n+ }\n+\n+ /**\n+ * Calculates the earliest point in time at which the specified {@link DiagnosisKey} can be distributed. Before keys\n+ * are allowed to be distributed, they must be expired for a configured amount of time.\n+ *\n+ * @return {@link LocalDateTime} at which the specified {@link DiagnosisKey} can be distributed.\n+ */\n+ public static LocalDateTime getDistributionDateTime(DiagnosisKey diagnosisKey) {\n+ LocalDateTime submissionDateTime = LocalDateTime\n+ .ofEpochSecond(diagnosisKey.getSubmissionTimestamp() * ONE_HOUR_INTERVAL_SECONDS, 0, UTC);\n+ LocalDateTime keyExpiryDateTime = LocalDateTime\n+ .ofEpochSecond(diagnosisKey.getRollingStartIntervalNumber() * TEN_MINUTES_INTERVAL_SECONDS, 0, UTC)\n+ .plusMinutes(diagnosisKey.getRollingPeriod() * 10L);\n+\n+ if (Duration.between(keyExpiryDateTime, submissionDateTime).toMinutes() <= DISTRIBUTION_PADDING) {\n+ // truncatedTo floors the value, so we need to add an hour to the DISTRIBUTION_PADDING to compensate that.\n+ return keyExpiryDateTime.plusMinutes(DISTRIBUTION_PADDING + 60).truncatedTo(ChronoUnit.HOURS);\n+ }\n+\n+ return submissionDateTime;\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\n@@ -34,6 +34,16 @@\n */\n public class DateTime {\n \n+ /**\n+ * The submission timestamp is counted in 1 hour intervals since epoch.\n+ */\n+ public static final long ONE_HOUR_INTERVAL_SECONDS = TimeUnit.HOURS.toSeconds(1);\n+\n+ /**\n+ * The rolling start interval number is counted in 10 minute intervals since epoch.\n+ */\n+ public static final long TEN_MINUTES_INTERVAL_SECONDS = TimeUnit.MINUTES.toSeconds(10);\n+\n private DateTime() {\n }\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n@@ -20,6 +20,9 @@\n \n package app.coronawarn.server.services.distribution.runner;\n \n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.ONE_HOUR_INTERVAL_SECONDS;\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.TEN_MINUTES_INTERVAL_SECONDS;\n+\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n import app.coronawarn.server.common.protocols.internal.RiskLevel;\n@@ -69,12 +72,6 @@ public class TestDataGeneration implements ApplicationRunner {\n private static final int POISSON_MAX_ITERATIONS = 10_000_000;\n private static final double POISSON_EPSILON = 1e-12;\n \n- // The submission timestamp is counted in 1 hour intervals since epoch\n- private static final long ONE_HOUR_INTERVAL_SECONDS = TimeUnit.HOURS.toSeconds(1);\n-\n- // The rolling start interval number is counted in 10 minute intervals since epoch\n- private static final long TEN_MINUTES_INTERVAL_SECONDS = TimeUnit.MINUTES.toSeconds(10);\n-\n /**\n * Creates a new TestDataGeneration runner.\n */\n", "test_patch": "diff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java\n@@ -33,7 +33,6 @@\n import org.junit.jupiter.params.ParameterizedTest;\n import org.junit.jupiter.params.provider.ValueSource;\n \n-\n class DiagnosisKeyTest {\n \n final static byte[] expKeyData = \"testKey111111111\".getBytes(Charset.defaultCharset());\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DistributionDateTimeCalculatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DistributionDateTimeCalculatorTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DistributionDateTimeCalculatorTest.java\n@@ -0,0 +1,72 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.structure.directory;\n+\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DistributionDateTimeCalculator.getDistributionDateTime;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+\n+class DistributionDateTimeCalculatorTest {\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {0L, 24L, 24L + 2L})\n+ void testLastPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n+ var diagnosisKey = buildDiagnosisKey(5, submissionTimestamp);\n+ assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T03:00\");\n+ }\n+\n+ @Test\n+ void testLastPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n+ var diagnosisKey = buildDiagnosisKey(5, 24L + 3L);\n+ assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T03:00\");\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {0L, 24L, 24L + 2L, 24L + 3L})\n+ void testFirstPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n+ var diagnosisKey = buildDiagnosisKey(6, submissionTimestamp);\n+ assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T04:00\");\n+ }\n+\n+ @Test\n+ void testFirstPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n+ var diagnosisKey = buildDiagnosisKey(6, 24L + 4L);\n+ assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T04:00\");\n+ }\n+\n+ @Test\n+ void testLastPeriodOfHourAndSubmissionGreaterDistributionDateTime() {\n+ var diagnosisKey = buildDiagnosisKey(5, 24L + 4L);\n+ assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T04:00\");\n+ }\n+\n+ private DiagnosisKey buildDiagnosisKey(int startIntervalNumber, long submissionTimestamp) {\n+ return DiagnosisKey.builder()\n+ .withKeyData(new byte[16])\n+ .withRollingStartIntervalNumber(startIntervalNumber)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(submissionTimestamp).build();\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n@@ -20,15 +20,12 @@\n \n package app.coronawarn.server.services.distribution.assembly.structure.util;\n \n-import org.assertj.core.api.Assertions;\n-import org.junit.jupiter.api.Test;\n-\n-import java.util.ArrayDeque;\n-import java.util.NoSuchElementException;\n-\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n \n+import java.util.NoSuchElementException;\n+import org.junit.jupiter.api.Test;\n+\n class ImmutableStackTest {\n \n private final ImmutableStack stack =\n", "problem_statement": "TEK Exports should not contain any keys which recently expired\nCurrently the system also packages keys, which expired recently. Instead, only keys which have been expired since at least 2 hours should be part of the export.\r\n\r\nCan also be a nice prework for https://github.com/corona-warn-app/cwa-server/issues/108.\r\n\r\nProbably should change this already when the diagnosis keys are queried for distribution:\r\nhttps://github.com/corona-warn-app/cwa-server/blob/master/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java#L64\n", "hints_text": "[Apple spec](https://developer.apple.com/documentation/exposurenotification/setting_up_an_exposure_notification_server) states:\r\n\r\n> [Your EN Server...] must not distribute temporary exposure key data until at least 2 hours after the end of the key\u02bcs expiration window\r\n\r\nI think this is a subtle but important difference to just excluding (+2h) by submission timestamp. As far as I know, the TEK API on-device does not give out \"still active\" keys to the app. This just leaves a 2 hour window that depends on the rolling start interval number and the rolling period, but not on the submission timestamp.\nYou are right Pit - I just talked to DPP to clarify whether this is OK for them, and it is. \r\n\r\nI'll update the description of the issue accordingly. ", "created_at": "2020-05-30T14:56:55Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 387, "instance_id": "corona-warn-app__cwa-server-387", "issue_numbers": ["327"], "base_commit": "db3d5faa1fe2702ef32ee0e3a965d0097c394df7", "patch": "diff --git a/THIRD-PARTY-NOTICES b/THIRD-PARTY-NOTICES\n--- a/THIRD-PARTY-NOTICES\n+++ b/THIRD-PARTY-NOTICES\n@@ -80,6 +80,11 @@ Licensor: VMWare Inc.\n Website: https://spring.io/\n License: Apache License 2.0\n \n+Component: Spring Cloud\n+Licensor: VMWare Inc.\n+Website: https://spring.io/\n+License: Apache License 2.0\n+\n Component: wait-for-it\n Licensor: Giles Hall\n Website: https://github.com/vishnubob/wait-for-it\n@@ -90,9 +95,14 @@ Licensor: Zenko\n Website: https://github.com/scality/cloudserver\n License: Apache License 2.0\n \n+Component: Wiremock\n+Licensor: Tom Akehurst\n+Website: http://wiremock.org/\n+License: Apache License 2.0\n+\n --------------------------------------------------------------------------------\n Apache License 2.0 (Commons IO, Commons Math 3, flyway, JSON-Simple,\n-Maven, MinIO Object Storage, MojoHaus Flatten Maven Plugin, snakeyaml, Spring Boot, Zenko CloudServer)\n+Maven, MinIO Object Storage, MojoHaus Flatten Maven Plugin, snakeyaml, Spring Boot, Spring Cloud, Zenko CloudServer, Wiremock)\n \n Apache License\n Version 2.0, January 2004\ndiff --git a/services/submission/pom.xml b/services/submission/pom.xml\n--- a/services/submission/pom.xml\n+++ b/services/submission/pom.xml\n@@ -26,9 +26,9 @@\n spring-boot-starter-security\n \n \n- org.springframework.security\n- spring-security-test\n- test\n+ org.springframework.cloud\n+ spring-cloud-starter-openfeign\n+ 2.2.3.RELEASE\n \n \n org.apache.commons\n@@ -48,6 +48,18 @@\n io.micrometer\n micrometer-registry-prometheus\n \n+ \n+ org.springframework.security\n+ spring-security-test\n+ test\n+ \n+ \n+ com.github.tomakehurst\n+ wiremock-jre8\n+ 2.26.3\n+ test\n+ \n+\n \n \n \ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n@@ -25,6 +25,7 @@\n import org.springframework.boot.autoconfigure.domain.EntityScan;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.boot.web.servlet.ServletComponentScan;\n+import org.springframework.cloud.openfeign.EnableFeignClients;\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.ComponentScan;\n import org.springframework.data.jpa.repository.config.EnableJpaRepositories;\n@@ -37,6 +38,7 @@\n @ComponentScan({\"app.coronawarn.server.common.persistence\",\n \"app.coronawarn.server.services.submission\"})\n @EnableConfigurationProperties\n+@EnableFeignClients\n public class ServerApplication {\n \n @Bean\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/Tan.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/Tan.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/Tan.java\n@@ -0,0 +1,82 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import java.util.Objects;\n+import java.util.UUID;\n+\n+/**\n+ * A representation of a tan.\n+ */\n+class Tan {\n+ private final UUID tan;\n+\n+ private Tan(UUID tan) {\n+ this.tan = tan;\n+ }\n+\n+ /**\n+ * Creates a new {@link #Tan} instance for the given tan string.\n+ *\n+ * @param tanString A valid UUID string representation.\n+ * @return The Tan instance\n+ * @throws IllegalArgumentException when the given tan string is not a valid UUID.\n+ */\n+ public static Tan of(String tanString) {\n+ UUID tan = UUID.fromString(tanString.trim());\n+ return new Tan(tan);\n+ }\n+\n+ /**\n+ * Returns the tan entity as UUID.\n+ * @return the tan.\n+ */\n+ public UUID getTan() {\n+ return tan;\n+ }\n+\n+ /**\n+ * Returns the TAN in it's string representation.\n+ *\n+ * @return the tan UUID as a string.\n+ */\n+ @Override\n+ public String toString() {\n+ return tan.toString();\n+ }\n+\n+ @Override\n+ public boolean equals(Object o) {\n+ if (this == o) {\n+ return true;\n+ }\n+ if (o == null || getClass() != o.getClass()) {\n+ return false;\n+ }\n+ Tan tan1 = (Tan) o;\n+ return tan.equals(tan1.tan);\n+ }\n+\n+ @Override\n+ public int hashCode() {\n+ return Objects.hash(tan);\n+ }\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n@@ -20,20 +20,12 @@\n \n package app.coronawarn.server.services.submission.verification;\n \n-import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n-import java.util.UUID;\n+import feign.FeignException;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.web.client.RestTemplateBuilder;\n-import org.springframework.http.HttpEntity;\n-import org.springframework.http.HttpHeaders;\n-import org.springframework.http.MediaType;\n-import org.springframework.http.ResponseEntity;\n import org.springframework.stereotype.Service;\n-import org.springframework.web.client.HttpClientErrorException;\n import org.springframework.web.client.RestClientException;\n-import org.springframework.web.client.RestTemplate;\n \n /**\n * The TanVerifier performs the verification of submission TANs.\n@@ -42,54 +34,32 @@\n public class TanVerifier {\n \n private static final Logger logger = LoggerFactory.getLogger(TanVerifier.class);\n- private final String verificationServiceUrl;\n- private final RestTemplate restTemplate;\n- private final HttpHeaders requestHeader = new HttpHeaders();\n+ private final VerificationServerClient verificationServerClient;\n \n /**\n * This class can be used to verify a TAN against a configured verification service.\n *\n- * @param submissionServiceConfig A submission service configuration\n- * @param restTemplateBuilder A rest template builder\n+ * @param verificationServerClient The REST client to communicate with the verification server\n */\n @Autowired\n- public TanVerifier(SubmissionServiceConfig submissionServiceConfig, RestTemplateBuilder restTemplateBuilder) {\n- this.verificationServiceUrl = submissionServiceConfig.getVerificationBaseUrl()\n- + submissionServiceConfig.getVerificationPath();\n- this.restTemplate = restTemplateBuilder.build();\n- this.requestHeader.setContentType(MediaType.APPLICATION_JSON);\n+ public TanVerifier(VerificationServerClient verificationServerClient) {\n+ this.verificationServerClient = verificationServerClient;\n }\n \n /**\n * Verifies the specified TAN. Returns {@literal true} if the specified TAN is valid, {@literal false} otherwise.\n *\n- * @param tan Submission Authorization TAN\n+ * @param tanString Submission Authorization TAN\n * @return {@literal true} if the specified TAN is valid, {@literal false} otherwise.\n * @throws RestClientException if status code is neither 2xx nor 4xx\n */\n- public boolean verifyTan(String tan) {\n- String trimmedTan = tan.trim();\n-\n- if (!checkTanSyntax(trimmedTan)) {\n- logger.debug(\"TAN Syntax check failed for TAN: {}\", trimmedTan);\n- return false;\n- }\n-\n- return verifyWithVerificationService(trimmedTan);\n- }\n-\n- /**\n- * Verifies if the provided TAN can be parsed as a UUID.\n- *\n- * @param tan Submission Authorization TAN\n- * @return {@literal true} if tan can be parsed as a UUID, {@literal false} otherwise\n- */\n- private boolean checkTanSyntax(String tan) {\n+ public boolean verifyTan(String tanString) {\n try {\n- UUID.fromString(tan);\n- return true;\n+ Tan tan = Tan.of(tanString);\n+\n+ return verifyWithVerificationService(tan);\n } catch (IllegalArgumentException e) {\n- logger.debug(\"UUID creation failed for value: {}\", tan, e);\n+ logger.debug(\"TAN Syntax check failed for TAN: {}\", tanString.trim());\n return false;\n }\n }\n@@ -101,16 +71,11 @@ private boolean checkTanSyntax(String tan) {\n * @return {@literal true} if verification service is able to verify the provided TAN, {@literal false} otherwise\n * @throws RestClientException if http status code is neither 2xx nor 404\n */\n- private boolean verifyWithVerificationService(String tan) {\n- String json = \"{ \\\"tan\\\": \\\"\" + tan + \"\\\" }\";\n- HttpEntity entity = new HttpEntity<>(json, requestHeader);\n-\n+ private boolean verifyWithVerificationService(Tan tan) {\n try {\n- ResponseEntity response = restTemplate.postForEntity(verificationServiceUrl, entity, String.class);\n- return response.getStatusCode().is2xxSuccessful();\n- } catch (HttpClientErrorException.NotFound e) {\n- // The verification service returns http status 404 if the TAN is invalid\n- logger.debug(\"TAN verification failed\");\n+ verificationServerClient.verifyTan(tan);\n+ return true;\n+ } catch (FeignException.NotFound e) {\n return false;\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/VerificationServerClient.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/VerificationServerClient.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/VerificationServerClient.java\n@@ -0,0 +1,42 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import org.springframework.cloud.openfeign.FeignClient;\n+import org.springframework.http.MediaType;\n+import org.springframework.web.bind.annotation.PostMapping;\n+\n+/**\n+ * This is a Spring Cloud Feign based HTTP client that allows type-safe HTTP calls\n+ * and abstract the implementation away.\n+ */\n+@FeignClient(name = \"verification-server\", url = \"${services.submission.verification.base-url}\")\n+public interface VerificationServerClient {\n+\n+ /**\n+ * This methods calls the verification service with the given\n+ * {#link tan}.\n+ * @param tan the tan to verify.\n+ * @return 404 when the tan is not valid.\n+ */\n+ @PostMapping(value = \"${services.submission.verification.path}\", consumes = MediaType.APPLICATION_JSON_VALUE)\n+ String verifyTan(Tan tan);\n+}\n", "test_patch": "diff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/FeignTestConfiguration.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/FeignTestConfiguration.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/FeignTestConfiguration.java\n@@ -0,0 +1,35 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import org.springframework.boot.autoconfigure.http.HttpMessageConverters;\n+import org.springframework.boot.test.context.TestConfiguration;\n+import org.springframework.context.annotation.Bean;\n+import org.springframework.context.annotation.Profile;\n+\n+@TestConfiguration\n+@Profile(\"feign\")\n+public class FeignTestConfiguration {\n+ @Bean\n+ public HttpMessageConverters httpMessageConverters() {\n+ return new HttpMessageConverters();\n+ }\n+}\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanTest.java\n@@ -0,0 +1,49 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.assertj.core.api.Assertions.assertThatThrownBy;\n+\n+import java.util.UUID;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+\n+class TanTest {\n+ @ParameterizedTest\n+ @ValueSource(strings = {\n+ \"ANY SYNTAX\", \"123456\", \"ABCD23X\", \"ZZZZZZZ\", \"Bearer 3123fe\", \"\", \"&%$\u00a7&%&$%/%&\",\n+ \"LOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOONG\"\n+ })\n+ void invalidTanShouldThrowException(String invalidSyntaxTan) {\n+ assertThatThrownBy(() -> Tan.of(invalidSyntaxTan)).isInstanceOf(IllegalArgumentException.class);\n+ }\n+\n+ @Test\n+ void validTanShouldReturnTanInstance() {\n+ String tanString = UUID.randomUUID().toString();\n+ Tan tan = Tan.of(tanString);\n+\n+ assertThat(tan).isNotNull();\n+ assertThat(tan.toString()).isEqualTo(tanString);\n+ }\n+}\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java\n@@ -7,9 +7,9 @@\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n- * \n+ *\n * http://www.apache.org/licenses/LICENSE-2.0\n- * \n+ *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n@@ -21,87 +21,99 @@\n package app.coronawarn.server.services.submission.verification;\n \n \n-import static org.assertj.core.api.Assertions.assertThat;\n-import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n-import static org.springframework.test.web.client.match.MockRestRequestMatchers.method;\n-import static org.springframework.test.web.client.match.MockRestRequestMatchers.requestTo;\n-import static org.springframework.test.web.client.response.MockRestResponseCreators.withStatus;\n-\n import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n-import java.util.UUID;\n+import com.github.tomakehurst.wiremock.WireMockServer;\n+import feign.FeignException;\n+import org.junit.jupiter.api.AfterAll;\n+import org.junit.jupiter.api.BeforeAll;\n import org.junit.jupiter.api.BeforeEach;\n import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.params.ParameterizedTest;\n-import org.junit.jupiter.params.provider.ValueSource;\n import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n-import org.springframework.boot.test.autoconfigure.web.client.RestClientTest;\n-import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n-import org.springframework.http.HttpMethod;\n+import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.cloud.openfeign.EnableFeignClients;\n+import org.springframework.cloud.openfeign.FeignAutoConfiguration;\n+import org.springframework.context.annotation.Import;\n import org.springframework.http.HttpStatus;\n-import org.springframework.test.context.ContextConfiguration;\n-import org.springframework.test.web.client.ExpectedCount;\n-import org.springframework.test.web.client.MockRestServiceServer;\n-import org.springframework.web.client.HttpServerErrorException;\n+import org.springframework.http.MediaType;\n+import org.springframework.test.context.ActiveProfiles;\n \n-@EnableConfigurationProperties(value = SubmissionServiceConfig.class)\n-@ContextConfiguration(classes = {TanVerifier.class},\n- initializers = ConfigFileApplicationContextInitializer.class)\n-@RestClientTest\n-class TanVerifierTest {\n+import java.util.UUID;\n \n- @Autowired\n- private MockRestServiceServer server;\n+import static com.github.tomakehurst.wiremock.client.WireMock.*;\n+import static com.github.tomakehurst.wiremock.core.WireMockConfiguration.options;\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n+import static org.springframework.http.HttpHeaders.CONTENT_TYPE;\n \n+@SpringBootTest(\n+ classes = {FeignAutoConfiguration.class, TanVerifier.class})\n+@EnableConfigurationProperties(value = SubmissionServiceConfig.class)\n+@EnableFeignClients\n+@Import(FeignTestConfiguration.class)\n+@ActiveProfiles(\"feign\")\n+class TanVerifierTest {\n @Autowired\n private TanVerifier tanVerifier;\n \n @Autowired\n private SubmissionServiceConfig submissionServiceConfig;\n \n- private String verificationUrl;\n+ private String verificationPath;\n private String randomUUID;\n+ private static WireMockServer server;\n+\n+ @BeforeAll\n+ static void setupWireMock() {\n+ server = new WireMockServer(options().port(1234));\n+ server.start();\n+ }\n \n @BeforeEach\n void setup() {\n- this.verificationUrl = submissionServiceConfig.getVerificationBaseUrl()\n- + submissionServiceConfig.getVerificationPath();\n+ this.verificationPath = submissionServiceConfig.getVerificationPath();\n this.randomUUID = UUID.randomUUID().toString();\n+ server.resetAll();\n }\n \n- @ParameterizedTest\n- @ValueSource(strings = {\n- \"ANY SYNTAX\", \"123456\", \"ABCD23X\", \"ZZZZZZZ\", \"Bearer 3123fe\", \"\", \"&%$\u00a7&%&$%/%&\",\n- \"LOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOONG\"\n- })\n- void checkWrongTanSyntax(String invalidSyntaxTan) {\n- assertThat(tanVerifier.verifyTan(invalidSyntaxTan)).isFalse();\n+ @AfterAll\n+ static void tearDown() {\n+ server.stop();\n }\n \n @Test\n void checkValidTan() {\n- this.server\n- .expect(ExpectedCount.once(), requestTo(verificationUrl))\n- .andExpect(method(HttpMethod.POST))\n- .andRespond(withStatus(HttpStatus.OK));\n- assertThat(tanVerifier.verifyTan(randomUUID)).isTrue();\n+ server.stubFor(\n+ post(urlEqualTo(verificationPath))\n+ .withRequestBody(matchingJsonPath(\"tan\", equalTo(randomUUID)))\n+ .withHeader(CONTENT_TYPE, equalTo(MediaType.APPLICATION_JSON.toString()))\n+ .willReturn(aResponse().withStatus(HttpStatus.OK.value())));\n+\n+ boolean tanVerificationResponse = tanVerifier.verifyTan(randomUUID);\n+\n+ assertThat(tanVerificationResponse).isTrue();\n }\n \n @Test\n void checkInvalidTan() {\n- this.server\n- .expect(ExpectedCount.once(), requestTo(verificationUrl))\n- .andExpect(method(HttpMethod.POST))\n- .andRespond(withStatus(HttpStatus.NOT_FOUND));\n- assertThat(tanVerifier.verifyTan(randomUUID)).isFalse();\n+ server.stubFor(\n+ post(urlEqualTo(verificationPath))\n+ .withHeader(CONTENT_TYPE, equalTo(MediaType.APPLICATION_JSON.toString()))\n+ .willReturn(aResponse().withStatus(HttpStatus.NOT_FOUND.value())));\n+\n+ boolean tanVerificationResponse = tanVerifier.verifyTan(randomUUID);\n+\n+ assertThat(tanVerificationResponse).isFalse();\n }\n \n @Test\n void checkInternalServerError() {\n- this.server\n- .expect(ExpectedCount.once(), requestTo(verificationUrl))\n- .andExpect(method(HttpMethod.POST))\n- .andRespond(withStatus(HttpStatus.INTERNAL_SERVER_ERROR));\n- assertThatExceptionOfType(HttpServerErrorException.class).isThrownBy(() -> tanVerifier.verifyTan(randomUUID));\n+ server.stubFor(\n+ post(urlEqualTo(verificationPath))\n+ .withHeader(CONTENT_TYPE, equalTo(MediaType.APPLICATION_JSON.toString()))\n+ .willReturn(aResponse().withStatus(HttpStatus.INTERNAL_SERVER_ERROR.value())));\n+\n+ assertThatExceptionOfType(FeignException.class).isThrownBy(() -> tanVerifier.verifyTan(randomUUID));\n }\n+\n }\ndiff --git a/services/submission/src/test/resources/application.yaml b/services/submission/src/test/resources/application.yaml\n--- a/services/submission/src/test/resources/application.yaml\n+++ b/services/submission/src/test/resources/application.yaml\n@@ -30,5 +30,5 @@ services:\n payload:\n max-number-of-keys: 14\n verification:\n- base-url: http://verificationService:1234\n+ base-url: http://localhost:1234\n path: /version/v1/tan/verify\n", "problem_statement": "Use typed client and entities for tan verification\n## Current Implementation\r\nThe current tan verification look like this:\r\nhttps://github.com/corona-warn-app/cwa-server/blob/3b98beb268bac511c00f8e13bcbb4978a8cdb4fd/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java#L102-L115\r\n\r\nThere are a couple of issues I would see here:\r\n1. The tan entity is build from a string which can cause bugs, encoding issues an more.\r\n2. When the interface of the verification server changes (and this a repo owned by the same organization) this has to be modified as well and can cause runtime bugs without proper system testing\r\n\r\n## Suggested Enhancement\r\nI would suggest two things\r\n1. Create a DTO (Pojo) for the tan payload and pass that to the rest template to let Jackson handle serialization\r\n2. If a dependency between cwa projects is \"allowed\" (which I would think is perfectly fine) I would actually move that entity to the verification server project in a separate maven module. I would add [Spring Feign client ](https://cloud.spring.io/spring-cloud-netflix/multi/multi_spring-cloud-feign.html) and use that in the CWA server. Feign is like the reverse version of `@RestController` and supports the same annotations. It will create the client implementation from the given interface at runtime.\r\n\r\nThe client would look like this:\r\n\r\n```\r\n@FeignClient(name = \"verification-server\", url = \"${services.submission.verification.baseUrl}\")\r\npublic interface StoreClient {\r\n\r\n @RequestMapping(method = RequestMethod.POST, value = \"${services.submission.verification.path}\", consumes = \"application/json\")\r\n ValidationResult validateTan(Tan tan); // both classes should be Pojos\r\n}\r\n```\r\n\r\nThe usage would look like this (I did not actually implemented that!):\r\n\r\n```\r\n private boolean verifyWithVerificationService(String tanString) {\r\n Tan tan = Tan.from(tanString); // This should also do the UUID verification!\r\n \r\n ValidationResult result = verificationServer.validateTan(tan);\r\n\r\n return result != null;\r\n }\r\n```\r\n\r\n## Expected Benefits\r\n- Compilation breaks when interface changes\r\n- Less risk of bugs\r\n\n", "hints_text": "I like those suggestions. The introduction of a value object for a TAN is something I thought about suggesting as well. Would bind the verification logic into a value and make the using code more expressive and safe.\r\n\r\nAlthough I am more of a hypermedia guy and thus not a big fan of hard coding URIs in clients, I think Feign would be fine here, although I think that \u2013 unless also used in other places \u2013 the benefit of using that over `RestTemplate`/`WebClient` is not that significant.\r\n\r\nWhat I do think needs improvement is the setup of whatever client API is ended up being used. Remote calls definitely need a timeout as otherwise the system is stuck in case the downstream service is not answering at all for whatever reasons.\nAlso, from a security perspective this implementation shall be changed. When building the json string this way, a malicious tan can inject arbitrary fields to the json object. Even if the tan is previously checked for the correct syntax in another method, this implementation is error-prone. The syntax check for the tan can be called directly before creating the json string or the tan can be filtered with an whitelist approach.\r\n\r\nI assume the previously mentioned changes will also tackle the injection issue. \nI haven't really looked at the verification server but calling as POST to verify a TAN seems to me a bit unRESTy to be honest. But this is probably worth another issue...\n> I haven't really looked at the verification server but calling as POST to verify a TAN seems to me a bit unRESTy to be honest. But this is probably worth another issue...\r\n\r\nIt actually explained in the documentation:\r\n\r\n> The HTTP method POST is used instead of GET for added security, so data (e.g. the registration token or the TAN) can be transferred in the body.\r\n\r\nHowever, I would still doubt that it's necessary. \r\n\r\nCorrect me if I'm wrong, but when doing backend-to-backend http call, the whole request - both URL params and and body - are within the same TCP packet. So as long as either:\r\n- Both backends are within a secure environment or\r\n- The use TLS\r\nI don't think moving the tan to the body helps to improve security in any way.\r\n\r\nThis is probably only important when doing a frontend-to-backend call which is not the case here.\r\n\nWe have discussed and would like to proceed with the FeignClient, however, with the approach of keeping the java class entity on cwa-server, simply having one attribute 'tan'\n> > I haven't really looked at the verification server but calling as POST to verify a TAN seems to me a bit unRESTy to be honest. But this is probably worth another issue...\r\n> \r\n> It actually explained in the documentation:\r\n> \r\n> > The HTTP method POST is used instead of GET for added security, so data (e.g. the registration token or the TAN) can be transferred in the body.\r\n> \r\n> However, I would still doubt that it's necessary.\r\n> \r\n> Correct me if I'm wrong, but when doing backend-to-backend http call, the whole request - both URL params and and body - are within the same TCP packet. So as long as either:\r\n> \r\n> * Both backends are within a secure environment or\r\n> * The use TLS\r\n> I don't think moving the tan to the body helps to improve security in any way.\r\n> \r\n> This is probably only important when doing a frontend-to-backend call which is not the case here.\r\n\r\nThe main reason to go with POST here (which transports the secret in the http body) is due to the sensitive nature of the TAN. We don't want the TAN to come up in any of our infrastructure / http access logs by chance. \r\n\r\nThis does not only apply to TANs but to all other sensitive data we are processing.\nI'm working on a PR.", "created_at": "2020-05-30T17:08:20Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 388, "instance_id": "corona-warn-app__cwa-server-388", "issue_numbers": ["289"], "base_commit": "00a342298942773ee49eeea9387a2acd164c3d49", "patch": "diff --git a/common/persistence/pom.xml b/common/persistence/pom.xml\n--- a/common/persistence/pom.xml\n+++ b/common/persistence/pom.xml\n@@ -78,7 +78,7 @@\n \n com.h2database\n h2\n- 1.4.199\n+ 1.4.200\n runtime\n \n \ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n@@ -29,9 +29,8 @@\n import java.util.Arrays;\n import java.util.Objects;\n import java.util.Set;\n+import javax.persistence.Column;\n import javax.persistence.Entity;\n-import javax.persistence.GeneratedValue;\n-import javax.persistence.GenerationType;\n import javax.persistence.Id;\n import javax.persistence.Table;\n import javax.validation.ConstraintViolation;\n@@ -57,10 +56,8 @@ public class DiagnosisKey {\n private static final Validator VALIDATOR = Validation.buildDefaultValidatorFactory().getValidator();\n \n @Id\n- @GeneratedValue(strategy = GenerationType.IDENTITY)\n- private Long id;\n-\n @Size(min = 16, max = 16, message = \"Key data must be a byte array of length 16.\")\n+ @Column(unique = true)\n private byte[] keyData;\n \n @ValidRollingStartIntervalNumber\n@@ -100,10 +97,6 @@ public static Builder builder() {\n return new DiagnosisKeyBuilder();\n }\n \n- public Long getId() {\n- return id;\n- }\n-\n /**\n * Returns the diagnosis key.\n */\n@@ -189,14 +182,13 @@ public boolean equals(Object o) {\n && rollingPeriod == that.rollingPeriod\n && transmissionRiskLevel == that.transmissionRiskLevel\n && submissionTimestamp == that.submissionTimestamp\n- && Objects.equals(id, that.id)\n && Arrays.equals(keyData, that.keyData);\n }\n \n @Override\n public int hashCode() {\n int result = Objects\n- .hash(id, rollingStartIntervalNumber, rollingPeriod, transmissionRiskLevel, submissionTimestamp);\n+ .hash(rollingStartIntervalNumber, rollingPeriod, transmissionRiskLevel, submissionTimestamp);\n result = 31 * result + Arrays.hashCode(keyData);\n return result;\n }\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n@@ -22,6 +22,8 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import org.springframework.data.jpa.repository.JpaRepository;\n+import org.springframework.data.jpa.repository.Modifying;\n+import org.springframework.data.jpa.repository.Query;\n import org.springframework.stereotype.Repository;\n \n @Repository\n@@ -33,4 +35,22 @@ public interface DiagnosisKeyRepository extends JpaRepository diagnosisKeys) {\n- keyRepository.saveAll(diagnosisKeys);\n+ for (DiagnosisKey diagnosisKey : diagnosisKeys) {\n+ keyRepository.saveDoNothingOnConflict(\n+ diagnosisKey.getKeyData(), diagnosisKey.getRollingStartIntervalNumber(), diagnosisKey.getRollingPeriod(),\n+ diagnosisKey.getSubmissionTimestamp(), diagnosisKey.getTransmissionRiskLevel());\n+ }\n }\n \n /**\ndiff --git a/common/persistence/src/main/resources/db/migration/h2/V3__makeKeyDataPrimaryKey.sql b/common/persistence/src/main/resources/db/migration/h2/V3__makeKeyDataPrimaryKey.sql\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/resources/db/migration/h2/V3__makeKeyDataPrimaryKey.sql\n@@ -0,0 +1,3 @@\n+ALTER TABLE diagnosis_key DROP COLUMN id;\n+ALTER TABLE diagnosis_key ALTER COLUMN key_data SET NOT NULL;\n+ALTER TABLE diagnosis_key ADD PRIMARY KEY (key_data);\n\\ No newline at end of file\ndiff --git a/common/persistence/src/main/resources/db/migration/postgres/V3__makeKeyDataPrimaryKey.sql b/common/persistence/src/main/resources/db/migration/postgres/V3__makeKeyDataPrimaryKey.sql\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/resources/db/migration/postgres/V3__makeKeyDataPrimaryKey.sql\n@@ -0,0 +1,3 @@\n+ALTER TABLE diagnosis_key DROP COLUMN id;\n+ALTER TABLE diagnosis_key ALTER COLUMN key_data SET NOT NULL;\n+ALTER TABLE diagnosis_key ADD PRIMARY KEY (key_data);\n\\ No newline at end of file\n", "test_patch": "diff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n@@ -33,6 +33,7 @@\n import java.util.ArrayList;\n import java.util.Collections;\n import java.util.List;\n+import java.util.Random;\n import org.assertj.core.util.Lists;\n import org.junit.jupiter.api.AfterEach;\n import org.junit.jupiter.api.DisplayName;\n@@ -149,9 +150,34 @@ void testNoPersistOnValidationError() {\n assertDiagnosisKeysEqual(Lists.emptyList(), actKeys);\n }\n \n+ @Test\n+ void shouldNotUpdateExistingKey() {\n+ var keyData = \"1234567890123456\";\n+ var keys = List.of(DiagnosisKey.builder()\n+ .withKeyData(keyData.getBytes())\n+ .withRollingStartIntervalNumber(600)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(0L).build(),\n+ DiagnosisKey.builder()\n+ .withKeyData(keyData.getBytes())\n+ .withRollingStartIntervalNumber(600)\n+ .withTransmissionRiskLevel(3)\n+ .withSubmissionTimestamp(0L).build());\n+\n+ diagnosisKeyService.saveDiagnosisKeys(keys);\n+\n+ var actKeys = diagnosisKeyService.getDiagnosisKeys();\n+\n+ assertThat(actKeys.size()).isEqualTo(1);\n+ assertThat(actKeys.iterator().next().getTransmissionRiskLevel()).isEqualTo(2);\n+ }\n+\n public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n+ byte[] randomBytes = new byte[16];\n+ Random random = new Random(submissionTimeStamp);\n+ random.nextBytes(randomBytes);\n return DiagnosisKey.builder()\n- .withKeyData(new byte[16])\n+ .withKeyData(randomBytes)\n .withRollingStartIntervalNumber(600)\n .withTransmissionRiskLevel(2)\n .withSubmissionTimestamp(submissionTimeStamp).build();\ndiff --git a/common/persistence/src/test/resources/application.yaml b/common/persistence/src/test/resources/application.yaml\n--- a/common/persistence/src/test/resources/application.yaml\n+++ b/common/persistence/src/test/resources/application.yaml\n@@ -1,5 +1,8 @@\n ---\n spring:\n+ test:\n+ database:\n+ replace: none\n flyway:\n enabled: false\n jpa:\n@@ -8,6 +11,10 @@ spring:\n properties:\n hibernate:\n show_sql: false\n+ datasource:\n+ url: jdbc:h2:mem:test;MODE=PostgreSQL\n+ driverClassName: org.h2.Driver\n+ platform: h2\n main:\n banner-mode: off\n logging:\ndiff --git a/services/submission/src/test/resources/application.yaml b/services/submission/src/test/resources/application.yaml\n--- a/services/submission/src/test/resources/application.yaml\n+++ b/services/submission/src/test/resources/application.yaml\n@@ -11,7 +11,13 @@ spring:\n enabled: true\n # default case is H2 - value will be overwritten by profile cloud or postgres\n locations: classpath:db/migration/h2\n-\n+ datasource:\n+ url: jdbc:h2:mem:test;MODE=PostgreSQL\n+ driverClassName: org.h2.Driver\n+ platform: h2\n+ test:\n+ database:\n+ replace: none\n jpa:\n hibernate:\n ddl-auto: validate\n", "problem_statement": "Ensure uniqueness of diagnosis keys\n## Current Implementation\r\nThe uniqueness of diagnosis keys is neither guaranteed by the database, nor by validation logic.\r\n\r\n## Suggested Enhancement\r\nEnsure that diagnosis keys in the database are unique (there are no duplicates).\r\n\r\nWhat needs to be decided:\r\n- [x] Is it sufficient to guarantee the uniqueness of the diagnosis key or should the uniqueness of diagnosis key + submission timestamp (+maybe even more fields) be guaranteed?\r\n- [x] Should the duplicate check happen on the database (`UNIQUE` constraint) or in the server logic (e.g. during the validation of submitted keys)?\r\n- [x] If the check happens on the database: Should the `id` column be removed and replaced with the diagnosis key (+submission timestamp) as (composite) primary key?\r\n- [x] How should the server react when a duplicate diagnosis key is submitted (update, error, etc.)?\r\n\r\n**Edit:** Decisions are below.\n", "hints_text": "Decisions made by @christian-kirschnick:\r\n- Ensuring the uniqueness of the diagnosis key is sufficient\r\n- Duplicate check should happen on the database\r\n- `id` column should be removed\r\n- `key_data` column should become primary key\r\n- If we encounter problems with the current type (`bytea`) of `key_data` as primary key, then change the type to a base64 encoded String\r\n- When duplicate keys are submitted, the server should just ignore them (no update, no error).\n@pithumke Was referenced back to here from a different issue, What would be the value of base64 encoding the UUID? it'll just take up even more space than even using char(32). there is a UUID type already in pg that'll give better seek performance and cost 16 bytes per entry instead of 32\r\n\r\nAbout the risk of collision itself, with UUIDv4 that is quite unlikely even with billions of records, However if you don't want to suffer the occasional exception on the server side you can just add `ON CONFLICT DO NOTHING` to swallow the error \nHi @oiime, thank you for the remarks! Good point with the UUID type, I'll bring it up in the team discussions and report back. However, please note that, to my knowledge, the type of the diagnosis keys is not explicitly stated as UUID by the Google/Apple spec, but only as \"Data\" (see [here](https://developer.apple.com/documentation/exposurenotification/entemporaryexposurekey/3583679-keydata)) containing 16 bytes (see [here](https://www.blog.google/documents/60/Exposure_Notification_-_Cryptography_Specification_v1.1.pdf)). This can, in theory, be mapped to a UUID, but I would like to investigate if the PG UUID type implies any restrictions. For example, UUIDv4 reserves 6 of the 128 bits for version information, leaving only 122 bits for the payload (see [here](https://en.wikipedia.org/wiki/Universally_unique_identifier#Version_4_(random))) - and this would cause major problems for us.\r\n\r\nRegarding the collisions: we currently also don't see this as a major risk. Our current strategy, as you proposed, is to simply ignore duplicates.\n@pithumke Well, you're the one defining both the client and the server side, the EN API is agnostic to its content to allow that freedom of implementation, so you can define that key to be whatever you want it to be, currently you are validating it as UUID in the server and the test case generates a UUIDv4. the UUID data type follows RFC 4122 as you would expect and would naturally cover UUIDv4. All UUID versions reserve a place for version information. _please_ do not try to come up with your own UUID variant if that is what is suggested here\nHi @oiime, thank you for your comment.\r\n\r\n> Well, you're the one defining both the client and the server side, the EN API is agnostic to its content to allow that freedom of implementation, so you can define that key to be whatever you want it to be\r\n\r\nYes, we do specify and develop both the CWA server and client. However, we neither specify nor develop the on-device APIs - that is done by Apple and Google. Inside those on-device APIs is where the keys are being generated and that does not give us much freedom regarding data types on our end. In the specification it is stated, that the key data consists of 16 bytes (= 128 bits). Since the use of UUID would restrict that to 122 bits, we can not use it as the column type on postgres.\r\n\r\n> currently you are validating it as UUID in the server and the test case generates a UUIDv4\r\n\r\nI am not aware of any UUID handling in our current code base, besides for TANs (which are not stored on the server). Can you please link which specific code you are referring to?\r\n\r\n> please do not try to come up with your own UUID variant if that is what is suggested here\r\n\r\nI didn't mean to suggest that and we don't want to come up with an own UUID variant. This is why we decided to go for a base64 encoded string for now (if bytea turns out to cause problems).\n@pithumke \r\n\r\n> However, we neither specify nor develop the on-device API\r\n\r\nI guess I rely on looking at the API itself, perhaps apple or google or both have a specific implementation they mandate or suggest, if that is the case then using UUID is wrong anyway \r\n\r\n> I am not aware of any UUID handling in our current code base, besides for TANs\r\n\r\nI am likely conflating the two, I have only skimmed through the code and what I recalled was the test generating UUIDv4\r\n\r\n> I didn't mean to suggest that and we don't want to come up with an own UUID variant. This is why we decided to go for a base64 encoded string for now (if bytea turns out to cause problems).\r\n\r\nbase64 seems like an unnecessary step that'll just take up more space and computation, you do it to avoid just storing it in a char(16) as-is? though I don't see why bytea wouldn't work as a PK, especially as you'd never update it\r\n", "created_at": "2020-05-30T23:22:36Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 406, "instance_id": "corona-warn-app__cwa-server-406", "issue_numbers": ["108"], "base_commit": "fd114fd04e36c36c8081e0286e3f3fd27170777e", "patch": "diff --git a/README.md b/README.md\n--- a/README.md\n+++ b/README.md\n@@ -148,7 +148,7 @@ Profile | Effect\n -----------------|-------------\n `dev` | Turns the log level to `DEBUG`.\n `cloud` | Removes default values for the `datasource` and `objectstore` configurations.\n-`demo` | Includes incomplete days and hours into the distribution run, thus creating aggregates for the current day and the current hour (and including both in the respective indices). When running multiple distributions in one hour with this profile, the date aggregate for today and the hours aggregate for the current hour will be updated and overwritten.\n+`demo` | Includes incomplete days and hours into the distribution run, thus creating aggregates for the current day and the current hour (and including both in the respective indices). When running multiple distributions in one hour with this profile, the date aggregate for today and the hours aggregate for the current hour will be updated and overwritten. This profile also turns off the expiry policy (Keys must be expired for at least 2 hours before distribution) and the shifting policy (there must be at least 140 keys in a distribution).\n `testdata` | Causes test data to be inserted into the database before each distribution run. By default, around 1000 random diagnosis keys will be generated per hour. If there are no diagnosis keys in the database yet, random keys will be generated for every hour from the beginning of the retention period (14 days ago at 00:00 UTC) until one hour before the present hour. If there are already keys in the database, the random keys will be generated for every hour from the latest diagnosis key in the database (by submission timestamp) until one hour before the present hour (or none at all, if the latest diagnosis key in the database was submitted one hour ago or later).\n `signature-dev` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp-dev` so that test certificates (instead of production certificates) will be used for client-side validation.\n `signature-prod` | Provides production app package IDs for the signature info\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DiagnosisKeysDirectory;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n@@ -29,6 +30,7 @@\n import java.util.Collection;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.stereotype.Component;\n \n /**\n@@ -40,6 +42,8 @@ public class DiagnosisKeysStructureProvider {\n private static final Logger logger = LoggerFactory\n .getLogger(DiagnosisKeysStructureProvider.class);\n \n+ @Autowired\n+ private DiagnosisKeyBundler diagnosisKeyBundler;\n private final DiagnosisKeyService diagnosisKeyService;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n@@ -56,11 +60,13 @@ public class DiagnosisKeysStructureProvider {\n \n /**\n * Get directory for diagnosis keys from database.\n+ *\n * @return the directory\n */\n public Directory getDiagnosisKeys() {\n logger.debug(\"Querying diagnosis keys from the database...\");\n Collection diagnosisKeys = diagnosisKeyService.getDiagnosisKeys();\n- return new DiagnosisKeysDirectory(diagnosisKeys, cryptoProvider, distributionServiceConfig);\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys);\n+ return new DiagnosisKeysDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java\n@@ -0,0 +1,61 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static java.util.stream.Collectors.groupingBy;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.List;\n+import org.springframework.context.annotation.Profile;\n+\n+/**\n+ * An instance of this class contains a collection of {@link DiagnosisKey DiagnosisKeys}, that will be distributed\n+ * in the same hour they have been submitted.\n+ */\n+@Profile(\"demo\")\n+public class DemoDiagnosisKeyBundler extends DiagnosisKeyBundler {\n+\n+ public DemoDiagnosisKeyBundler(DistributionServiceConfig distributionServiceConfig) {\n+ super(distributionServiceConfig);\n+ }\n+\n+ /**\n+ * Initializes the internal {@code distributableDiagnosisKeys} map, grouping the diagnosis keys by the submission\n+ * timestamp, thus ignoring the expiry policy.\n+ */\n+ @Override\n+ protected void createDiagnosisKeyDistributionMap(Collection diagnosisKeys) {\n+ this.distributableDiagnosisKeys.clear();\n+ this.distributableDiagnosisKeys.putAll(diagnosisKeys.stream().collect(groupingBy(this::getSubmissionDateTime)));\n+ }\n+\n+ /**\n+ * Returns all diagnosis keys that should be distributed in a specific hour, without respecting the shifting and\n+ * expiry policies.\n+ */\n+ @Override\n+ public List getDiagnosisKeysDistributableAt(LocalDateTime hour) {\n+ return this.getDiagnosisKeysForHour(hour);\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n@@ -0,0 +1,98 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.ONE_HOUR_INTERVAL_SECONDS;\n+import static java.time.ZoneOffset.UTC;\n+import static java.util.Collections.emptyList;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.HashMap;\n+import java.util.List;\n+import java.util.Map;\n+import java.util.Optional;\n+import java.util.stream.Collectors;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * An instance of this class contains a collection of {@link DiagnosisKey DiagnosisKeys}.\n+ */\n+@Component\n+public abstract class DiagnosisKeyBundler {\n+\n+ protected final int minNumberOfKeysPerBundle;\n+ protected final long expiryPolicyMinutes;\n+\n+ // A map containing diagnosis keys, grouped by the LocalDateTime on which they may be distributed\n+ protected final Map> distributableDiagnosisKeys = new HashMap<>();\n+\n+ public DiagnosisKeyBundler(DistributionServiceConfig distributionServiceConfig) {\n+ this.minNumberOfKeysPerBundle = distributionServiceConfig.getShiftingPolicyThreshold();\n+ this.expiryPolicyMinutes = distributionServiceConfig.getExpiryPolicyMinutes();\n+ }\n+\n+ /**\n+ * Sets the {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler} and calls {@link\n+ * DiagnosisKeyBundler#createDiagnosisKeyDistributionMap}.\n+ */\n+ public void setDiagnosisKeys(Collection diagnosisKeys) {\n+ createDiagnosisKeyDistributionMap(diagnosisKeys);\n+ }\n+\n+ /**\n+ * Returns all {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler}.\n+ */\n+ public List getAllDiagnosisKeys() {\n+ return this.distributableDiagnosisKeys.values().stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ }\n+\n+ /**\n+ * Initializes the internal {@code distributableDiagnosisKeys} map, which should contain all diagnosis keys, grouped\n+ * by the LocalDateTime on which they may be distributed.\n+ */\n+ protected abstract void createDiagnosisKeyDistributionMap(Collection diagnosisKeys);\n+\n+ /**\n+ * Returns all diagnosis keys that should be distributed in a specific hour.\n+ */\n+ public abstract List getDiagnosisKeysDistributableAt(LocalDateTime hour);\n+\n+ /**\n+ * Returns the submission timestamp of a {@link DiagnosisKey} as a {@link LocalDateTime}.\n+ */\n+ protected LocalDateTime getSubmissionDateTime(DiagnosisKey diagnosisKey) {\n+ return LocalDateTime.ofEpochSecond(diagnosisKey.getSubmissionTimestamp() * ONE_HOUR_INTERVAL_SECONDS, 0, UTC);\n+ }\n+\n+ /**\n+ * Returns all diagnosis keys that should be distributed in a specific hour.\n+ */\n+ protected List getDiagnosisKeysForHour(LocalDateTime hour) {\n+ return Optional\n+ .ofNullable(this.distributableDiagnosisKeys.get(hour))\n+ .orElse(emptyList());\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java\n@@ -0,0 +1,135 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.TEN_MINUTES_INTERVAL_SECONDS;\n+import static java.time.ZoneOffset.UTC;\n+import static java.util.Collections.emptyList;\n+import static java.util.stream.Collectors.groupingBy;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.Duration;\n+import java.time.LocalDateTime;\n+import java.time.temporal.ChronoUnit;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Optional;\n+import java.util.stream.Collectors;\n+import java.util.stream.Stream;\n+import org.springframework.context.annotation.Profile;\n+\n+/**\n+ * An instance of this class contains a collection of {@link DiagnosisKey DiagnosisKeys}, that will be distributed while\n+ * respecting expiry policy (keys must be expired for a configurable amount of time before distribution) and shifting\n+ * policy (there must be at least a configurable number of keys in a distribution). The policies are configurable\n+ * through the properties {@code expiry-policy-minutes} and {@code shifting-policy-threshold}.\n+ */\n+@Profile(\"!demo\")\n+public class ProdDiagnosisKeyBundler extends DiagnosisKeyBundler {\n+\n+ /**\n+ * Creates a new {@link ProdDiagnosisKeyBundler}.\n+ */\n+ public ProdDiagnosisKeyBundler(DistributionServiceConfig distributionServiceConfig) {\n+ super(distributionServiceConfig);\n+ }\n+\n+ /**\n+ * Initializes the internal {@code distributableDiagnosisKeys} map, grouping the diagnosis keys by the date on which\n+ * they may be distributed, while respecting the expiry policy.\n+ */\n+ @Override\n+ protected void createDiagnosisKeyDistributionMap(Collection diagnosisKeys) {\n+ this.distributableDiagnosisKeys.clear();\n+ this.distributableDiagnosisKeys.putAll(diagnosisKeys.stream().collect(groupingBy(this::getDistributionDateTime)));\n+ }\n+\n+ /**\n+ * Returns all diagnosis keys that should be distributed in a specific hour, while respecting the shifting and expiry\n+ * policies.\n+ */\n+ @Override\n+ public List getDiagnosisKeysDistributableAt(LocalDateTime hour) {\n+ List keysSinceLastDistribution = getKeysSinceLastDistribution(hour);\n+ if (keysSinceLastDistribution.size() >= minNumberOfKeysPerBundle) {\n+ return keysSinceLastDistribution;\n+ } else {\n+ return emptyList();\n+ }\n+ }\n+\n+ /**\n+ * Returns a all distributable keys between a specific hour and the last distribution (bundle that was above the\n+ * shifting threshold) or the earliest distributable key.\n+ */\n+ private List getKeysSinceLastDistribution(LocalDateTime hour) {\n+ Optional earliestDistributableTimestamp = getEarliestDistributableTimestamp();\n+ if (earliestDistributableTimestamp.isEmpty() || hour.isBefore(earliestDistributableTimestamp.get())) {\n+ return emptyList();\n+ }\n+ List distributableInCurrentHour = getDiagnosisKeysForHour(hour);\n+ if (distributableInCurrentHour.size() >= minNumberOfKeysPerBundle) {\n+ return distributableInCurrentHour;\n+ }\n+ LocalDateTime previousHour = hour.minusHours(1);\n+ Collection distributableInPreviousHour = getDiagnosisKeysDistributableAt(previousHour);\n+ if (distributableInPreviousHour.size() >= minNumberOfKeysPerBundle) {\n+ // Last hour was distributed, so we can not combine the current hour with the last hour\n+ return distributableInCurrentHour;\n+ } else {\n+ // Last hour was not distributed, so we can combine the current hour with the last hour\n+ return Stream.concat(distributableInCurrentHour.stream(), getKeysSinceLastDistribution(previousHour).stream())\n+ .collect(Collectors.toList());\n+ }\n+ }\n+\n+ private Optional getEarliestDistributableTimestamp() {\n+ return this.distributableDiagnosisKeys.keySet().stream().min(LocalDateTime::compareTo);\n+ }\n+\n+ /**\n+ * Returns the end of the rolling time window that a {@link DiagnosisKey} was active for as a {@link LocalDateTime}.\n+ */\n+ private LocalDateTime getExpiryDateTime(DiagnosisKey diagnosisKey) {\n+ return LocalDateTime\n+ .ofEpochSecond(diagnosisKey.getRollingStartIntervalNumber() * TEN_MINUTES_INTERVAL_SECONDS, 0, UTC)\n+ .plusMinutes(diagnosisKey.getRollingPeriod() * 10L);\n+ }\n+\n+ /**\n+ * Calculates the earliest point in time at which the specified {@link DiagnosisKey} can be distributed. Before keys\n+ * are allowed to be distributed, they must be expired for a configured amount of time.\n+ *\n+ * @return {@link LocalDateTime} at which the specified {@link DiagnosisKey} can be distributed.\n+ */\n+ private LocalDateTime getDistributionDateTime(DiagnosisKey diagnosisKey) {\n+ LocalDateTime submissionDateTime = getSubmissionDateTime(diagnosisKey);\n+ LocalDateTime expiryDateTime = getExpiryDateTime(diagnosisKey);\n+ long minutesBetweenExpiryAndSubmission = Duration.between(expiryDateTime, submissionDateTime).toMinutes();\n+ if (minutesBetweenExpiryAndSubmission <= expiryPolicyMinutes) {\n+ // truncatedTo floors the value, so we need to add an hour to the DISTRIBUTION_PADDING to compensate that.\n+ return expiryDateTime.plusMinutes(expiryPolicyMinutes + 60).truncatedTo(ChronoUnit.HOURS);\n+ } else {\n+ return submissionDateTime;\n+ }\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateAggregatingDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateIndexingDecorator;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n@@ -30,12 +31,11 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n-import java.util.Collection;\n import java.util.Set;\n \n public class DiagnosisKeysCountryDirectory extends IndexDirectoryOnDisk {\n \n- private final Collection diagnosisKeys;\n+ private final DiagnosisKeyBundler diagnosisKeyBundler;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n \n@@ -43,14 +43,14 @@ public class DiagnosisKeysCountryDirectory extends IndexDirectoryOnDisk\n * Constructs a {@link DiagnosisKeysCountryDirectory} instance that represents the {@code .../country/:country/...}\n * portion of the diagnosis key directory structure.\n *\n- * @param diagnosisKeys The diagnosis keys processed in the contained sub directories.\n- * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n+ * @param diagnosisKeyBundler A {@link DiagnosisKeyBundler} containing the {@link DiagnosisKey DiagnosisKeys}.\n+ * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n */\n- public DiagnosisKeysCountryDirectory(Collection diagnosisKeys,\n+ public DiagnosisKeysCountryDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig) {\n super(distributionServiceConfig.getApi().getCountryPath(), __ ->\n Set.of(distributionServiceConfig.getApi().getCountryGermany()), Object::toString);\n- this.diagnosisKeys = diagnosisKeys;\n+ this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n }\n@@ -58,7 +58,7 @@ public DiagnosisKeysCountryDirectory(Collection diagnosisKeys,\n @Override\n public void prepare(ImmutableStack indices) {\n this.addWritableToAll(__ -> {\n- DiagnosisKeysDateDirectory dateDirectory = new DiagnosisKeysDateDirectory(diagnosisKeys, cryptoProvider,\n+ DiagnosisKeysDateDirectory dateDirectory = new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider,\n distributionServiceConfig);\n return decorateDateDirectory(dateDirectory);\n });\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.HourIndexingDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n@@ -31,13 +32,12 @@\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n import java.time.format.DateTimeFormatter;\n-import java.util.Collection;\n \n public class DiagnosisKeysDateDirectory extends IndexDirectoryOnDisk {\n \n private static final DateTimeFormatter ISO8601 = DateTimeFormatter.ofPattern(\"yyyy-MM-dd\");\n \n- private final Collection diagnosisKeys;\n+ private final DiagnosisKeyBundler diagnosisKeyBundler;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n \n@@ -45,14 +45,15 @@ public class DiagnosisKeysDateDirectory extends IndexDirectoryOnDisk\n * Constructs a {@link DiagnosisKeysDateDirectory} instance associated with the specified {@link DiagnosisKey}\n * collection. Payload signing is be performed according to the specified {@link CryptoProvider}.\n *\n- * @param diagnosisKeys The diagnosis keys processed in the contained directories.\n+ * @param diagnosisKeyBundler A {@link DiagnosisKeyBundler} containing the {@link DiagnosisKey DiagnosisKeys}.\n * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n */\n- public DiagnosisKeysDateDirectory(Collection diagnosisKeys,\n+ public DiagnosisKeysDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig) {\n- super(distributionServiceConfig.getApi().getDatePath(), __ -> DateTime.getDates(diagnosisKeys), ISO8601::format);\n+ super(distributionServiceConfig.getApi().getDatePath(),\n+ __ -> DateTime.getDates(diagnosisKeyBundler.getAllDiagnosisKeys()), ISO8601::format);\n this.cryptoProvider = cryptoProvider;\n- this.diagnosisKeys = diagnosisKeys;\n+ this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.distributionServiceConfig = distributionServiceConfig;\n }\n \n@@ -60,7 +61,7 @@ public DiagnosisKeysDateDirectory(Collection diagnosisKeys,\n public void prepare(ImmutableStack indices) {\n this.addWritableToAll(__ -> {\n DiagnosisKeysHourDirectory hourDirectory =\n- new DiagnosisKeysHourDirectory(diagnosisKeys, cryptoProvider, distributionServiceConfig);\n+ new DiagnosisKeysHourDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig);\n return decorateHourDirectory(hourDirectory);\n });\n super.prepare(indices);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.CountryIndexingDecorator;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n@@ -31,7 +32,6 @@\n import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing.IndexingDecoratorOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import java.util.Collection;\n \n /**\n * A {@link Directory} containing the file and directory structure that mirrors the API defined in the OpenAPI\n@@ -42,7 +42,7 @@\n */\n public class DiagnosisKeysDirectory extends DirectoryOnDisk {\n \n- private final Collection diagnosisKeys;\n+ private final DiagnosisKeyBundler diagnosisKeyBundler;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n \n@@ -50,13 +50,13 @@ public class DiagnosisKeysDirectory extends DirectoryOnDisk {\n * Constructs a {@link DiagnosisKeysDirectory} based on the specified {@link DiagnosisKey} collection. Cryptographic\n * signing is performed using the specified {@link CryptoProvider}.\n *\n- * @param diagnosisKeys The diagnosis keys processed in the contained sub directories.\n- * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n+ * @param diagnosisKeyBundler A {@link DiagnosisKeyBundler} containing the {@link DiagnosisKey DiagnosisKeys}.\n+ * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n */\n- public DiagnosisKeysDirectory(Collection diagnosisKeys, CryptoProvider cryptoProvider,\n+ public DiagnosisKeysDirectory(DiagnosisKeyBundler diagnosisKeyBundler, CryptoProvider cryptoProvider,\n DistributionServiceConfig distributionServiceConfig) {\n super(distributionServiceConfig.getApi().getDiagnosisKeysPath());\n- this.diagnosisKeys = diagnosisKeys;\n+ this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n }\n@@ -64,7 +64,7 @@ public DiagnosisKeysDirectory(Collection diagnosisKeys, CryptoProv\n @Override\n public void prepare(ImmutableStack indices) {\n this.addWritable(decorateCountryDirectory(\n- new DiagnosisKeysCountryDirectory(diagnosisKeys, cryptoProvider, distributionServiceConfig)));\n+ new DiagnosisKeysCountryDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig)));\n super.prepare(indices);\n }\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.singing.DiagnosisKeySigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n@@ -36,28 +37,25 @@\n import java.time.LocalDate;\n import java.time.LocalDateTime;\n import java.time.ZoneOffset;\n-import java.util.Collection;\n-import java.util.Set;\n-import java.util.stream.Collectors;\n+import java.util.List;\n \n public class DiagnosisKeysHourDirectory extends IndexDirectoryOnDisk {\n \n- private final Collection diagnosisKeys;\n+ private final DiagnosisKeyBundler diagnosisKeyBundler;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n \n /**\n * Constructs a {@link DiagnosisKeysHourDirectory} instance for the specified date.\n *\n- * @param diagnosisKeys A collection of diagnosis keys. These will be filtered according to the specified current\n- * date.\n- * @param cryptoProvider The {@link CryptoProvider} used for cryptographic signing.\n+ * @param diagnosisKeyBundler A {@link DiagnosisKeyBundler} containing the {@link DiagnosisKey DiagnosisKeys}.\n+ * @param cryptoProvider The {@link CryptoProvider} used for cryptographic signing.\n */\n- public DiagnosisKeysHourDirectory(Collection diagnosisKeys, CryptoProvider cryptoProvider,\n+ public DiagnosisKeysHourDirectory(DiagnosisKeyBundler diagnosisKeyBundler, CryptoProvider cryptoProvider,\n DistributionServiceConfig distributionServiceConfig) {\n- super(distributionServiceConfig.getApi().getHourPath(),\n- indices -> DateTime.getHours(((LocalDate) indices.peek()), diagnosisKeys), LocalDateTime::getHour);\n- this.diagnosisKeys = diagnosisKeys;\n+ super(distributionServiceConfig.getApi().getHourPath(), indices -> DateTime.getHours(((LocalDate) indices.peek()),\n+ diagnosisKeyBundler.getAllDiagnosisKeys()), LocalDateTime::getHour);\n+ this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n }\n@@ -71,7 +69,8 @@ public void prepare(ImmutableStack indices) {\n // IndexDirectory.\n String region = (String) currentIndices.pop().pop().peek();\n \n- Set diagnosisKeysForCurrentHour = getDiagnosisKeysForHour(currentHour);\n+ List diagnosisKeysForCurrentHour =\n+ this.diagnosisKeyBundler.getDiagnosisKeysDistributableAt(currentHour);\n \n long startTimestamp = currentHour.toEpochSecond(ZoneOffset.UTC);\n long endTimestamp = currentHour.plusHours(1).toEpochSecond(ZoneOffset.UTC);\n@@ -86,12 +85,6 @@ public void prepare(ImmutableStack indices) {\n super.prepare(indices);\n }\n \n- private Set getDiagnosisKeysForHour(LocalDateTime hour) {\n- return this.diagnosisKeys.stream()\n- .filter(diagnosisKey -> DistributionDateTimeCalculator.getDistributionDateTime(diagnosisKey).equals(hour))\n- .collect(Collectors.toSet());\n- }\n-\n private Directory decorateDiagnosisKeyArchive(Archive archive) {\n return new DiagnosisKeySigningDecorator(archive, cryptoProvider, distributionServiceConfig);\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DistributionDateTimeCalculator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DistributionDateTimeCalculator.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DistributionDateTimeCalculator.java\n+++ /dev/null\n@@ -1,62 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n-\n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.ONE_HOUR_INTERVAL_SECONDS;\n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.TEN_MINUTES_INTERVAL_SECONDS;\n-import static java.time.ZoneOffset.UTC;\n-\n-import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import java.time.Duration;\n-import java.time.LocalDateTime;\n-import java.time.temporal.ChronoUnit;\n-\n-public class DistributionDateTimeCalculator {\n-\n- /**\n- * Minimum time in minutes after key expiration after which it can be distributed.\n- */\n- public static final long DISTRIBUTION_PADDING = 120L;\n-\n- private DistributionDateTimeCalculator() {\n- }\n-\n- /**\n- * Calculates the earliest point in time at which the specified {@link DiagnosisKey} can be distributed. Before keys\n- * are allowed to be distributed, they must be expired for a configured amount of time.\n- *\n- * @return {@link LocalDateTime} at which the specified {@link DiagnosisKey} can be distributed.\n- */\n- public static LocalDateTime getDistributionDateTime(DiagnosisKey diagnosisKey) {\n- LocalDateTime submissionDateTime = LocalDateTime\n- .ofEpochSecond(diagnosisKey.getSubmissionTimestamp() * ONE_HOUR_INTERVAL_SECONDS, 0, UTC);\n- LocalDateTime keyExpiryDateTime = LocalDateTime\n- .ofEpochSecond(diagnosisKey.getRollingStartIntervalNumber() * TEN_MINUTES_INTERVAL_SECONDS, 0, UTC)\n- .plusMinutes(diagnosisKey.getRollingPeriod() * 10L);\n-\n- if (Duration.between(keyExpiryDateTime, submissionDateTime).toMinutes() <= DISTRIBUTION_PADDING) {\n- // truncatedTo floors the value, so we need to add an hour to the DISTRIBUTION_PADDING to compensate that.\n- return keyExpiryDateTime.plusMinutes(DISTRIBUTION_PADDING + 60).truncatedTo(ChronoUnit.HOURS);\n- }\n-\n- return submissionDateTime;\n- }\n-}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n@@ -31,6 +31,8 @@ public class DistributionServiceConfig {\n private Paths paths;\n private TestData testData;\n private Integer retentionDays;\n+ private Integer expiryPolicyMinutes;\n+ private Integer shiftingPolicyThreshold;\n private String outputFileName;\n private Boolean includeIncompleteDays;\n private Boolean includeIncompleteHours;\n@@ -63,6 +65,22 @@ public void setRetentionDays(Integer retentionDays) {\n this.retentionDays = retentionDays;\n }\n \n+ public Integer getExpiryPolicyMinutes() {\n+ return expiryPolicyMinutes;\n+ }\n+\n+ public void setExpiryPolicyMinutes(Integer expiryPolicyMinutes) {\n+ this.expiryPolicyMinutes = expiryPolicyMinutes;\n+ }\n+\n+ public Integer getShiftingPolicyThreshold() {\n+ return shiftingPolicyThreshold;\n+ }\n+\n+ public void setShiftingPolicyThreshold(Integer shiftingPolicyThreshold) {\n+ this.shiftingPolicyThreshold = shiftingPolicyThreshold;\n+ }\n+\n public String getOutputFileName() {\n return outputFileName;\n }\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\n--- a/services/distribution/src/main/resources/application.yaml\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -11,6 +11,8 @@ services:\n distribution:\n output-file-name: index\n retention-days: 14\n+ expiry-policy-minutes: 120\n+ shifting-policy-threshold: 140\n include-incomplete-days: false\n include-incomplete-hours: false\n paths:\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerTest.java\n@@ -0,0 +1,190 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDateTime;\n+import java.util.List;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n+import java.util.stream.Stream;\n+import org.junit.jupiter.api.DisplayName;\n+import org.junit.jupiter.api.Nested;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {DistributionServiceConfig.class, ProdDiagnosisKeyBundler.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class ProdDiagnosisKeyBundlerTest {\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ DiagnosisKeyBundler bundler;\n+\n+ @Test\n+ void testEmptyListWhenNoDiagnosisKeys() {\n+ bundler.setDiagnosisKeys(List.of());\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).hasSize(0);\n+ }\n+\n+ @Test\n+ void testEmptyListWhenGettingDistributableKeysBeforeEarliestDiagnosisKey() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, 50L, 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).hasSize(0);\n+ }\n+\n+ @Nested\n+ @DisplayName(\"Expiry policy\")\n+ class ProdDiagnosisKeyBundlerExpiryPolicyTest {\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {0L, 24L, 24L + 2L})\n+ void testLastPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n+ List diagnosisKeys = buildDiagnosisKeys(5, submissionTimestamp, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 3, 0, 0))).hasSize(10);\n+ }\n+\n+ @Test\n+ void testLastPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n+ List diagnosisKeys = buildDiagnosisKeys(5, 24L + 3L, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 3, 0, 0))).hasSize(10);\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {0L, 24L, 24L + 2L, 24L + 3L})\n+ void testFirstPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n+ List diagnosisKeys = buildDiagnosisKeys(6, submissionTimestamp, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n+ }\n+\n+ @Test\n+ void testFirstPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, 24L + 4L, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n+ }\n+\n+ @Test\n+ void testLastPeriodOfHourAndSubmissionGreaterDistributionDateTime() {\n+ List diagnosisKeys = buildDiagnosisKeys(5, 24L + 4L, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n+ }\n+ }\n+\n+ @Nested\n+ @DisplayName(\"Shifting policy\")\n+ class ProdDiagnosisKeyBundlerShiftingPolicyTest {\n+\n+ @Test\n+ void testDoesNotShiftIfPackageSizeGreaterThanThreshold() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, 50L, 6);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(6);\n+ }\n+\n+ @Test\n+ void testDoesNotShiftIfPackageSizeEqualsThreshold() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, 50L, 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n+ }\n+\n+ @Test\n+ void testShiftsIfPackageSizeLessThanThreshold() {\n+ List diagnosisKeys = Stream\n+ .concat(buildDiagnosisKeys(6, 50L, 4).stream(), buildDiagnosisKeys(6, 51L, 1).stream())\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(5);\n+ }\n+\n+ @Test\n+ void testShiftsSinceLastDistribution() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, 50L, 5), buildDiagnosisKeys(6, 51L, 2), buildDiagnosisKeys(6, 52L, 4))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(6);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n+ }\n+\n+ @Test\n+ void testShiftIncludesPreviouslyUndistributedKeys() {\n+ List diagnosisKeys = Stream\n+ .concat(buildDiagnosisKeys(6, 50L, 1).stream(), buildDiagnosisKeys(6, 51L, 5).stream())\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(5);\n+ }\n+\n+ @Test\n+ void testShiftsSparseDistributions() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, 50L, 1), buildDiagnosisKeys(6, 51L, 1), buildDiagnosisKeys(6, 52L, 1),\n+ buildDiagnosisKeys(6, 53L, 0), buildDiagnosisKeys(6, 54L, 0), buildDiagnosisKeys(6, 55L, 1),\n+ buildDiagnosisKeys(6, 56L, 1))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 6, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 7, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 8, 0, 0))).hasSize(5);\n+ }\n+ }\n+\n+ public static List buildDiagnosisKeys(int startIntervalNumber, long submissionTimestamp, int number) {\n+ return IntStream.range(0, number)\n+ .mapToObj(__ -> DiagnosisKey.builder()\n+ .withKeyData(new byte[16])\n+ .withRollingStartIntervalNumber(startIntervalNumber)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(submissionTimestamp).build())\n+ .collect(Collectors.toList());\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n@@ -26,6 +26,8 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DemoDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n@@ -33,7 +35,6 @@\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.io.File;\n import java.io.IOException;\n-import java.util.ArrayList;\n import java.util.Arrays;\n import java.util.List;\n import java.util.Objects;\n@@ -90,8 +91,8 @@ void setupAll() throws IOException {\n \n @Test\n void checkBuildsTheCorrectDirectoryStructureWhenNoKeys() {\n- diagnosisKeys = new ArrayList<>();\n- Directory directory = new DiagnosisKeysDirectory(diagnosisKeys, cryptoProvider,\n+ DiagnosisKeyBundler bundler = new DemoDiagnosisKeyBundler(distributionServiceConfig);\n+ Directory directory = new DiagnosisKeysDirectory(bundler, cryptoProvider,\n distributionServiceConfig);\n parentDirectory.addWritable(directory);\n directory.prepare(new ImmutableStack<>());\n@@ -111,7 +112,9 @@ void checkBuildsTheCorrectDirectoryStructureWhenNoKeys() {\n \n @Test\n void checkBuildsTheCorrectDirectoryStructure() {\n- Directory directory = new DiagnosisKeysDirectory(diagnosisKeys, cryptoProvider,\n+ DiagnosisKeyBundler bundler = new DemoDiagnosisKeyBundler(distributionServiceConfig);\n+ bundler.setDiagnosisKeys(diagnosisKeys);\n+ Directory directory = new DiagnosisKeysDirectory(bundler, cryptoProvider,\n distributionServiceConfig);\n parentDirectory.addWritable(directory);\n directory.prepare(new ImmutableStack<>());\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DistributionDateTimeCalculatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DistributionDateTimeCalculatorTest.java\ndeleted file mode 100644\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/DistributionDateTimeCalculatorTest.java\n+++ /dev/null\n@@ -1,72 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.structure.directory;\n-\n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DistributionDateTimeCalculator.getDistributionDateTime;\n-import static org.assertj.core.api.Assertions.assertThat;\n-\n-import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.params.ParameterizedTest;\n-import org.junit.jupiter.params.provider.ValueSource;\n-\n-class DistributionDateTimeCalculatorTest {\n-\n- @ParameterizedTest\n- @ValueSource(longs = {0L, 24L, 24L + 2L})\n- void testLastPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n- var diagnosisKey = buildDiagnosisKey(5, submissionTimestamp);\n- assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T03:00\");\n- }\n-\n- @Test\n- void testLastPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n- var diagnosisKey = buildDiagnosisKey(5, 24L + 3L);\n- assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T03:00\");\n- }\n-\n- @ParameterizedTest\n- @ValueSource(longs = {0L, 24L, 24L + 2L, 24L + 3L})\n- void testFirstPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n- var diagnosisKey = buildDiagnosisKey(6, submissionTimestamp);\n- assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T04:00\");\n- }\n-\n- @Test\n- void testFirstPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n- var diagnosisKey = buildDiagnosisKey(6, 24L + 4L);\n- assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T04:00\");\n- }\n-\n- @Test\n- void testLastPeriodOfHourAndSubmissionGreaterDistributionDateTime() {\n- var diagnosisKey = buildDiagnosisKey(5, 24L + 4L);\n- assertThat(getDistributionDateTime(diagnosisKey)).isEqualTo(\"1970-01-02T04:00\");\n- }\n-\n- private DiagnosisKey buildDiagnosisKey(int startIntervalNumber, long submissionTimestamp) {\n- return DiagnosisKey.builder()\n- .withKeyData(new byte[16])\n- .withRollingStartIntervalNumber(startIntervalNumber)\n- .withTransmissionRiskLevel(2)\n- .withSubmissionTimestamp(submissionTimestamp).build();\n- }\n-}\ndiff --git a/services/distribution/src/test/resources/application.yaml b/services/distribution/src/test/resources/application.yaml\n--- a/services/distribution/src/test/resources/application.yaml\n+++ b/services/distribution/src/test/resources/application.yaml\n@@ -9,6 +9,8 @@ services:\n distribution:\n output-file-name: index\n retention-days: 14\n+ expiry-policy-minutes: 120\n+ shifting-policy-threshold: 5\n include-incomplete-days: false\n include-incomplete-hours: false\n paths:\n", "problem_statement": "Aggregate File Creation: Skip packages if payload too small\nChange the aggregate file creation logic in a way, in which packages are skipped in case the payload (amount of keys) is too small. The threshold should be configurable, and defaulted to 50 for now.\n", "hints_text": "Maybe combine with #140 \n**Alternative suggestion: Pad packages with random dummy keys if too small**\r\n\r\nThinking a bit further into the hoped for future, when new infections are becoming rare, this might lead to unnecessary (possibly quite long) delays in notifications being sent. Could one instead use random dummy keys to pad every package that is too small to maybe 50 or 100 keys (or possibly padding to a randomised amount so an outsider can't even determine whether there any dummies are in the set).\r\n\r\nThis would impact required data volumes marginally - in the worst case, if 75 dummy keys are added every hour, this would represent only 50 kiB per day (or 3% of your bandwidth example in the architecture document) if I did not miscalculate. Since this would only occur in a low load situation anyway, this should be acceptable.\nThrehold is now: 140\nI like the padding idea - @MKusber do you think we can do this from a DPP/security perspective?\nHey @MikeJayDee, after some investigation, @michael-burwig and me decided that we will go for the \"shifting\" approach instead of the \"padding\" approach for this release. For clarification:\r\n\r\n**\"Shifting\" approach:**\r\n- If a package is too small (number of keys submitted in a timeframe is below a configurable threshold), then it will not be distributed (there will be zero keys in that package)\r\n- The keys that would have been distributed in that run are \"shifted\" to the next distribution run\r\n- Rinse and repeat until a package can be assembled that contains enough keys (above the configurable threshold)\r\n\r\n**\"Padding\" approach:**\r\n- If a package is too small, then it will be padded with random / fake keys until the threshold is matched (or exceeded)\r\n\r\nAs you have rightly pointed out, the main disadvantage of the \"shifting\" approach is that it introduces an artificial delay in the distribution of keys. This means that people will not be warned about a potential COVID exposure as quickly as possible, but that the CWA server will wait with the distribution until enough submissions have been made. Especially as the number of submissions decreases, this delay will become significant.\r\n\r\nThis disadvantage, of course, doesn't exist with the \"padding\" approach. However, the purpose of this whole \"threshold\" feature is to preserve peoples anonymity and to not allow anyone to create movement profiles. In order to achieve that, it must be impossible to match a specific temporary exposure key (TEK) to any particular person. In the \"shifting\" approach, this is achieved by ensuring that a single person's TEKs are always mashed together with enough other people's real TEKs to get lost in the shuffle. In the \"padding\" approach, this is achieved by mashing a single person's TEKs together with artificially/randomly generated TEKs. In order to make the \"padding\" approach equally as secure and privacy preserving, we would need to make real TEKs and artificially/randomly generated TEKs absolutely indistinguishable from one another. We decided for the \"shifting\" approach for this release because we are not 100% certain that we can achieve that - for the following reasons:\r\n\r\nThere are 4 fields in a TEK:\r\n- Key data\r\n- Transmission risk level\r\n- Rolling start interval number\r\n- Rolling period\r\n\r\n\"Key data\" is random by nature and can easily be generated - no problem there. \"Rolling period\" is always 144 - no problem here either. However, in the real world, \"transmission risk levels\" and \"rolling start interval numbers\" each follow some statistical distribution. In order to make real and fake TEKs indistinguishable to any reasonably certainty, we would need to make sure, that the fake TEKs follow the same distribution as the real ones. The problem is, that we are not sure what the exact properties of that distribution are (and how they change over time). We can thus not confidently guarantee that one wouldn't be able to distinguish random and real TEKs through statistical analysis.\r\n\r\nSince data privacy and protection are the foundation of this whole project, we decided to not take this risk and go with the safer but less accurate solution.\r\n\r\nNow, it might be entirely possible that there is a solution to this problem that we just don't see. But since time is of the essence right now (and we can not wait for a scientifically substantiated analysis of the \"padding\" approach), we decided to go for the \"shifting\" approach for the initial release.\r\n\r\nAnyways. Thank you very much for sharing your idea, @MikeJayDee. We forwarded your idea and the open questions outlined above to our scientific partners and will keep you posted on any updates \ud83d\udc4d ", "created_at": "2020-06-01T17:31:01Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 419, "instance_id": "corona-warn-app__cwa-server-419", "issue_numbers": ["151"], "base_commit": "896d24d3730d455ddc7a67bdaebd843ba7bd91dd", "patch": "diff --git a/services/distribution/pom.xml b/services/distribution/pom.xml\n--- a/services/distribution/pom.xml\n+++ b/services/distribution/pom.xml\n@@ -78,6 +78,11 @@\n org.apache.commons\n 3.2\n \n+ \n+ spring-retry\n+ org.springframework.retry\n+ 1.3.0\n+ \n \n \n \n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n@@ -394,6 +394,7 @@ public static class ObjectStore {\n private Integer port;\n private String bucket;\n private Boolean setPublicReadAclOnPutObject;\n+ private Integer maxNumberOfFailedOperations;\n \n public String getAccessKey() {\n return accessKey;\n@@ -442,5 +443,13 @@ public Boolean isSetPublicReadAclOnPutObject() {\n public void setSetPublicReadAclOnPutObject(Boolean setPublicReadAclOnPutObject) {\n this.setPublicReadAclOnPutObject = setPublicReadAclOnPutObject;\n }\n+\n+ public Integer getMaxNumberOfFailedOperations() {\n+ return maxNumberOfFailedOperations;\n+ }\n+\n+ public void setMaxNumberOfFailedOperations(Integer maxNumberOfFailedOperations) {\n+ this.maxNumberOfFailedOperations = maxNumberOfFailedOperations;\n+ }\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/FailedObjectStoreOperationsCounter.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/FailedObjectStoreOperationsCounter.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/FailedObjectStoreOperationsCounter.java\n@@ -0,0 +1,58 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n+import java.util.concurrent.atomic.AtomicInteger;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * Maintains the count and maximum number of failed object store operations in a thread-safe manner.\n+ */\n+@Component\n+public class FailedObjectStoreOperationsCounter {\n+\n+ private static final Logger logger = LoggerFactory.getLogger(FailedObjectStoreOperationsCounter.class);\n+\n+ private final int maxNumberOfFailedOperations;\n+ private final AtomicInteger failedOperationsCounter = new AtomicInteger(0);\n+\n+ public FailedObjectStoreOperationsCounter(DistributionServiceConfig distributionServiceConfig) {\n+ maxNumberOfFailedOperations = distributionServiceConfig.getObjectStore().getMaxNumberOfFailedOperations();\n+ }\n+\n+ /**\n+ * Increments the internal failed operations counter and rethrows the specified exception if the configured maximum\n+ * number of failed object store operation was exceeded.\n+ *\n+ * @param cause The {@link ObjectStoreOperationFailedException} that is associated with the failed operation.\n+ */\n+ public void incrementAndCheckThreshold(ObjectStoreOperationFailedException cause) {\n+ logger.error(\"Object store operation failed.\", cause);\n+ if (failedOperationsCounter.incrementAndGet() > maxNumberOfFailedOperations) {\n+ logger.error(\"Number of failed object store operations exceeded threshold of {}.\", maxNumberOfFailedOperations);\n+ throw cause;\n+ }\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n@@ -21,11 +21,13 @@\n package app.coronawarn.server.services.distribution.objectstore;\n \n import app.coronawarn.server.services.distribution.assembly.component.CwaApiStructureProvider;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import app.coronawarn.server.services.distribution.objectstore.publish.PublishFileSet;\n import app.coronawarn.server.services.distribution.objectstore.publish.PublishedFileSet;\n import java.io.IOException;\n import java.nio.file.Path;\n+import java.util.List;\n import java.util.stream.Collectors;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n@@ -48,18 +50,29 @@ public class S3Publisher {\n \n private static final Logger logger = LoggerFactory.getLogger(S3Publisher.class);\n \n- /** The default CWA root folder, which contains all CWA related files. */\n+ /**\n+ * The default CWA root folder, which contains all CWA related files.\n+ */\n private static final String CWA_S3_ROOT = CwaApiStructureProvider.VERSION_DIRECTORY;\n \n- /** root folder for the upload on the local disk. */\n private final Path root;\n+ private final ObjectStoreAccess objectStoreAccess;\n+ private final FailedObjectStoreOperationsCounter failedOperationsCounter;\n \n- /** access to the object store. */\n- private final ObjectStoreAccess access;\n-\n- public S3Publisher(Path root, ObjectStoreAccess access) {\n+ /**\n+ * Creates an {@link S3Publisher} instance that attempts to publish the files at the specified location to an object\n+ * store. Object store operations are performed through the specified {@link ObjectStoreAccess} instance.\n+ *\n+ * @param root The path of the directory that shall be published.\n+ * @param objectStoreAccess The {@link ObjectStoreAccess} used to communicate with the object store.\n+ * @param failedOperationsCounter The {@link FailedObjectStoreOperationsCounter} that is used to monitor the number of\n+ * failed operations.\n+ */\n+ public S3Publisher(Path root, ObjectStoreAccess objectStoreAccess,\n+ FailedObjectStoreOperationsCounter failedOperationsCounter) {\n this.root = root;\n- this.access = access;\n+ this.objectStoreAccess = objectStoreAccess;\n+ this.failedOperationsCounter = failedOperationsCounter;\n }\n \n /**\n@@ -68,18 +81,29 @@ public S3Publisher(Path root, ObjectStoreAccess access) {\n * @throws IOException in case there were problems reading files from the disk.\n */\n public void publish() throws IOException {\n- var published = new PublishedFileSet(access.getObjectsWithPrefix(CWA_S3_ROOT));\n- var toPublish = new PublishFileSet(root);\n+ PublishedFileSet published;\n+ List toPublish = new PublishFileSet(root).getFiles();\n+ List diff;\n \n- var diff = toPublish\n- .getFiles()\n- .stream()\n- .filter(published::isNotYetPublished)\n- .collect(Collectors.toList());\n+ try {\n+ published = new PublishedFileSet(objectStoreAccess.getObjectsWithPrefix(CWA_S3_ROOT));\n+ diff = toPublish\n+ .stream()\n+ .filter(published::isNotYetPublished)\n+ .collect(Collectors.toList());\n+ } catch (ObjectStoreOperationFailedException e) {\n+ failedOperationsCounter.incrementAndCheckThreshold(e);\n+ // failed to retrieve existing files; publish everything\n+ diff = toPublish;\n+ }\n \n logger.info(\"Beginning upload... \");\n for (LocalFile file : diff) {\n- this.access.putObject(file);\n+ try {\n+ this.objectStoreAccess.putObject(file);\n+ } catch (ObjectStoreOperationFailedException e) {\n+ failedOperationsCounter.incrementAndCheckThreshold(e);\n+ }\n }\n logger.info(\"Upload completed.\");\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.Api;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import app.coronawarn.server.services.distribution.objectstore.client.S3Object;\n import java.time.LocalDate;\n import java.time.ZoneOffset;\n@@ -39,10 +40,16 @@ public class S3RetentionPolicy {\n \n private final ObjectStoreAccess objectStoreAccess;\n private final Api api;\n+ private final FailedObjectStoreOperationsCounter failedObjectStoreOperationsCounter;\n \n- public S3RetentionPolicy(ObjectStoreAccess objectStoreAccess, DistributionServiceConfig distributionServiceConfig) {\n+ /**\n+ * Creates an {@link S3RetentionPolicy} instance with the specified parameters.\n+ */\n+ public S3RetentionPolicy(ObjectStoreAccess objectStoreAccess, DistributionServiceConfig distributionServiceConfig,\n+ FailedObjectStoreOperationsCounter failedOperationsCounter) {\n this.objectStoreAccess = objectStoreAccess;\n this.api = distributionServiceConfig.getApi();\n+ this.failedObjectStoreOperationsCounter = failedOperationsCounter;\n }\n \n /**\n@@ -77,6 +84,10 @@ public void applyRetentionPolicy(int retentionDays) {\n * @param diagnosisKey the diagnosis key, that should be deleted.\n */\n public void deleteDiagnosisKey(S3Object diagnosisKey) {\n- objectStoreAccess.deleteObjectsWithPrefix(diagnosisKey.getObjectName());\n+ try {\n+ objectStoreAccess.deleteObjectsWithPrefix(diagnosisKey.getObjectName());\n+ } catch (ObjectStoreOperationFailedException e) {\n+ failedObjectStoreOperationsCounter.incrementAndCheckThreshold(e);\n+ }\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n@@ -25,6 +25,7 @@\n import java.net.URI;\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.Configuration;\n+import org.springframework.retry.annotation.EnableRetry;\n import software.amazon.awssdk.auth.credentials.AwsBasicCredentials;\n import software.amazon.awssdk.auth.credentials.AwsCredentialsProvider;\n import software.amazon.awssdk.auth.credentials.StaticCredentialsProvider;\n@@ -35,6 +36,7 @@\n * Manages the instantiation of the {@link ObjectStoreClient} bean.\n */\n @Configuration\n+@EnableRetry\n public class ObjectStoreClientConfig {\n \n private static final Region DEFAULT_REGION = Region.EU_CENTRAL_1;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n@@ -28,6 +28,10 @@\n import java.util.Map;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n+import org.springframework.retry.annotation.Backoff;\n+import org.springframework.retry.annotation.Recover;\n+import org.springframework.retry.annotation.Retryable;\n+import org.springframework.retry.support.RetrySynchronizationManager;\n import software.amazon.awssdk.core.exception.SdkException;\n import software.amazon.awssdk.core.sync.RequestBody;\n import software.amazon.awssdk.services.s3.S3Client;\n@@ -67,18 +71,29 @@ public boolean bucketExists(String bucketName) {\n }\n \n @Override\n+ @Retryable(\n+ value = SdkException.class,\n+ maxAttemptsExpression = \"${services.distribution.objectstore.retry-attempts}\",\n+ backoff = @Backoff(delayExpression = \"${services.distribution.objectstore.retry-backoff}\"))\n public List getObjects(String bucket, String prefix) {\n- try {\n- ListObjectsV2Response response =\n- s3Client.listObjectsV2(ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).build());\n- return response.contents().stream().map(S3ClientWrapper::buildS3Object).collect(toList());\n- } catch (SdkException e) {\n- throw new ObjectStoreOperationFailedException(\"Failed to upload object to object store\", e);\n- }\n+ logRetryStatus(\"object download\");\n+ ListObjectsV2Response response =\n+ s3Client.listObjectsV2(ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).build());\n+ return response.contents().stream().map(S3ClientWrapper::buildS3Object).collect(toList());\n+ }\n+\n+ @Recover\n+ public List skipReadOperation(Throwable cause) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to get objects from object store\", cause);\n }\n \n @Override\n+ @Retryable(\n+ value = SdkException.class,\n+ maxAttemptsExpression = \"${services.distribution.objectstore.retry-attempts}\",\n+ backoff = @Backoff(delayExpression = \"${services.distribution.objectstore.retry-backoff}\"))\n public void putObject(String bucket, String objectName, Path filePath, Map headers) {\n+ logRetryStatus(\"object upload\");\n RequestBody bodyFile = RequestBody.fromFile(filePath);\n \n var requestBuilder = PutObjectRequest.builder().bucket(bucket).key(objectName);\n@@ -89,40 +104,46 @@ public void putObject(String bucket, String objectName, Path filePath, Map objectNames) {\n if (objectNames.isEmpty()) {\n return;\n }\n+ logRetryStatus(\"object deletion\");\n \n Collection identifiers = objectNames.stream()\n .map(key -> ObjectIdentifier.builder().key(key).build()).collect(toList());\n \n- try {\n- DeleteObjectsResponse response = s3Client.deleteObjects(\n- DeleteObjectsRequest.builder()\n- .bucket(bucket)\n- .delete(Delete.builder().objects(identifiers).build()).build());\n-\n- if (response.hasErrors()) {\n- String errMessage = \"Failed to remove objects from object store.\";\n- logger.error(\"{} {}\", errMessage, response.errors());\n- throw new ObjectStoreOperationFailedException(errMessage);\n- }\n- } catch (SdkException e) {\n- throw new ObjectStoreOperationFailedException(\"Failed to remove objects from object store.\", e);\n+ DeleteObjectsResponse response = s3Client.deleteObjects(\n+ DeleteObjectsRequest.builder()\n+ .bucket(bucket)\n+ .delete(Delete.builder().objects(identifiers).build()).build());\n+\n+ if (response.hasErrors()) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to remove objects from object store.\");\n }\n }\n \n+ @Recover\n+ private void skipModifyingOperation(Throwable cause) {\n+ throw new ObjectStoreOperationFailedException(\"Failed to modify objects on object store.\", cause);\n+ }\n+\n private static S3Object buildS3Object(software.amazon.awssdk.services.s3.model.S3Object s3Object) {\n String etag = s3Object.eTag().replaceAll(\"\\\"\", \"\");\n return new S3Object(s3Object.key(), etag);\n }\n+\n+ private void logRetryStatus(String action) {\n+ int retryCount = RetrySynchronizationManager.getContext().getRetryCount();\n+ if (retryCount > 0) {\n+ logger.warn(\"Retrying {} after {} failed attempt(s).\", action, retryCount);\n+ }\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n@@ -21,6 +21,7 @@\n package app.coronawarn.server.services.distribution.runner;\n \n import app.coronawarn.server.services.distribution.assembly.component.OutputDirectoryProvider;\n+import app.coronawarn.server.services.distribution.objectstore.FailedObjectStoreOperationsCounter;\n import app.coronawarn.server.services.distribution.objectstore.ObjectStoreAccess;\n import app.coronawarn.server.services.distribution.objectstore.S3Publisher;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n@@ -43,19 +44,21 @@ public class S3Distribution implements ApplicationRunner {\n private static final Logger logger = LoggerFactory.getLogger(S3Distribution.class);\n \n private final OutputDirectoryProvider outputDirectoryProvider;\n-\n private final ObjectStoreAccess objectStoreAccess;\n+ private final FailedObjectStoreOperationsCounter failedOperationsCounter;\n \n- S3Distribution(OutputDirectoryProvider outputDirectoryProvider, ObjectStoreAccess objectStoreAccess) {\n+ S3Distribution(OutputDirectoryProvider outputDirectoryProvider, ObjectStoreAccess objectStoreAccess,\n+ FailedObjectStoreOperationsCounter failedOperationsCounter) {\n this.outputDirectoryProvider = outputDirectoryProvider;\n this.objectStoreAccess = objectStoreAccess;\n+ this.failedOperationsCounter = failedOperationsCounter;\n }\n \n @Override\n public void run(ApplicationArguments args) {\n try {\n Path pathToDistribute = outputDirectoryProvider.getFileOnDisk().toPath().toAbsolutePath();\n- S3Publisher s3Publisher = new S3Publisher(pathToDistribute, objectStoreAccess);\n+ S3Publisher s3Publisher = new S3Publisher(pathToDistribute, objectStoreAccess, failedOperationsCounter);\n \n s3Publisher.publish();\n logger.info(\"Data pushed to Object Store successfully.\");\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\n--- a/services/distribution/src/main/resources/application.yaml\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -47,6 +47,9 @@ services:\n bucket: ${CWA_OBJECTSTORE_BUCKET:cwa}\n port: ${CWA_OBJECTSTORE_PORT:8003}\n set-public-read-acl-on-put-object: true\n+ retry-attempts: 3\n+ retry-backoff: 2000\n+ max-number-of-failed-operations: 5\n \n spring:\n main:\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java\n@@ -23,7 +23,6 @@\n import static org.assertj.core.api.Assertions.assertThat;\n \n import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ApplicationVersionConfigurationValidator;\n-import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ExposureConfigurationValidator;\n import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationResult;\n import org.junit.jupiter.api.Test;\n \ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/FailedObjectStoreOperationsCounterTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/FailedObjectStoreOperationsCounterTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/FailedObjectStoreOperationsCounterTest.java\n@@ -0,0 +1,58 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import static org.assertj.core.api.Assertions.assertThatCode;\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {\n+ FailedObjectStoreOperationsCounter.class}, initializers = ConfigFileApplicationContextInitializer.class)\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+class FailedObjectStoreOperationsCounterTest {\n+\n+ @Autowired\n+ private DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ private FailedObjectStoreOperationsCounter failedObjectStoreOperationsCounter;\n+\n+ @Test\n+ void shouldThrowOnSixthAttempt() {\n+ var exception = new ObjectStoreOperationFailedException(\"mock\");\n+ for (int i = 0; i < distributionServiceConfig.getObjectStore().getMaxNumberOfFailedOperations(); i++) {\n+ assertThatCode(() -> failedObjectStoreOperationsCounter.incrementAndCheckThreshold(exception))\n+ .doesNotThrowAnyException();\n+ }\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> failedObjectStoreOperationsCounter.incrementAndCheckThreshold(exception));\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n@@ -24,7 +24,8 @@\n import static org.mockito.Mockito.spy;\n import static org.mockito.Mockito.when;\n \n-import app.coronawarn.server.services.distribution.Application;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClientConfig;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalGenericFile;\n import java.io.IOException;\n@@ -36,14 +37,14 @@\n import org.junit.jupiter.api.Test;\n import org.junit.jupiter.api.extension.ExtendWith;\n import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.SpringBootTest;\n import org.springframework.core.io.ResourceLoader;\n-import org.springframework.test.context.ContextConfiguration;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @ExtendWith(SpringExtension.class)\n-@ContextConfiguration(classes = {Application.class},\n- initializers = ConfigFileApplicationContextInitializer.class)\n+@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStoreClientConfig.class})\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n @Tag(\"s3-integration\")\n class ObjectStoreAccessTest {\n \ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java\n@@ -21,6 +21,7 @@\n package app.coronawarn.server.services.distribution.objectstore;\n \n import static org.assertj.core.api.Assertions.assertThat;\n+import static org.mockito.Mockito.mock;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClientConfig;\n@@ -35,14 +36,12 @@\n import org.junit.jupiter.api.extension.ExtendWith;\n import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n-import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.boot.test.context.SpringBootTest;\n import org.springframework.core.io.ResourceLoader;\n-import org.springframework.test.context.ContextConfiguration;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @ExtendWith(SpringExtension.class)\n-@ContextConfiguration(classes = {ObjectStoreAccess.class, ObjectStoreClientConfig.class},\n- initializers = ConfigFileApplicationContextInitializer.class)\n+@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStoreClientConfig.class})\n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\n @Tag(\"s3-integration\")\n class S3PublisherIntegrationTest {\n@@ -57,7 +56,8 @@ class S3PublisherIntegrationTest {\n \n @Test\n void publishTestFolderOk() throws IOException {\n- S3Publisher publisher = new S3Publisher(getFolderAsPath(rootTestFolder), objectStoreAccess);\n+ S3Publisher publisher = new S3Publisher(\n+ getFolderAsPath(rootTestFolder), objectStoreAccess, mock(FailedObjectStoreOperationsCounter.class));\n \n publisher.publish();\n List s3Objects = objectStoreAccess.getObjectsWithPrefix(\"version\");\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java\n@@ -21,6 +21,7 @@\n package app.coronawarn.server.services.distribution.objectstore;\n \n import static org.mockito.ArgumentMatchers.any;\n+import static org.mockito.Mockito.mock;\n import static org.mockito.Mockito.times;\n import static org.mockito.Mockito.verify;\n import static org.mockito.Mockito.when;\n@@ -115,6 +116,6 @@ private List twoIdenticalOneOtherOneChange() {\n \n private S3Publisher createTestPublisher() throws IOException {\n var publishPath = resourceLoader.getResource(PUBLISHING_PATH).getFile().toPath();\n- return new S3Publisher(publishPath, objectStoreAccess);\n+ return new S3Publisher(publishPath, objectStoreAccess, mock(FailedObjectStoreOperationsCounter.class));\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicyTest.java\n@@ -23,12 +23,15 @@\n import static org.mockito.ArgumentMatchers.any;\n import static org.mockito.ArgumentMatchers.eq;\n import static org.mockito.Mockito.atLeastOnce;\n+import static org.mockito.Mockito.doThrow;\n import static org.mockito.Mockito.never;\n+import static org.mockito.Mockito.times;\n import static org.mockito.Mockito.verify;\n import static org.mockito.Mockito.when;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.ObjectStore;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import app.coronawarn.server.services.distribution.objectstore.client.S3Object;\n import java.time.LocalDate;\n import java.time.ZoneOffset;\n@@ -44,17 +47,21 @@\n \n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\n @ExtendWith(SpringExtension.class)\n-@ContextConfiguration(classes = {S3RetentionPolicy.class, ObjectStore.class},\n+@ContextConfiguration(classes = {S3RetentionPolicy.class, ObjectStore.class, FailedObjectStoreOperationsCounter.class},\n initializers = ConfigFileApplicationContextInitializer.class)\n class S3RetentionPolicyTest {\n \n @MockBean\n private ObjectStoreAccess objectStoreAccess;\n \n+ @MockBean\n+ private FailedObjectStoreOperationsCounter failedObjectStoreOperationsCounter;\n+\n @Autowired\n private S3RetentionPolicy s3RetentionPolicy;\n \n- @Autowired DistributionServiceConfig distributionServiceConfig;\n+ @Autowired\n+ private DistributionServiceConfig distributionServiceConfig;\n \n @Test\n void shouldDeleteOldFiles() {\n@@ -83,6 +90,16 @@ void shouldNotDeleteFilesIfAllAreValid() {\n verify(objectStoreAccess, never()).deleteObjectsWithPrefix(any());\n }\n \n+ @Test\n+ void deleteDiagnosisKeysUpdatesFailedOperationCounter() {\n+ doThrow(ObjectStoreOperationFailedException.class).when(objectStoreAccess).deleteObjectsWithPrefix(any());\n+\n+ s3RetentionPolicy.deleteDiagnosisKey(new S3Object(\"foo\"));\n+\n+ verify(failedObjectStoreOperationsCounter, times(1))\n+ .incrementAndCheckThreshold(any(ObjectStoreOperationFailedException.class));\n+ }\n+\n private String generateFileName(LocalDate date) {\n var api = distributionServiceConfig.getApi();\n \ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n@@ -27,10 +27,12 @@\n import static org.mockito.ArgumentMatchers.any;\n import static org.mockito.ArgumentMatchers.eq;\n import static org.mockito.Mockito.atLeastOnce;\n-import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.reset;\n+import static org.mockito.Mockito.times;\n import static org.mockito.Mockito.verify;\n import static org.mockito.Mockito.when;\n \n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClient.HeaderKey;\n import java.nio.file.Path;\n import java.util.List;\n@@ -44,6 +46,15 @@\n import org.junit.jupiter.params.provider.Arguments;\n import org.junit.jupiter.params.provider.MethodSource;\n import org.junit.jupiter.params.provider.ValueSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.beans.factory.annotation.Value;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.context.annotation.Bean;\n+import org.springframework.context.annotation.Configuration;\n+import org.springframework.retry.annotation.EnableRetry;\n+import org.springframework.test.context.ContextConfiguration;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n import software.amazon.awssdk.core.exception.SdkClientException;\n import software.amazon.awssdk.core.exception.SdkException;\n@@ -62,19 +73,36 @@\n import software.amazon.awssdk.utils.builder.SdkBuilder;\n \n @ExtendWith(SpringExtension.class)\n+@ContextConfiguration(initializers = ConfigFileApplicationContextInitializer.class)\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n class S3ClientWrapperTest {\n \n private static final String VALID_BUCKET_NAME = \"myBucket\";\n private static final String VALID_PREFIX = \"prefix\";\n private static final String VALID_NAME = \"object key\";\n \n+ @Value(\"${services.distribution.objectstore.retry-attempts}\")\n+ private int configuredNumberOfRetries;\n+\n+ @MockBean\n private S3Client s3Client;\n- private S3ClientWrapper s3ClientWrapper;\n+\n+ @Autowired\n+ private ObjectStoreClient s3ClientWrapper;\n+\n+ @Configuration\n+ @EnableRetry\n+ public static class RetryS3ClientConfig {\n+\n+ @Bean\n+ public ObjectStoreClient createS3ClientWrapper(S3Client s3Client) {\n+ return new S3ClientWrapper(s3Client);\n+ }\n+ }\n \n @BeforeEach\n public void setUpMocks() {\n- s3Client = mock(S3Client.class);\n- s3ClientWrapper = new S3ClientWrapper(s3Client);\n+ reset(s3Client);\n }\n \n @Test\n@@ -156,6 +184,16 @@ void getObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX));\n }\n \n+ @ParameterizedTest\n+ @ValueSource(classes = {NoSuchBucketException.class, S3Exception.class, SdkClientException.class, SdkException.class})\n+ void shouldRetryGettingObjectsAndThenThrow(Class cause) {\n+ when(s3Client.listObjectsV2(any(ListObjectsV2Request.class))).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX));\n+\n+ verify(s3Client, times(configuredNumberOfRetries)).listObjectsV2(any(ListObjectsV2Request.class));\n+ }\n+\n @Test\n void testPutObjectForNoHeaders() {\n s3ClientWrapper.putObject(VALID_BUCKET_NAME, VALID_NAME, Path.of(\"\"), emptyMap());\n@@ -193,6 +231,16 @@ void putObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class s3ClientWrapper.putObject(VALID_BUCKET_NAME, VALID_PREFIX, Path.of(\"\"), emptyMap()));\n }\n \n+ @ParameterizedTest\n+ @ValueSource(classes = {NoSuchBucketException.class, S3Exception.class, SdkClientException.class, SdkException.class})\n+ void shouldRetryUploadingObjectAndThenThrow(Class cause) {\n+ when(s3Client.putObject(any(PutObjectRequest.class), any(RequestBody.class))).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.putObject(VALID_BUCKET_NAME, VALID_PREFIX, Path.of(\"\"), emptyMap()));\n+\n+ verify(s3Client, times(configuredNumberOfRetries)).putObject(any(PutObjectRequest.class), any(RequestBody.class));\n+ }\n+\n @Test\n void testRemoveObjects() {\n when(s3Client.deleteObjects(any(DeleteObjectsRequest.class))).thenReturn(DeleteObjectsResponse.builder().build());\n@@ -227,4 +275,14 @@ void removeObjectsThrowsObjectStoreOperationFailedExceptionIfClientThrows(Class<\n assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n .isThrownBy(() -> s3ClientWrapper.removeObjects(VALID_BUCKET_NAME, List.of(VALID_NAME)));\n }\n+\n+ @ParameterizedTest\n+ @ValueSource(classes = {NoSuchBucketException.class, S3Exception.class, SdkClientException.class, SdkException.class})\n+ void shouldRetryRemovingObjectAndThenThrow(Class cause) {\n+ when(s3Client.deleteObjects(any(DeleteObjectsRequest.class))).thenThrow(cause);\n+ assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3ClientWrapper.removeObjects(VALID_BUCKET_NAME, List.of(VALID_NAME)));\n+\n+ verify(s3Client, times(configuredNumberOfRetries)).deleteObjects(any(DeleteObjectsRequest.class));\n+ }\n }\ndiff --git a/services/distribution/src/test/resources/application.yaml b/services/distribution/src/test/resources/application.yaml\n--- a/services/distribution/src/test/resources/application.yaml\n+++ b/services/distribution/src/test/resources/application.yaml\n@@ -46,6 +46,9 @@ services:\n bucket: ${CWA_OBJECTSTORE_BUCKET:cwa}\n port: ${CWA_OBJECTSTORE_PORT:8003}\n set-public-read-acl-on-put-object: true\n+ retry-attempts: 3\n+ retry-backoff: 1\n+ max-number-of-failed-operations: 5\n spring:\n main:\n banner-mode: off\n", "problem_statement": "S3Publisher: Resilience\nThe S3Publisher/ObjectStoreAccess is currently lacking resilience features, like re-trys and error handling. \n", "hints_text": "", "created_at": "2020-06-02T14:48:26Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 422, "instance_id": "corona-warn-app__cwa-server-422", "issue_numbers": ["414"], "base_commit": "1032f0e5950d2d6fa064da7026825e3c25260c79", "patch": "diff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n@@ -12,4 +12,11 @@ message ApplicationConfiguration {\n app.coronawarn.server.common.protocols.internal.RiskScoreClassification riskScoreClasses = 2;\n \n app.coronawarn.server.common.protocols.internal.RiskScoreParameters exposureConfig = 3;\n+\n+ AttenuationDurationThresholds attenuationDurationThresholds = 4;\n+}\n+\n+message AttenuationDurationThresholds {\n+ int32 lower = 1;\n+ int32 upper = 2;\n }\n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n@@ -20,6 +20,11 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n \n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n+\n import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n import app.coronawarn.server.common.protocols.internal.RiskScoreClassification;\n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n@@ -46,6 +51,7 @@ public ValidationResult validate() {\n this.errors = new ValidationResult();\n \n validateMinRisk();\n+ validateAttenuationDurationThresholds();\n \n ValidationResult exposureResult = new ExposureConfigurationValidator(config.getExposureConfig()).validate();\n ValidationResult riskScoreResult = new RiskScoreClassificationValidator(config.getRiskScoreClasses()).validate();\n@@ -60,4 +66,25 @@ private void validateMinRisk() {\n this.errors.add(new MinimumRiskLevelValidationError(minLevel));\n }\n }\n+\n+ private void validateAttenuationDurationThresholds() {\n+ int lower = config.getAttenuationDurationThresholds().getLower();\n+ int upper = config.getAttenuationDurationThresholds().getUpper();\n+\n+ checkThresholdBound(\"lower\", lower);\n+ checkThresholdBound(\"upper\", upper);\n+\n+ if (lower > upper) {\n+ String parameters = \"attenuationDurationThreshold.lower, attenuationDurationThreshold.upper\";\n+ String values = lower + \", \" + upper;\n+ this.errors.add(new GeneralValidationError(parameters, values, MIN_GREATER_THAN_MAX));\n+ }\n+ }\n+\n+ private void checkThresholdBound(String boundLabel, int boundValue) {\n+ if (boundValue < ATTENUATION_DURATION_THRESHOLD_MIN || boundValue > ATTENUATION_DURATION_THRESHOLD_MAX) {\n+ this.errors.add(\n+ new GeneralValidationError(\"attenuationDurationThreshold.\" + boundLabel, boundValue, VALUE_OUT_OF_BOUNDS));\n+ }\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java\nsimilarity index 82%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidationError.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java\n@@ -22,23 +22,21 @@\n \n import java.util.Objects;\n \n-public class RiskScoreClassificationValidationError implements ValidationError {\n+public class GeneralValidationError implements ValidationError {\n \n private final String errorSource;\n-\n private final Object value;\n-\n private final ErrorType reason;\n \n /**\n- * Creates a {@link RiskScoreClassificationValidationError} that stores the specified validation error source,\n+ * Creates a {@link GeneralValidationError} that stores the specified validation error source,\n * erroneous value and a reason for the error to occur.\n *\n * @param errorSource A label that describes the property associated with this validation error.\n * @param value The value that caused the validation error.\n * @param reason A validation error specifier.\n */\n- public RiskScoreClassificationValidationError(String errorSource, Object value, ErrorType reason) {\n+ public GeneralValidationError(String errorSource, Object value, ErrorType reason) {\n this.errorSource = errorSource;\n this.value = value;\n this.reason = reason;\n@@ -46,7 +44,7 @@ public RiskScoreClassificationValidationError(String errorSource, Object value,\n \n @Override\n public String toString() {\n- return \"RiskScoreClassificationValidationError{\"\n+ return \"GeneralValidationError{\"\n + \"errorType=\" + reason\n + \", parameter='\" + errorSource + '\\''\n + \", givenValue=\" + value\n@@ -61,7 +59,7 @@ public boolean equals(Object o) {\n if (o == null || getClass() != o.getClass()) {\n return false;\n }\n- RiskScoreClassificationValidationError that = (RiskScoreClassificationValidationError) o;\n+ GeneralValidationError that = (GeneralValidationError) o;\n return Objects.equals(errorSource, that.errorSource)\n && Objects.equals(value, that.value)\n && Objects.equals(reason, that.reason);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n@@ -53,4 +53,14 @@ private ParameterSpec() {\n * The allowed maximum value for a risk score.\n */\n public static final int RISK_SCORE_MAX = 4096;\n+\n+ /**\n+ * The allowed minimum value for an attenuation threshold.\n+ */\n+ public static final int ATTENUATION_DURATION_THRESHOLD_MIN = 0;\n+\n+ /**\n+ * The allowed maximum value for an attenuation threshold.\n+ */\n+ public static final int ATTENUATION_DURATION_THRESHOLD_MAX = 100;\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n@@ -20,11 +20,11 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n \n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.BLANK_LABEL;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.INVALID_PARTITIONING;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.INVALID_URL;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.BLANK_LABEL;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.INVALID_PARTITIONING;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.INVALID_URL;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n \n import app.coronawarn.server.common.protocols.internal.RiskScoreClass;\n import app.coronawarn.server.common.protocols.internal.RiskScoreClassification;\n@@ -69,7 +69,7 @@ private void validateValues() {\n validateUrl(riskScoreClass.getUrl());\n \n if (minRiskLevel > maxRiskLevel) {\n- errors.add(new RiskScoreClassificationValidationError(\n+ errors.add(new GeneralValidationError(\n \"minRiskLevel, maxRiskLevel\", minRiskLevel + \", \" + maxRiskLevel, MIN_GREATER_THAN_MAX));\n }\n }\n@@ -77,13 +77,13 @@ private void validateValues() {\n \n private void validateLabel(String label) {\n if (label.isBlank()) {\n- errors.add(new RiskScoreClassificationValidationError(\"label\", label, BLANK_LABEL));\n+ errors.add(new GeneralValidationError(\"label\", label, BLANK_LABEL));\n }\n }\n \n private void validateRiskScoreValueBounds(int value) {\n if (!RiskScoreValidator.isInBounds(value)) {\n- errors.add(new RiskScoreClassificationValidationError(\"minRiskLevel/maxRiskLevel\", value, VALUE_OUT_OF_BOUNDS));\n+ errors.add(new GeneralValidationError(\"minRiskLevel/maxRiskLevel\", value, VALUE_OUT_OF_BOUNDS));\n }\n }\n \n@@ -91,7 +91,7 @@ private void validateUrl(String url) {\n try {\n new URL(url.trim());\n } catch (MalformedURLException e) {\n- errors.add(new RiskScoreClassificationValidationError(\"url\", url, INVALID_URL));\n+ errors.add(new GeneralValidationError(\"url\", url, INVALID_URL));\n }\n }\n \n@@ -101,7 +101,7 @@ private void validateValueRangeCoverage() {\n .sum();\n \n if (partitionSum != ParameterSpec.RISK_SCORE_MAX + 1) {\n- errors.add(new RiskScoreClassificationValidationError(\"covered value range\", partitionSum, INVALID_PARTITIONING));\n+ errors.add(new GeneralValidationError(\"covered value range\", partitionSum, INVALID_PARTITIONING));\n }\n }\n }\ndiff --git a/services/distribution/src/main/resources/master-config/app-config.yaml b/services/distribution/src/main/resources/master-config/app-config.yaml\n--- a/services/distribution/src/main/resources/master-config/app-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/app-config.yaml\n@@ -9,5 +9,8 @@\n # Change this file with caution!\n \n min-risk-score: 90\n+attenuationDurationThresholds:\n+ lower: 50\n+ upper: 70\n risk-score-classes: !include risk-score-classification.yaml\n exposure-config: !include exposure-config.yaml\n\\ No newline at end of file\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n@@ -20,16 +20,26 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n \n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.MINIMAL_RISK_SCORE_CLASSIFICATION;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildExpectedResult;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatThrownBy;\n \n+import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n+import app.coronawarn.server.common.protocols.internal.AttenuationDurationThresholds;\n import app.coronawarn.server.services.distribution.assembly.appconfig.ApplicationConfigurationProvider;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.ExposureConfigurationProvider;\n import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n import java.util.stream.Stream;\n import org.junit.jupiter.api.Test;\n import org.junit.jupiter.params.ParameterizedTest;\n import org.junit.jupiter.params.provider.Arguments;\n import org.junit.jupiter.params.provider.MethodSource;\n+import org.junit.jupiter.params.provider.ValueSource;\n \n class ApplicationConfigurationValidatorTest {\n \n@@ -49,6 +59,43 @@ void negative(TestWithExpectedResult test) throws UnableToLoadFileException {\n assertThat(getResultForTest(test)).isEqualTo(test.result);\n }\n \n+ @ParameterizedTest\n+ @ValueSource(ints = {ATTENUATION_DURATION_THRESHOLD_MIN - 1, ATTENUATION_DURATION_THRESHOLD_MAX + 1})\n+ void negativeForAttenuationDurationThresholdOutOfBounds(int invalidThresholdValue) throws Exception {\n+ ApplicationConfigurationValidator validator = getValidatorForAttenuationDurationThreshold(\n+ invalidThresholdValue, invalidThresholdValue);\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ new GeneralValidationError(\"attenuationDurationThreshold.upper\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS),\n+ new GeneralValidationError(\"attenuationDurationThreshold.lower\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ @Test\n+ void negativeForUpperAttenuationDurationThresholdLesserThanLower() throws Exception {\n+ ApplicationConfigurationValidator validator = getValidatorForAttenuationDurationThreshold(\n+ ATTENUATION_DURATION_THRESHOLD_MAX, ATTENUATION_DURATION_THRESHOLD_MIN);\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ new GeneralValidationError(\"attenuationDurationThreshold.lower, attenuationDurationThreshold.upper\",\n+ (ATTENUATION_DURATION_THRESHOLD_MAX + \", \" + ATTENUATION_DURATION_THRESHOLD_MIN), MIN_GREATER_THAN_MAX));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ private ApplicationConfigurationValidator getValidatorForAttenuationDurationThreshold(int lower, int upper)\n+ throws Exception {\n+ ApplicationConfiguration appConfig = ApplicationConfiguration.newBuilder()\n+ .setMinRiskScore(100)\n+ .setRiskScoreClasses(MINIMAL_RISK_SCORE_CLASSIFICATION)\n+ .setExposureConfig(ExposureConfigurationProvider.readFile(\"configtests/exposure-config_ok.yaml\"))\n+ .setAttenuationDurationThresholds(AttenuationDurationThresholds.newBuilder()\n+ .setLower(lower)\n+ .setUpper(upper)).build();\n+ return new ApplicationConfigurationValidator(appConfig);\n+ }\n+\n @Test\n void circular() {\n assertThatThrownBy(() -> {\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n@@ -20,14 +20,14 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n \n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.INVALID_PARTITIONING;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.INVALID_PARTITIONING;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n import static java.util.Arrays.asList;\n import static org.assertj.core.api.Assertions.assertThat;\n \n import app.coronawarn.server.common.protocols.internal.RiskScoreClass;\n import app.coronawarn.server.common.protocols.internal.RiskScoreClassification;\n-import app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidationError.ErrorType;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType;\n import java.util.Arrays;\n import java.util.stream.Stream;\n import org.junit.jupiter.api.Test;\n@@ -42,6 +42,9 @@ class RiskScoreClassificationValidatorTest {\n private final static String VALID_LABEL = \"myLabel\";\n private final static String VALID_URL = \"https://www.my.url\";\n \n+ public final static RiskScoreClassification MINIMAL_RISK_SCORE_CLASSIFICATION =\n+ buildClassification(buildRiskClass(VALID_LABEL, 0, MAX_SCORE, VALID_URL));\n+\n @ParameterizedTest\n @ValueSource(strings = {\"\", \" \"})\n void failsForBlankLabels(String invalidLabel) {\n@@ -134,8 +137,7 @@ void doesNotFailForValidClassification(RiskScoreClassification validClassificati\n \n private static Stream createValidClassifications() {\n return Stream.of(\n- // valid url\n- buildClassification(buildRiskClass(VALID_LABEL, 0, MAX_SCORE, VALID_URL)),\n+ MINIMAL_RISK_SCORE_CLASSIFICATION,\n // [0:MAX_SCORE/2][MAX_SCORE/2:MAX_SCORE]\n buildClassification(\n buildRiskClass(VALID_LABEL, 0, MAX_SCORE / 2, VALID_URL),\n@@ -148,8 +150,8 @@ private static Stream createValidClassifications() {\n ).map(Arguments::of);\n }\n \n- private static RiskScoreClassificationValidationError buildError(String parameter, Object value, ErrorType reason) {\n- return new RiskScoreClassificationValidationError(parameter, value, reason);\n+ private static GeneralValidationError buildError(String parameter, Object value, ErrorType reason) {\n+ return new GeneralValidationError(parameter, value, reason);\n }\n \n private static RiskScoreClassificationValidator buildValidator(RiskScoreClass... riskScoreClasses) {\n@@ -164,7 +166,7 @@ private static RiskScoreClass buildRiskClass(String label, int min, int max, Str\n return RiskScoreClass.newBuilder().setLabel(label).setMin(min).setMax(max).setUrl(url).build();\n }\n \n- private static ValidationResult buildExpectedResult(RiskScoreClassificationValidationError... errors) {\n+ public static ValidationResult buildExpectedResult(GeneralValidationError... errors) {\n var validationResult = new ValidationResult();\n Arrays.stream(errors).forEach(validationResult::add);\n return validationResult;\ndiff --git a/services/distribution/src/test/resources/configtests/app-config_ok.yaml b/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n--- a/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n+++ b/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n@@ -1,3 +1,6 @@\n min-risk-score: 100\n+attenuationDurationThresholds:\n+ lower: 50\n+ upper: 70\n risk-score-classes: !include risk-score-class_ok.yaml\n exposure-config: !include exposure-config_ok.yaml\n\\ No newline at end of file\n", "problem_statement": "Application Config: Add new Parameter attenuationDurationThresholds\nAdd a new parameter to the application configuration, called \"attenuationDurationTresholds\". With the help of this parameter, we will be able to calculate the overall risk factor much better.\r\n\r\nDefault values are: X=50, Y=70. There will be call with the RKI today night in which the values might be adjusted.\r\n\r\n```yaml\r\nattenuation-duration-thresholds:\r\n lower: 50\r\n upper: 70\r\n```\n", "hints_text": "Are there any known constraints that define the validity of X/Y values?\nShould be:\r\n- type: integer\r\n- 0 to 100 (upper bound might change though, but use 100 for now)\r\n- x must by lower than y -> so would also be nice to make that more explicit, by calling them lower and upper. (edited description of ticket)", "created_at": "2020-06-02T17:41:10Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 424, "instance_id": "corona-warn-app__cwa-server-424", "issue_numbers": ["416"], "base_commit": "2be284e0518658dcb7ef8d1df5515fd5f962e242", "patch": "diff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n@@ -4,6 +4,7 @@ option java_package = \"app.coronawarn.server.common.protocols.internal\";\n option java_multiple_files = true;\n import \"app/coronawarn/server/common/protocols/internal/risk_score_classification.proto\";\n import \"app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\";\n+import \"app/coronawarn/server/common/protocols/internal/app_version_config.proto\";\n \n message ApplicationConfiguration {\n \n@@ -14,6 +15,8 @@ message ApplicationConfiguration {\n app.coronawarn.server.common.protocols.internal.RiskScoreParameters exposureConfig = 3;\n \n AttenuationDurationThresholds attenuationDurationThresholds = 4;\n+\n+ app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration appVersion = 5;\n }\n \n message AttenuationDurationThresholds {\ndiff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_version_config.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_version_config.proto\nnew file mode 100644\n--- /dev/null\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_version_config.proto\n@@ -0,0 +1,20 @@\n+syntax = \"proto3\";\n+package app.coronawarn.server.common.protocols.internal;\n+option java_package = \"app.coronawarn.server.common.protocols.internal\";\n+option java_multiple_files = true;\n+\n+message ApplicationVersionConfiguration {\n+ ApplicationVersionInfo ios = 1;\n+ ApplicationVersionInfo android = 2;\n+}\n+\n+message ApplicationVersionInfo {\n+ SemanticVersion latest = 1;\n+ SemanticVersion min = 2;\n+}\n+\n+message SemanticVersion {\n+ uint32 major = 1;\n+ uint32 minor = 2;\n+ uint32 patch = 3;\n+}\n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProvider.java\n@@ -0,0 +1,56 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig;\n+\n+import app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration;\n+\n+/**\n+ * Provides the mobile app version configuration based on a file in the file system. The existing file must be a\n+ * valid YAML file, and must match the specification of the proto file app_version_config.proto.\n+ */\n+public class ApplicationVersionConfigurationProvider {\n+\n+ /**\n+ * The location of the app version config master file.\n+ */\n+ public static final String MASTER_FILE = \"master-config/app-version-config.yaml\";\n+\n+ /**\n+ * Fetches the master configuration as an ApplicationVersionConfig instance.\n+ *\n+ * @return the mobile app version configuration as ApplicationVersionConfig\n+ * @throws UnableToLoadFileException when the file/transformation did not succeed\n+ */\n+ public static ApplicationVersionConfiguration readMasterFile() throws UnableToLoadFileException {\n+ return readFile(MASTER_FILE);\n+ }\n+\n+ /**\n+ * Fetches an app version configuration file based on the given path. The path must be available in the classloader.\n+ *\n+ * @param path the path, e.g. folder/my-app-version-config.yaml\n+ * @return the ApplicationVersionConfig\n+ * @throws UnableToLoadFileException when the file/transformation did not succeed\n+ */\n+ public static ApplicationVersionConfiguration readFile(String path) throws UnableToLoadFileException {\n+ return YamlLoader.loadYamlIntoProtobufBuilder(path, ApplicationVersionConfiguration.Builder.class).build();\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoader.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoader.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoader.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoader.java\n@@ -50,8 +50,8 @@ public static T loadYamlIntoProtobufBuilder(String p\n // no setters for generated message classes available\n yaml.setBeanAccess(BeanAccess.FIELD);\n \n- Resource riskScoreParametersResource = new ClassPathResource(path);\n- try (InputStream inputStream = riskScoreParametersResource.getInputStream()) {\n+ Resource configurationResource = new ClassPathResource(path);\n+ try (InputStream inputStream = configurationResource.getInputStream()) {\n T loaded = yaml.loadAs(inputStream, builderType);\n if (loaded == null) {\n throw new UnableToLoadFileException(path);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationVersionConfigurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationVersionConfigurationValidator.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationVersionConfigurationValidator.java\n@@ -0,0 +1,81 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n+\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+\n+import app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration;\n+import app.coronawarn.server.common.protocols.internal.ApplicationVersionInfo;\n+import app.coronawarn.server.common.protocols.internal.SemanticVersion;\n+\n+public class ApplicationVersionConfigurationValidator extends ConfigurationValidator {\n+\n+ private final ApplicationVersionConfiguration config;\n+\n+ public ApplicationVersionConfigurationValidator(ApplicationVersionConfiguration config) {\n+ this.config = config;\n+ }\n+\n+ @Override\n+ public ValidationResult validate() {\n+ this.errors = new ValidationResult();\n+ validateApplicationVersionInfo(\"ios\", config.getIos());\n+ validateApplicationVersionInfo(\"android\", config.getAndroid());\n+ return this.errors;\n+ }\n+\n+ private void validateApplicationVersionInfo(String name, ApplicationVersionInfo appVersionInfo) {\n+ SemanticVersion minVersion = appVersionInfo.getMin();\n+ ComparisonResult comparisonResult = compare(appVersionInfo.getLatest(), minVersion);\n+ if (ComparisonResult.LOWER.equals(comparisonResult)) {\n+ this.errors.add(new GeneralValidationError(name + \": latest/min\",\n+ minVersion.getMajor() + \".\" + minVersion.getMinor() + \".\" + minVersion.getPatch(), MIN_GREATER_THAN_MAX));\n+ }\n+ }\n+\n+ private ComparisonResult compare(SemanticVersion left, SemanticVersion right) {\n+ if (left.getMajor() < right.getMajor()) {\n+ return ComparisonResult.LOWER;\n+ }\n+ if (left.getMajor() > right.getMajor()) {\n+ return ComparisonResult.HIGHER;\n+ }\n+ if (left.getMinor() < right.getMinor()) {\n+ return ComparisonResult.LOWER;\n+ }\n+ if (left.getMinor() > right.getMinor()) {\n+ return ComparisonResult.HIGHER;\n+ }\n+ if (left.getPatch() < right.getPatch()) {\n+ return ComparisonResult.LOWER;\n+ }\n+ if (left.getPatch() > right.getPatch()) {\n+ return ComparisonResult.HIGHER;\n+ }\n+ return ComparisonResult.EQUAL;\n+ }\n+\n+ private enum ComparisonResult {\n+ LOWER,\n+ EQUAL,\n+ HIGHER\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/GeneralValidationError.java\n@@ -44,7 +44,7 @@ public GeneralValidationError(String errorSource, Object value, ErrorType reason\n \n @Override\n public String toString() {\n- return \"GeneralValidationError{\"\n+ return \"RiskScoreClassificationValidationError{\"\n + \"errorType=\" + reason\n + \", parameter='\" + errorSource + '\\''\n + \", givenValue=\" + value\ndiff --git a/services/distribution/src/main/resources/master-config/app-config.yaml b/services/distribution/src/main/resources/master-config/app-config.yaml\n--- a/services/distribution/src/main/resources/master-config/app-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/app-config.yaml\n@@ -13,4 +13,5 @@ attenuationDurationThresholds:\n lower: 50\n upper: 70\n risk-score-classes: !include risk-score-classification.yaml\n-exposure-config: !include exposure-config.yaml\n\\ No newline at end of file\n+exposure-config: !include exposure-config.yaml\n+app-version: !include app-version-config.yaml\n\\ No newline at end of file\ndiff --git a/services/distribution/src/main/resources/master-config/app-version-config.yaml b/services/distribution/src/main/resources/master-config/app-version-config.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/master-config/app-version-config.yaml\n@@ -0,0 +1,25 @@\n+# This is the Application Version Configuration master file which contains information for clients\n+# about the latest and minimum supported mobile app versions on Android and iOS.\n+#\n+# The latest version must not be lower than the min version.\n+#\n+# Change this file with caution!\n+\n+ios:\n+ latest:\n+ major: 1\n+ minor: 5\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 1\n+ patch: 2\n\\ No newline at end of file\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderMasterFileTest.java\n@@ -0,0 +1,49 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ApplicationVersionConfigurationValidator;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ExposureConfigurationValidator;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationResult;\n+import org.junit.jupiter.api.Test;\n+\n+/**\n+ * This test will verify that the provided Exposure Configuration master file is syntactically\n+ * correct and according to spec.\n+ *
\n+ * There should never be any deployment when this test is failing.\n+ */\n+class ApplicationVersionConfigurationProviderMasterFileTest {\n+\n+ private static final ValidationResult SUCCESS = new ValidationResult();\n+\n+ @Test\n+ void testMasterFile() throws UnableToLoadFileException {\n+ var config = ApplicationVersionConfigurationProvider.readMasterFile();\n+\n+ var validator = new ApplicationVersionConfigurationValidator(config);\n+ ValidationResult result = validator.validate();\n+\n+ assertThat(result).isEqualTo(SUCCESS);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationVersionConfigurationProviderTest.java\n@@ -0,0 +1,59 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.assertj.core.api.Assertions.catchThrowable;\n+\n+import app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration;\n+import org.junit.jupiter.api.Test;\n+\n+public class ApplicationVersionConfigurationProviderTest {\n+\n+ @Test\n+ void okFile() throws UnableToLoadFileException {\n+ ApplicationVersionConfiguration result =\n+ ApplicationVersionConfigurationProvider.readFile(\"app-version/all_ok.yaml\");\n+\n+ assertThat(result).withFailMessage(\"File is null, indicating loading failed\").isNotNull();\n+ }\n+\n+ @Test\n+ void wrongFile() {\n+ assertUnableToLoadFile(\"app-version/wrong_file.yaml\");\n+ }\n+\n+ @Test\n+ void brokenSyntax() {\n+ assertUnableToLoadFile(\"app-version/broken_syntax.yaml\");\n+ }\n+\n+ @Test\n+ void doesNotExist() {\n+ assertUnableToLoadFile(\"file_does_not_exist_anywhere.yaml\");\n+ }\n+\n+ public static void assertUnableToLoadFile(String s) {\n+ assertThat(catchThrowable(() ->\n+ ApplicationVersionConfigurationProvider.readFile(s)))\n+ .isInstanceOf(UnableToLoadFileException.class);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationVersionConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationVersionConfigurationValidatorTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationVersionConfigurationValidatorTest.java\n@@ -0,0 +1,61 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n+\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildExpectedResult;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.ApplicationVersionConfigurationProvider;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType;\n+import org.junit.jupiter.api.Test;\n+\n+public class ApplicationVersionConfigurationValidatorTest {\n+\n+ private static final ValidationResult SUCCESS = new ValidationResult();\n+\n+ @Test\n+ void succeedsIfLatestEqualsMin() throws UnableToLoadFileException {\n+ ApplicationVersionConfiguration config = ApplicationVersionConfigurationProvider\n+ .readFile(\"app-version/latest-equals-min.yaml\");\n+ var validator = new ApplicationVersionConfigurationValidator(config);\n+ assertThat(validator.validate()).isEqualTo(SUCCESS);\n+ }\n+\n+ @Test\n+ void succeedsIfLatestHigherThanMin() throws UnableToLoadFileException {\n+ ApplicationVersionConfiguration config = ApplicationVersionConfigurationProvider\n+ .readFile(\"app-version/latest-higher-than-min.yaml\");\n+ var validator = new ApplicationVersionConfigurationValidator(config);\n+ assertThat(validator.validate()).isEqualTo(SUCCESS);\n+ }\n+\n+ @Test\n+ void failsIfLatestLowerThanMin() throws UnableToLoadFileException {\n+ ApplicationVersionConfiguration config = ApplicationVersionConfigurationProvider\n+ .readFile(\"app-version/latest-lower-than-min.yaml\");\n+ var validator = new ApplicationVersionConfigurationValidator(config);\n+ assertThat(validator.validate())\n+ .isEqualTo(buildExpectedResult(buildError(\"ios: latest/min\", \"1.2.2\", ErrorType.MIN_GREATER_THAN_MAX)));\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n@@ -150,7 +150,7 @@ private static Stream createValidClassifications() {\n ).map(Arguments::of);\n }\n \n- private static GeneralValidationError buildError(String parameter, Object value, ErrorType reason) {\n+ public static GeneralValidationError buildError(String parameter, Object value, ErrorType reason) {\n return new GeneralValidationError(parameter, value, reason);\n }\n \ndiff --git a/services/distribution/src/test/resources/app-version/all_ok.yaml b/services/distribution/src/test/resources/app-version/all_ok.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/all_ok.yaml\n@@ -0,0 +1,18 @@\n+ios:\n+ latest:\n+ major: 1\n+ minor: 5\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 1\n+ patch: 2\ndiff --git a/services/distribution/src/test/resources/app-version/broken_syntax.yaml b/services/distribution/src/test/resources/app-version/broken_syntax.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/broken_syntax.yaml\n@@ -0,0 +1,18 @@\n+ios:\n+ latest:\n+ major: 1 # wrong syntax, indent too high\n+ minor: 5\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 1\n+ patch: 2\ndiff --git a/services/distribution/src/test/resources/app-version/empty.yaml b/services/distribution/src/test/resources/app-version/empty.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/empty.yaml\n@@ -0,0 +1 @@\n+# empty file\n\\ No newline at end of file\ndiff --git a/services/distribution/src/test/resources/app-version/latest-equals-min.yaml b/services/distribution/src/test/resources/app-version/latest-equals-min.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/latest-equals-min.yaml\n@@ -0,0 +1,18 @@\n+ios:\n+ latest:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 3\n+ patch: 2\ndiff --git a/services/distribution/src/test/resources/app-version/latest-higher-than-min.yaml b/services/distribution/src/test/resources/app-version/latest-higher-than-min.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/latest-higher-than-min.yaml\n@@ -0,0 +1,18 @@\n+ios:\n+ latest:\n+ major: 1\n+ minor: 2\n+ patch: 3\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 3\n+ patch: 2\ndiff --git a/services/distribution/src/test/resources/app-version/latest-lower-than-min.yaml b/services/distribution/src/test/resources/app-version/latest-lower-than-min.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/latest-lower-than-min.yaml\n@@ -0,0 +1,18 @@\n+ios:\n+ latest:\n+ major: 1\n+ minor: 2\n+ patch: 1\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 3\n+ patch: 2\ndiff --git a/services/distribution/src/test/resources/app-version/wrong_file.yaml b/services/distribution/src/test/resources/app-version/wrong_file.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/app-version/wrong_file.yaml\n@@ -0,0 +1,20 @@\n+ID: com.acme.mta.sample\n+version: 1.0.1\n+modules:\n+ - name: pricing-ui\n+ type: nodejs\n+ path: ./ui\n+ requires:\n+ - name: thedatabase\n+\n+ - name: pricing-backend\n+ type: java\n+ path: ./backend\n+ provides:\n+ - name: price_opt\n+ properties:\n+ protocol: http\n+ uri: myhost.mydomain\n+resources:\n+ - name: thedatabase\n+ type: com.sap.xs.hdi-container\n\\ No newline at end of file\ndiff --git a/services/distribution/src/test/resources/configtests/app-config_ok.yaml b/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n--- a/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n+++ b/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n@@ -3,4 +3,5 @@ attenuationDurationThresholds:\n lower: 50\n upper: 70\n risk-score-classes: !include risk-score-class_ok.yaml\n-exposure-config: !include exposure-config_ok.yaml\n\\ No newline at end of file\n+exposure-config: !include exposure-config_ok.yaml\n+app-version: !include app-version-config_ok.yaml\n\\ No newline at end of file\ndiff --git a/services/distribution/src/test/resources/configtests/app-version-config_ok.yaml b/services/distribution/src/test/resources/configtests/app-version-config_ok.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/configtests/app-version-config_ok.yaml\n@@ -0,0 +1,18 @@\n+ios:\n+ latest:\n+ major: 1\n+ minor: 5\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 2\n+ patch: 2\n+android:\n+ latest:\n+ major: 1\n+ minor: 3\n+ patch: 2\n+ min:\n+ major: 1\n+ minor: 1\n+ patch: 2\n", "problem_statement": "Application Configuration: Add version update support\nWe would like to keep the mobile application informed about new releases/current release of the app. This information can then be presented to the user, in order to ask for applying updates. \r\n\r\nWe would like to add new fields to the application config (example values):\r\n \r\n```yaml\r\napp-version:\r\n ios:\r\n latest: 1.5.2\r\n min: 1.2.2\r\n android: \r\n latest: 1.3.2\r\n min: 1.1.2\r\n```\r\n\r\nAfter downloading the config, the app checks whether the signature can be verified. If that is the case, it will get the current & min values from the config based on the target platform. \r\n\r\nThis information can now be used to prompt users for updating the app. The values for the versions must follow semantic versioning.\n", "hints_text": "", "created_at": "2020-06-02T19:03:56Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 429, "instance_id": "corona-warn-app__cwa-server-429", "issue_numbers": ["404"], "base_commit": "528b73595c202a8216bd321dafd431206a6fd2c0", "patch": "diff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n@@ -32,7 +32,6 @@\n import javax.validation.ConstraintViolation;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n-import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.data.domain.Sort;\n import org.springframework.data.domain.Sort.Direction;\n import org.springframework.stereotype.Component;\n@@ -44,7 +43,6 @@ public class DiagnosisKeyService {\n private static final Logger logger = LoggerFactory.getLogger(DiagnosisKeyService.class);\n private final DiagnosisKeyRepository keyRepository;\n \n- @Autowired\n public DiagnosisKeyService(DiagnosisKeyRepository keyRepository) {\n this.keyRepository = keyRepository;\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n@@ -30,7 +30,6 @@\n import java.util.Collection;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n-import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.stereotype.Component;\n \n /**\n@@ -42,8 +41,7 @@ public class DiagnosisKeysStructureProvider {\n private static final Logger logger = LoggerFactory\n .getLogger(DiagnosisKeysStructureProvider.class);\n \n- @Autowired\n- private DiagnosisKeyBundler diagnosisKeyBundler;\n+ private final DiagnosisKeyBundler diagnosisKeyBundler;\n private final DiagnosisKeyService diagnosisKeyService;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n@@ -52,10 +50,11 @@ public class DiagnosisKeysStructureProvider {\n * Creates a new DiagnosisKeysStructureProvider.\n */\n DiagnosisKeysStructureProvider(DiagnosisKeyService diagnosisKeyService, CryptoProvider cryptoProvider,\n- DistributionServiceConfig distributionServiceConfig) {\n+ DistributionServiceConfig distributionServiceConfig, DiagnosisKeyBundler diagnosisKeyBundler) {\n this.diagnosisKeyService = diagnosisKeyService;\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n+ this.diagnosisKeyBundler = diagnosisKeyBundler;\n }\n \n /**\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n@@ -29,7 +29,6 @@\n import java.util.List;\n import java.util.regex.Matcher;\n import java.util.regex.Pattern;\n-import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.stereotype.Component;\n \n /**\n@@ -41,7 +40,6 @@ public class S3RetentionPolicy {\n private final ObjectStoreAccess objectStoreAccess;\n private final Api api;\n \n- @Autowired\n public S3RetentionPolicy(ObjectStoreAccess objectStoreAccess, DistributionServiceConfig distributionServiceConfig) {\n this.objectStoreAccess = objectStoreAccess;\n this.api = distributionServiceConfig.getApi();\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n@@ -36,7 +36,6 @@\n import org.apache.commons.math3.distribution.PoissonDistribution;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n-import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.http.HttpStatus;\n import org.springframework.http.ResponseEntity;\n import org.springframework.util.StopWatch;\n@@ -67,7 +66,6 @@ public class SubmissionController {\n private final Integer retentionDays;\n private Double fakeDelay;\n \n- @Autowired\n SubmissionController(DiagnosisKeyService diagnosisKeyService, TanVerifier tanVerifier,\n SubmissionServiceConfig submissionServiceConfig) {\n this.diagnosisKeyService = diagnosisKeyService;\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n@@ -23,7 +23,6 @@\n import feign.FeignException;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n-import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.stereotype.Service;\n import org.springframework.web.client.RestClientException;\n \n@@ -41,7 +40,6 @@ public class TanVerifier {\n *\n * @param verificationServerClient The REST client to communicate with the verification server\n */\n- @Autowired\n public TanVerifier(VerificationServerClient verificationServerClient) {\n this.verificationServerClient = verificationServerClient;\n }\n", "test_patch": "diff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n@@ -29,7 +29,6 @@\n import java.time.Instant;\n import java.time.LocalDate;\n import java.util.Collection;\n-import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.test.web.client.TestRestTemplate;\n import org.springframework.http.HttpHeaders;\n import org.springframework.http.HttpMethod;\n@@ -50,7 +49,6 @@ public class RequestExecutor {\n private static final URI SUBMISSION_URL = URI.create(\"/version/v1/diagnosis-keys\");\n private final TestRestTemplate testRestTemplate;\n \n- @Autowired\n public RequestExecutor(TestRestTemplate testRestTemplate) {\n this.testRestTemplate = testRestTemplate;\n }\n", "problem_statement": "Use Implicit Constructor Injection over Explicit\nThe `@Autowired` annotation for Spring components can be omitted for constructors in case there is only one constructor present on the class. Therefore, remove all the unnecessary annotation for those cases.\n", "hints_text": "I guess it should be doable for me to get started", "created_at": "2020-06-02T21:54:44Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 431, "instance_id": "corona-warn-app__cwa-server-431", "issue_numbers": ["428"], "base_commit": "20492aaed28176142700486f99877b602b9f1cde", "patch": "diff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/app_config.proto\n@@ -5,6 +5,7 @@ option java_multiple_files = true;\n import \"app/coronawarn/server/common/protocols/internal/risk_score_classification.proto\";\n import \"app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\";\n import \"app/coronawarn/server/common/protocols/internal/app_version_config.proto\";\n+import \"app/coronawarn/server/common/protocols/internal/attenuation_duration.proto\";\n \n message ApplicationConfiguration {\n \n@@ -14,12 +15,7 @@ message ApplicationConfiguration {\n \n app.coronawarn.server.common.protocols.internal.RiskScoreParameters exposureConfig = 3;\n \n- AttenuationDurationThresholds attenuationDurationThresholds = 4;\n+ app.coronawarn.server.common.protocols.internal.AttenuationDuration attenuationDuration = 4;\n \n app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration appVersion = 5;\n }\n-\n-message AttenuationDurationThresholds {\n- int32 lower = 1;\n- int32 upper = 2;\n-}\n\\ No newline at end of file\ndiff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto\nnew file mode 100644\n--- /dev/null\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto\n@@ -0,0 +1,20 @@\n+syntax = \"proto3\";\n+package app.coronawarn.server.common.protocols.internal;\n+option java_package = \"app.coronawarn.server.common.protocols.internal\";\n+option java_multiple_files = true;\n+\n+message AttenuationDuration {\n+ Thresholds thresholds = 1;\n+ Weights weights = 2;\n+}\n+\n+message Thresholds {\n+ int32 lower = 1;\n+ int32 upper = 2;\n+}\n+\n+message Weights {\n+ double low = 1;\n+ double mid = 2;\n+ double high = 3;\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n@@ -20,11 +20,6 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n \n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MAX;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n-\n import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n import app.coronawarn.server.common.protocols.internal.RiskScoreClassification;\n import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n@@ -51,12 +46,13 @@ public ValidationResult validate() {\n this.errors = new ValidationResult();\n \n validateMinRisk();\n- validateAttenuationDurationThresholds();\n \n- ValidationResult exposureResult = new ExposureConfigurationValidator(config.getExposureConfig()).validate();\n- ValidationResult riskScoreResult = new RiskScoreClassificationValidator(config.getRiskScoreClasses()).validate();\n+ errors.with(new ExposureConfigurationValidator(config.getExposureConfig()).validate());\n+ errors.with(new RiskScoreClassificationValidator(config.getRiskScoreClasses()).validate());\n+ errors.with(new ApplicationVersionConfigurationValidator(config.getAppVersion()).validate());\n+ errors.with(new AttenuationDurationValidator(config.getAttenuationDuration()).validate());\n \n- return errors.with(exposureResult).with(riskScoreResult);\n+ return errors;\n }\n \n private void validateMinRisk() {\n@@ -66,25 +62,4 @@ private void validateMinRisk() {\n this.errors.add(new MinimumRiskLevelValidationError(minLevel));\n }\n }\n-\n- private void validateAttenuationDurationThresholds() {\n- int lower = config.getAttenuationDurationThresholds().getLower();\n- int upper = config.getAttenuationDurationThresholds().getUpper();\n-\n- checkThresholdBound(\"lower\", lower);\n- checkThresholdBound(\"upper\", upper);\n-\n- if (lower > upper) {\n- String parameters = \"attenuationDurationThreshold.lower, attenuationDurationThreshold.upper\";\n- String values = lower + \", \" + upper;\n- this.errors.add(new GeneralValidationError(parameters, values, MIN_GREATER_THAN_MAX));\n- }\n- }\n-\n- private void checkThresholdBound(String boundLabel, int boundValue) {\n- if (boundValue < ATTENUATION_DURATION_THRESHOLD_MIN || boundValue > ATTENUATION_DURATION_THRESHOLD_MAX) {\n- this.errors.add(\n- new GeneralValidationError(\"attenuationDurationThreshold.\" + boundLabel, boundValue, VALUE_OUT_OF_BOUNDS));\n- }\n- }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java\n@@ -0,0 +1,94 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n+\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.OUT_OF_RANGE;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.TOO_MANY_DECIMAL_PLACES;\n+\n+import app.coronawarn.server.common.protocols.internal.AttenuationDuration;\n+import java.math.BigDecimal;\n+\n+/**\n+ * The AttenuationDurationValidator validates the values of an associated {@link AttenuationDuration} instance.\n+ */\n+public class AttenuationDurationValidator extends ConfigurationValidator {\n+\n+ private final AttenuationDuration attenuationDuration;\n+\n+ public AttenuationDurationValidator(AttenuationDuration attenuationDuration) {\n+ this.attenuationDuration = attenuationDuration;\n+ }\n+\n+ @Override\n+ public ValidationResult validate() {\n+ errors = new ValidationResult();\n+\n+ validateThresholds();\n+ validateWeights();\n+\n+ return errors;\n+ }\n+\n+ private void validateThresholds() {\n+ int lower = attenuationDuration.getThresholds().getLower();\n+ int upper = attenuationDuration.getThresholds().getUpper();\n+\n+ checkThresholdBound(\"lower\", lower);\n+ checkThresholdBound(\"upper\", upper);\n+\n+ if (lower > upper) {\n+ String parameters = \"attenuation-duration.thresholds.lower, attenuation-duration.thresholds.upper\";\n+ String values = lower + \", \" + upper;\n+ this.errors.add(new GeneralValidationError(parameters, values, MIN_GREATER_THAN_MAX));\n+ }\n+ }\n+\n+ private void checkThresholdBound(String thresholdLabel, int thresholdValue) {\n+ if (thresholdValue < ATTENUATION_DURATION_THRESHOLD_MIN || thresholdValue > ATTENUATION_DURATION_THRESHOLD_MAX) {\n+ this.errors.add(new GeneralValidationError(\n+ \"attenuation-duration.thresholds.\" + thresholdLabel, thresholdValue, VALUE_OUT_OF_BOUNDS));\n+ }\n+ }\n+\n+ private void validateWeights() {\n+ checkWeight(\"low\", attenuationDuration.getWeights().getLow());\n+ checkWeight(\"mid\", attenuationDuration.getWeights().getMid());\n+ checkWeight(\"high\", attenuationDuration.getWeights().getHigh());\n+ }\n+\n+ private void checkWeight(String weightLabel, double weightValue) {\n+ if (weightValue < ATTENUATION_DURATION_WEIGHT_MIN || weightValue > ATTENUATION_DURATION_WEIGHT_MAX) {\n+ this.errors.add(new WeightValidationError(\n+ \"attenuation-duration.weights.\" + weightLabel, weightValue, OUT_OF_RANGE));\n+ }\n+\n+ if (BigDecimal.valueOf(weightValue).scale() > ParameterSpec.ATTENUATION_DURATION_WEIGHT_MAX_DECIMALS) {\n+ this.errors.add(new WeightValidationError(\n+ \"attenuation-duration.weights.\" + weightLabel, weightValue, TOO_MANY_DECIMAL_PLACES));\n+ }\n+ }\n+}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n@@ -63,4 +63,19 @@ private ParameterSpec() {\n * The allowed maximum value for an attenuation threshold.\n */\n public static final int ATTENUATION_DURATION_THRESHOLD_MAX = 100;\n+\n+ /**\n+ * The allowed minimum value for an attenuation weight.\n+ */\n+ public static final double ATTENUATION_DURATION_WEIGHT_MIN = .0;\n+\n+ /**\n+ * The allowed maximum value for an attenuation weight.\n+ */\n+ public static final double ATTENUATION_DURATION_WEIGHT_MAX = 1.;\n+\n+ /**\n+ * Maximum number of allowed decimals for an attenuation weight.\n+ */\n+ public static final int ATTENUATION_DURATION_WEIGHT_MAX_DECIMALS = 3;\n }\ndiff --git a/services/distribution/src/main/resources/master-config/app-config.yaml b/services/distribution/src/main/resources/master-config/app-config.yaml\n--- a/services/distribution/src/main/resources/master-config/app-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/app-config.yaml\n@@ -9,9 +9,7 @@\n # Change this file with caution!\n \n min-risk-score: 90\n-attenuationDurationThresholds:\n- lower: 50\n- upper: 70\n+attenuation-duration: !include attenuation-duration.yaml\n risk-score-classes: !include risk-score-classification.yaml\n exposure-config: !include exposure-config.yaml\n-app-version: !include app-version-config.yaml\n\\ No newline at end of file\n+app-version: !include app-version-config.yaml\ndiff --git a/services/distribution/src/main/resources/master-config/attenuation-duration.yaml b/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n@@ -0,0 +1,15 @@\n+# This is the attenuation and duration parameter thresholds. The lower and\n+# upper threshold partitions the value range into 3 subsets: low, mid, high\n+#\n+# Each of the aforementioned partitions has a weight in the range of [0, 1]\n+# assigned to it. The number of decimal places is restricted to 3.\n+#\n+# Change this file with caution!\n+\n+thresholds:\n+ lower: 50\n+ upper: 70\n+weights:\n+ low: 1.0\n+ mid: 0.5\n+ high: 0.0\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/AttenuationDurationMasterFileTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/AttenuationDurationMasterFileTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/AttenuationDurationMasterFileTest.java\n@@ -0,0 +1,47 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.protocols.internal.AttenuationDuration;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.AttenuationDurationValidator;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ConfigurationValidator;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationResult;\n+import org.junit.jupiter.api.Test;\n+\n+/**\n+ * This test will verify that the provided attenuation/duration parameters master file is syntactically correct and\n+ * according to spec. There should never be any deployment when this test is failing.\n+ */\n+class AttenuationDurationMasterFileTest {\n+\n+ private static final ValidationResult SUCCESS = new ValidationResult();\n+\n+ @Test\n+ void testMasterFile() throws UnableToLoadFileException {\n+ AttenuationDuration config = ApplicationConfigurationProvider.readMasterFile().getAttenuationDuration();\n+\n+ ConfigurationValidator validator = new AttenuationDurationValidator(config);\n+\n+ assertThat(validator.validate()).isEqualTo(SUCCESS);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n@@ -20,26 +20,16 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n \n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MAX;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.MINIMAL_RISK_SCORE_CLASSIFICATION;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildExpectedResult;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatThrownBy;\n \n-import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n-import app.coronawarn.server.common.protocols.internal.AttenuationDurationThresholds;\n import app.coronawarn.server.services.distribution.assembly.appconfig.ApplicationConfigurationProvider;\n-import app.coronawarn.server.services.distribution.assembly.appconfig.ExposureConfigurationProvider;\n import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n import java.util.stream.Stream;\n import org.junit.jupiter.api.Test;\n import org.junit.jupiter.params.ParameterizedTest;\n import org.junit.jupiter.params.provider.Arguments;\n import org.junit.jupiter.params.provider.MethodSource;\n-import org.junit.jupiter.params.provider.ValueSource;\n \n class ApplicationConfigurationValidatorTest {\n \n@@ -59,43 +49,6 @@ void negative(TestWithExpectedResult test) throws UnableToLoadFileException {\n assertThat(getResultForTest(test)).isEqualTo(test.result);\n }\n \n- @ParameterizedTest\n- @ValueSource(ints = {ATTENUATION_DURATION_THRESHOLD_MIN - 1, ATTENUATION_DURATION_THRESHOLD_MAX + 1})\n- void negativeForAttenuationDurationThresholdOutOfBounds(int invalidThresholdValue) throws Exception {\n- ApplicationConfigurationValidator validator = getValidatorForAttenuationDurationThreshold(\n- invalidThresholdValue, invalidThresholdValue);\n-\n- ValidationResult expectedResult = buildExpectedResult(\n- new GeneralValidationError(\"attenuationDurationThreshold.upper\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS),\n- new GeneralValidationError(\"attenuationDurationThreshold.lower\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS));\n-\n- assertThat(validator.validate()).isEqualTo(expectedResult);\n- }\n-\n- @Test\n- void negativeForUpperAttenuationDurationThresholdLesserThanLower() throws Exception {\n- ApplicationConfigurationValidator validator = getValidatorForAttenuationDurationThreshold(\n- ATTENUATION_DURATION_THRESHOLD_MAX, ATTENUATION_DURATION_THRESHOLD_MIN);\n-\n- ValidationResult expectedResult = buildExpectedResult(\n- new GeneralValidationError(\"attenuationDurationThreshold.lower, attenuationDurationThreshold.upper\",\n- (ATTENUATION_DURATION_THRESHOLD_MAX + \", \" + ATTENUATION_DURATION_THRESHOLD_MIN), MIN_GREATER_THAN_MAX));\n-\n- assertThat(validator.validate()).isEqualTo(expectedResult);\n- }\n-\n- private ApplicationConfigurationValidator getValidatorForAttenuationDurationThreshold(int lower, int upper)\n- throws Exception {\n- ApplicationConfiguration appConfig = ApplicationConfiguration.newBuilder()\n- .setMinRiskScore(100)\n- .setRiskScoreClasses(MINIMAL_RISK_SCORE_CLASSIFICATION)\n- .setExposureConfig(ExposureConfigurationProvider.readFile(\"configtests/exposure-config_ok.yaml\"))\n- .setAttenuationDurationThresholds(AttenuationDurationThresholds.newBuilder()\n- .setLower(lower)\n- .setUpper(upper)).build();\n- return new ApplicationConfigurationValidator(appConfig);\n- }\n-\n @Test\n void circular() {\n assertThatThrownBy(() -> {\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java\n@@ -0,0 +1,114 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n+\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.MIN_GREATER_THAN_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.GeneralValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildExpectedResult;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.OUT_OF_RANGE;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.TOO_MANY_DECIMAL_PLACES;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.protocols.internal.AttenuationDuration;\n+import app.coronawarn.server.common.protocols.internal.Thresholds;\n+import app.coronawarn.server.common.protocols.internal.Weights;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+\n+public class AttenuationDurationValidatorTest {\n+ private static final Thresholds VALID_THRESHOLDS =\n+ buildThresholds(ATTENUATION_DURATION_THRESHOLD_MIN, ATTENUATION_DURATION_THRESHOLD_MAX);\n+ private static final Weights VALID_WEIGHTS =\n+ buildWeights(ATTENUATION_DURATION_WEIGHT_MAX, ATTENUATION_DURATION_WEIGHT_MAX, ATTENUATION_DURATION_WEIGHT_MAX);\n+\n+ @ParameterizedTest\n+ @ValueSource(ints = {ATTENUATION_DURATION_THRESHOLD_MIN - 1, ATTENUATION_DURATION_THRESHOLD_MAX + 1})\n+ void failsIfAttenuationDurationThresholdOutOfBounds(int invalidThresholdValue) {\n+ AttenuationDurationValidator validator = buildValidator(\n+ buildThresholds(invalidThresholdValue, invalidThresholdValue), VALID_WEIGHTS);\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ buildError(\"attenuation-duration.thresholds.lower\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS),\n+ buildError(\"attenuation-duration.thresholds.upper\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ @Test\n+ void failsIfUpperAttenuationDurationThresholdLesserThanLower() {\n+ AttenuationDurationValidator validator = buildValidator(\n+ buildThresholds(ATTENUATION_DURATION_THRESHOLD_MAX, ATTENUATION_DURATION_THRESHOLD_MIN), VALID_WEIGHTS);\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ new GeneralValidationError(\"attenuation-duration.thresholds.lower, attenuation-duration.thresholds.upper\",\n+ (ATTENUATION_DURATION_THRESHOLD_MAX + \", \" + ATTENUATION_DURATION_THRESHOLD_MIN), MIN_GREATER_THAN_MAX));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(doubles = {ATTENUATION_DURATION_WEIGHT_MIN - .1, ATTENUATION_DURATION_WEIGHT_MAX + .1})\n+ void failsIfWeightsOutOfBounds(double invalidWeightValue) {\n+ AttenuationDurationValidator validator = buildValidator(VALID_THRESHOLDS,\n+ buildWeights(invalidWeightValue, invalidWeightValue, invalidWeightValue));\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ new WeightValidationError(\"attenuation-duration.weights.low\", invalidWeightValue, OUT_OF_RANGE),\n+ new WeightValidationError(\"attenuation-duration.weights.mid\", invalidWeightValue, OUT_OF_RANGE),\n+ new WeightValidationError(\"attenuation-duration.weights.high\", invalidWeightValue, OUT_OF_RANGE));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ @Test\n+ void failsIfWeightsHaveTooManyDecimalPlaces() {\n+ double invalidWeightValue = ATTENUATION_DURATION_WEIGHT_MAX - 0.0000001;\n+ AttenuationDurationValidator validator = buildValidator(VALID_THRESHOLDS,\n+ buildWeights(invalidWeightValue, invalidWeightValue, invalidWeightValue));\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ new WeightValidationError(\"attenuation-duration.weights.low\", invalidWeightValue, TOO_MANY_DECIMAL_PLACES),\n+ new WeightValidationError(\"attenuation-duration.weights.mid\", invalidWeightValue, TOO_MANY_DECIMAL_PLACES),\n+ new WeightValidationError(\"attenuation-duration.weights.high\", invalidWeightValue, TOO_MANY_DECIMAL_PLACES));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ private static AttenuationDurationValidator buildValidator(Thresholds thresholds, Weights weights) {\n+ return new AttenuationDurationValidator(AttenuationDuration.newBuilder()\n+ .setThresholds(thresholds)\n+ .setWeights(weights).build());\n+ }\n+\n+ private static Thresholds buildThresholds(int lower, int upper) {\n+ return Thresholds.newBuilder().setLower(lower).setUpper(upper).build();\n+ }\n+\n+ private static Weights buildWeights(double low, double mid, double high) {\n+ return Weights.newBuilder().setLow(low).setMid(mid).setHigh(high).build();\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidatorTest.java\n@@ -166,7 +166,7 @@ private static RiskScoreClass buildRiskClass(String label, int min, int max, Str\n return RiskScoreClass.newBuilder().setLabel(label).setMin(min).setMax(max).setUrl(url).build();\n }\n \n- public static ValidationResult buildExpectedResult(GeneralValidationError... errors) {\n+ public static ValidationResult buildExpectedResult(ValidationError... errors) {\n var validationResult = new ValidationResult();\n Arrays.stream(errors).forEach(validationResult::add);\n return validationResult;\ndiff --git a/services/distribution/src/test/resources/configtests/app-config_ok.yaml b/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n--- a/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n+++ b/services/distribution/src/test/resources/configtests/app-config_ok.yaml\n@@ -1,7 +1,5 @@\n min-risk-score: 100\n-attenuationDurationThresholds:\n- lower: 50\n- upper: 70\n+attenuation-duration: !include attenuation-duration.yaml\n risk-score-classes: !include risk-score-class_ok.yaml\n exposure-config: !include exposure-config_ok.yaml\n-app-version: !include app-version-config_ok.yaml\n\\ No newline at end of file\n+app-version: !include app-version-config_ok.yaml\ndiff --git a/services/distribution/src/test/resources/configtests/attenuation-duration.yaml b/services/distribution/src/test/resources/configtests/attenuation-duration.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/configtests/attenuation-duration.yaml\n@@ -0,0 +1,7 @@\n+thresholds:\n+ lower: 50\n+ upper: 70\n+weights:\n+ low: 1.0\n+ mid: 0.5\n+ high: 0.0\n", "problem_statement": "Application Configuration: Attenuation Duration\nThe RKI requested weighting parameters for the three buckets defined by the attenuation duration threshold. Add this to the attenuation duration configuration.\r\n\r\n@michael-burwig \r\n\r\n```yaml\r\nattenuation-duration:\r\n thresholds:\r\n lower: 50\r\n upper: 70\r\n weights:\r\n low: 1 # attenuation < 50 dB \r\n mid: 0.5 # attenuation >50 dB && < 70 dB \r\n high: 0 # attenuation > 70dB is ignored\r\n```\n", "hints_text": "Are the weights in the range of [0, 1]?\nIs the threshold value range still [0, 100]?\nThresholds remain unchanged.\r\nFor weight, lets go with 0...1 for now. There will be another RKI call in the afternoon which might change that though.", "created_at": "2020-06-03T09:23:16Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 436, "instance_id": "corona-warn-app__cwa-server-436", "issue_numbers": ["140"], "base_commit": "ebb112166c8b6bf21ba18232db773be9a03b93e8", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/DiagnosisKeysStructureProvider.java\n@@ -27,6 +27,8 @@\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDateTime;\n+import java.time.temporal.ChronoUnit;\n import java.util.Collection;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n@@ -65,7 +67,7 @@ public class DiagnosisKeysStructureProvider {\n public Directory getDiagnosisKeys() {\n logger.debug(\"Querying diagnosis keys from the database...\");\n Collection diagnosisKeys = diagnosisKeyService.getDiagnosisKeys();\n- diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys);\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.now().truncatedTo(ChronoUnit.HOURS));\n return new DiagnosisKeysDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DemoDiagnosisKeyBundler.java\n@@ -24,15 +24,13 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import java.time.LocalDateTime;\n import java.util.Collection;\n-import java.util.List;\n import org.springframework.context.annotation.Profile;\n import org.springframework.stereotype.Component;\n \n /**\n- * An instance of this class contains a collection of {@link DiagnosisKey DiagnosisKeys}, that will be distributed\n- * in the same hour they have been submitted.\n+ * An instance of this class contains a collection of {@link DiagnosisKey DiagnosisKeys}, that will be distributed in\n+ * the same hour they have been submitted.\n */\n @Profile(\"demo\")\n @Component\n@@ -44,20 +42,11 @@ public DemoDiagnosisKeyBundler(DistributionServiceConfig distributionServiceConf\n \n /**\n * Initializes the internal {@code distributableDiagnosisKeys} map, grouping the diagnosis keys by the submission\n- * timestamp, thus ignoring the expiry policy.\n+ * timestamp, thus ignoring the expiry and shifting policies.\n */\n @Override\n protected void createDiagnosisKeyDistributionMap(Collection diagnosisKeys) {\n this.distributableDiagnosisKeys.clear();\n this.distributableDiagnosisKeys.putAll(diagnosisKeys.stream().collect(groupingBy(this::getSubmissionDateTime)));\n }\n-\n- /**\n- * Returns all diagnosis keys that should be distributed in a specific hour, without respecting the shifting and\n- * expiry policies.\n- */\n- @Override\n- public List getDiagnosisKeysDistributableAt(LocalDateTime hour) {\n- return this.getDiagnosisKeysForHour(hour);\n- }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n@@ -20,18 +20,20 @@\n \n package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n \n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.ONE_HOUR_INTERVAL_SECONDS;\n import static java.time.ZoneOffset.UTC;\n import static java.util.Collections.emptyList;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDate;\n import java.time.LocalDateTime;\n import java.util.Collection;\n import java.util.HashMap;\n import java.util.List;\n import java.util.Map;\n import java.util.Optional;\n+import java.util.Set;\n+import java.util.concurrent.TimeUnit;\n import java.util.stream.Collectors;\n \n /**\n@@ -39,9 +41,23 @@\n */\n public abstract class DiagnosisKeyBundler {\n \n+ /**\n+ * The submission timestamp is counted in 1 hour intervals since epoch.\n+ */\n+ public static final long ONE_HOUR_INTERVAL_SECONDS = TimeUnit.HOURS.toSeconds(1);\n+\n+ /**\n+ * The rolling start interval number is counted in 10 minute intervals since epoch.\n+ */\n+ public static final long TEN_MINUTES_INTERVAL_SECONDS = TimeUnit.MINUTES.toSeconds(10);\n+\n protected final int minNumberOfKeysPerBundle;\n protected final long expiryPolicyMinutes;\n \n+ // The hour at which the distribution runs. This field is needed to prevent the run from distributing any keys that\n+ // have already been submitted but may only be distributed in the future (e.g. because they are not expired yet).\n+ protected LocalDateTime distributionTime;\n+\n // A map containing diagnosis keys, grouped by the LocalDateTime on which they may be distributed\n protected final Map> distributableDiagnosisKeys = new HashMap<>();\n \n@@ -51,11 +67,22 @@ public DiagnosisKeyBundler(DistributionServiceConfig distributionServiceConfig)\n }\n \n /**\n- * Sets the {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler} and calls {@link\n- * DiagnosisKeyBundler#createDiagnosisKeyDistributionMap}.\n+ * Creates a {@link LocalDateTime} based on the specified epoch timestamp.\n+ */\n+ public static LocalDateTime getLocalDateTimeFromHoursSinceEpoch(long timestamp) {\n+ return LocalDateTime.ofEpochSecond(TimeUnit.HOURS.toSeconds(timestamp), 0, UTC);\n+ }\n+\n+ /**\n+ * Sets the {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler} and the time at which the\n+ * distribution runs and calls {@link DiagnosisKeyBundler#createDiagnosisKeyDistributionMap}.\n+ *\n+ * @param diagnosisKeys The {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler}.\n+ * @param distributionTime The {@link LocalDateTime} at which the distribution runs.\n */\n- public void setDiagnosisKeys(Collection diagnosisKeys) {\n- createDiagnosisKeyDistributionMap(diagnosisKeys);\n+ public void setDiagnosisKeys(Collection diagnosisKeys, LocalDateTime distributionTime) {\n+ this.distributionTime = distributionTime;\n+ this.createDiagnosisKeyDistributionMap(diagnosisKeys);\n }\n \n /**\n@@ -74,9 +101,23 @@ public List getAllDiagnosisKeys() {\n protected abstract void createDiagnosisKeyDistributionMap(Collection diagnosisKeys);\n \n /**\n- * Returns all diagnosis keys that should be distributed in a specific hour.\n+ * Returns a set of all {@link LocalDate dates} on which {@link DiagnosisKey diagnosis keys} shall be distributed.\n */\n- public abstract List getDiagnosisKeysDistributableAt(LocalDateTime hour);\n+ public Set getDatesWithDistributableDiagnosisKeys() {\n+ return this.distributableDiagnosisKeys.keySet().stream()\n+ .map(LocalDateTime::toLocalDate)\n+ .collect(Collectors.toSet());\n+ }\n+\n+ /**\n+ * Returns a set of all {@link LocalDateTime hours} of a specified {@link LocalDate date} during which {@link\n+ * DiagnosisKey diagnosis keys} shall be distributed.\n+ */\n+ public Set getHoursWithDistributableDiagnosisKeys(LocalDate currentDate) {\n+ return this.distributableDiagnosisKeys.keySet().stream()\n+ .filter(dateTime -> dateTime.toLocalDate().equals(currentDate))\n+ .collect(Collectors.toSet());\n+ }\n \n /**\n * Returns the submission timestamp of a {@link DiagnosisKey} as a {@link LocalDateTime}.\n@@ -85,10 +126,21 @@ protected LocalDateTime getSubmissionDateTime(DiagnosisKey diagnosisKey) {\n return LocalDateTime.ofEpochSecond(diagnosisKey.getSubmissionTimestamp() * ONE_HOUR_INTERVAL_SECONDS, 0, UTC);\n }\n \n+ /**\n+ * Returns all diagnosis keys that should be distributed on a specific date.\n+ */\n+ public List getDiagnosisKeysForDate(LocalDate date) {\n+ return this.distributableDiagnosisKeys.keySet().stream()\n+ .filter(dateTime -> dateTime.toLocalDate().equals(date))\n+ .map(this::getDiagnosisKeysForHour)\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ }\n+\n /**\n * Returns all diagnosis keys that should be distributed in a specific hour.\n */\n- protected List getDiagnosisKeysForHour(LocalDateTime hour) {\n+ public List getDiagnosisKeysForHour(LocalDateTime hour) {\n return Optional\n .ofNullable(this.distributableDiagnosisKeys.get(hour))\n .orElse(emptyList());\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundler.java\n@@ -20,7 +20,6 @@\n \n package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n \n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.TEN_MINUTES_INTERVAL_SECONDS;\n import static java.time.ZoneOffset.UTC;\n import static java.util.Collections.emptyList;\n import static java.util.stream.Collectors.groupingBy;\n@@ -30,11 +29,13 @@\n import java.time.Duration;\n import java.time.LocalDateTime;\n import java.time.temporal.ChronoUnit;\n+import java.util.ArrayList;\n import java.util.Collection;\n+import java.util.HashMap;\n import java.util.List;\n+import java.util.Map;\n import java.util.Optional;\n-import java.util.stream.Collectors;\n-import java.util.stream.Stream;\n+import java.util.stream.LongStream;\n import org.springframework.context.annotation.Profile;\n import org.springframework.stereotype.Component;\n \n@@ -57,55 +58,38 @@ public ProdDiagnosisKeyBundler(DistributionServiceConfig distributionServiceConf\n \n /**\n * Initializes the internal {@code distributableDiagnosisKeys} map, grouping the diagnosis keys by the date on which\n- * they may be distributed, while respecting the expiry policy.\n+ * they may be distributed, while respecting the expiry and shifting policies.\n */\n @Override\n protected void createDiagnosisKeyDistributionMap(Collection diagnosisKeys) {\n this.distributableDiagnosisKeys.clear();\n- this.distributableDiagnosisKeys.putAll(diagnosisKeys.stream().collect(groupingBy(this::getDistributionDateTime)));\n- }\n-\n- /**\n- * Returns all diagnosis keys that should be distributed in a specific hour, while respecting the shifting and expiry\n- * policies.\n- */\n- @Override\n- public List getDiagnosisKeysDistributableAt(LocalDateTime hour) {\n- List keysSinceLastDistribution = getKeysSinceLastDistribution(hour);\n- if (keysSinceLastDistribution.size() >= minNumberOfKeysPerBundle) {\n- return keysSinceLastDistribution;\n- } else {\n- return emptyList();\n+ if (diagnosisKeys.isEmpty()) {\n+ return;\n }\n- }\n+ Map> distributableDiagnosisKeysGroupedByExpiryPolicy = new HashMap<>(\n+ diagnosisKeys.stream().collect(groupingBy(this::getDistributionDateTimeByExpiryPolicy)));\n+ LocalDateTime earliestDistributableTimestamp =\n+ getEarliestDistributableTimestamp(distributableDiagnosisKeysGroupedByExpiryPolicy).orElseThrow();\n+ LocalDateTime latestDistributableTimestamp = this.distributionTime;\n \n- /**\n- * Returns a all distributable keys between a specific hour and the last distribution (bundle that was above the\n- * shifting threshold) or the earliest distributable key.\n- */\n- private List getKeysSinceLastDistribution(LocalDateTime hour) {\n- Optional earliestDistributableTimestamp = getEarliestDistributableTimestamp();\n- if (earliestDistributableTimestamp.isEmpty() || hour.isBefore(earliestDistributableTimestamp.get())) {\n- return emptyList();\n- }\n- List distributableInCurrentHour = getDiagnosisKeysForHour(hour);\n- if (distributableInCurrentHour.size() >= minNumberOfKeysPerBundle) {\n- return distributableInCurrentHour;\n- }\n- LocalDateTime previousHour = hour.minusHours(1);\n- Collection distributableInPreviousHour = getDiagnosisKeysDistributableAt(previousHour);\n- if (distributableInPreviousHour.size() >= minNumberOfKeysPerBundle) {\n- // Last hour was distributed, so we can not combine the current hour with the last hour\n- return distributableInCurrentHour;\n- } else {\n- // Last hour was not distributed, so we can combine the current hour with the last hour\n- return Stream.concat(distributableInCurrentHour.stream(), getKeysSinceLastDistribution(previousHour).stream())\n- .collect(Collectors.toList());\n- }\n+ List diagnosisKeyAccumulator = new ArrayList<>();\n+ LongStream.range(0, earliestDistributableTimestamp.until(latestDistributableTimestamp, ChronoUnit.HOURS))\n+ .forEach(hourCounter -> {\n+ LocalDateTime currentHour = earliestDistributableTimestamp.plusHours(hourCounter);\n+ Collection currentHourDiagnosisKeys = Optional\n+ .ofNullable(distributableDiagnosisKeysGroupedByExpiryPolicy.get(currentHour))\n+ .orElse(emptyList());\n+ diagnosisKeyAccumulator.addAll(currentHourDiagnosisKeys);\n+ if (diagnosisKeyAccumulator.size() >= minNumberOfKeysPerBundle) {\n+ this.distributableDiagnosisKeys.put(currentHour, new ArrayList<>(diagnosisKeyAccumulator));\n+ diagnosisKeyAccumulator.clear();\n+ }\n+ });\n }\n \n- private Optional getEarliestDistributableTimestamp() {\n- return this.distributableDiagnosisKeys.keySet().stream().min(LocalDateTime::compareTo);\n+ private static Optional getEarliestDistributableTimestamp(\n+ Map> distributableDiagnosisKeys) {\n+ return distributableDiagnosisKeys.keySet().stream().min(LocalDateTime::compareTo);\n }\n \n /**\n@@ -118,12 +102,13 @@ private LocalDateTime getExpiryDateTime(DiagnosisKey diagnosisKey) {\n }\n \n /**\n- * Calculates the earliest point in time at which the specified {@link DiagnosisKey} can be distributed. Before keys\n- * are allowed to be distributed, they must be expired for a configured amount of time.\n+ * Calculates the earliest point in time at which the specified {@link DiagnosisKey} can be distributed, while\n+ * respecting the expiry policy and the submission timestamp. Before keys are allowed to be distributed, they must be\n+ * expired for a configured amount of time.\n *\n * @return {@link LocalDateTime} at which the specified {@link DiagnosisKey} can be distributed.\n */\n- private LocalDateTime getDistributionDateTime(DiagnosisKey diagnosisKey) {\n+ private LocalDateTime getDistributionDateTimeByExpiryPolicy(DiagnosisKey diagnosisKey) {\n LocalDateTime submissionDateTime = getSubmissionDateTime(diagnosisKey);\n LocalDateTime expiryDateTime = getExpiryDateTime(diagnosisKey);\n long minutesBetweenExpiryAndSubmission = Duration.between(expiryDateTime, submissionDateTime).toMinutes();\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n@@ -24,7 +24,6 @@\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.HourIndexingDecorator;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryOnDisk;\n@@ -46,12 +45,12 @@ public class DiagnosisKeysDateDirectory extends IndexDirectoryOnDisk\n * collection. Payload signing is be performed according to the specified {@link CryptoProvider}.\n *\n * @param diagnosisKeyBundler A {@link DiagnosisKeyBundler} containing the {@link DiagnosisKey DiagnosisKeys}.\n- * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n+ * @param cryptoProvider The {@link CryptoProvider} used for payload signing.\n */\n public DiagnosisKeysDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig) {\n super(distributionServiceConfig.getApi().getDatePath(),\n- __ -> DateTime.getDates(diagnosisKeyBundler.getAllDiagnosisKeys()), ISO8601::format);\n+ __ -> diagnosisKeyBundler.getDatesWithDistributableDiagnosisKeys(), ISO8601::format);\n this.cryptoProvider = cryptoProvider;\n this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.distributionServiceConfig = distributionServiceConfig;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectory.java\n@@ -23,7 +23,6 @@\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.CountryIndexingDecorator;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n@@ -70,8 +69,6 @@ public void prepare(ImmutableStack indices) {\n \n private IndexDirectory decorateCountryDirectory(\n IndexDirectoryOnDisk countryDirectory) {\n- return new CountryIndexingDecorator<>(\n- new IndexingDecoratorOnDisk<>(countryDirectory, distributionServiceConfig.getOutputFileName()),\n- distributionServiceConfig);\n+ return new IndexingDecoratorOnDisk<>(countryDirectory, distributionServiceConfig.getOutputFileName());\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n@@ -25,7 +25,6 @@\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.singing.DiagnosisKeySigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n import app.coronawarn.server.services.distribution.assembly.structure.archive.ArchiveOnDisk;\n@@ -53,8 +52,9 @@ public class DiagnosisKeysHourDirectory extends IndexDirectoryOnDisk DateTime.getHours(((LocalDate) indices.peek()),\n- diagnosisKeyBundler.getAllDiagnosisKeys()), LocalDateTime::getHour);\n+ super(distributionServiceConfig.getApi().getHourPath(),\n+ indices -> diagnosisKeyBundler.getHoursWithDistributableDiagnosisKeys(((LocalDate) indices.peek())),\n+ LocalDateTime::getHour);\n this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n@@ -70,7 +70,7 @@ public void prepare(ImmutableStack indices) {\n String region = (String) currentIndices.pop().pop().peek();\n \n List diagnosisKeysForCurrentHour =\n- this.diagnosisKeyBundler.getDiagnosisKeysDistributableAt(currentHour);\n+ this.diagnosisKeyBundler.getDiagnosisKeysForHour(currentHour);\n \n long startTimestamp = currentHour.toEpochSecond(ZoneOffset.UTC);\n long endTimestamp = currentHour.plusHours(1).toEpochSecond(ZoneOffset.UTC);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/CountryIndexingDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/CountryIndexingDecorator.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/CountryIndexingDecorator.java\n+++ /dev/null\n@@ -1,110 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator;\n-\n-import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n-import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexDirectoryDecorator;\n-import app.coronawarn.server.services.distribution.assembly.structure.file.FileOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n-import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import java.nio.charset.StandardCharsets;\n-import java.util.Collection;\n-import java.util.Set;\n-import java.util.stream.Collectors;\n-\n-/**\n- * This decorator creates the central index file for a country, e.g. DE.\n- */\n-public class CountryIndexingDecorator extends IndexDirectoryDecorator {\n-\n- /**\n- * Separate each entry in the index file with new line.\n- */\n- private static final String NEW_LINE_SEPARATOR = \"\\r\\n\";\n-\n- /**\n- * the name of this index file.\n- */\n- private final String fileName;\n-\n- /**\n- * Creates a new decorator instance for the given directory.\n- *\n- * @param directory The target country directory.\n- * @param distributionServiceConfig The config.\n- */\n- public CountryIndexingDecorator(IndexDirectory directory,\n- DistributionServiceConfig distributionServiceConfig) {\n- super(directory);\n- this.fileName = distributionServiceConfig.getOutputFileName();\n- }\n-\n- @Override\n- public void prepare(ImmutableStack indices) {\n- super.prepare(indices);\n-\n- Collection countryDirectories = this.getWritables().stream()\n- .filter(Writable::isDirectory)\n- .map(directory -> (DirectoryOnDisk) directory)\n- .collect(Collectors.toSet());\n-\n- countryDirectories.forEach(this::writeIndexFileForCountry);\n- }\n-\n- private void writeIndexFileForCountry(Directory directory) {\n- var dateDirectory = (Directory) directory.getWritables()\n- .stream()\n- .filter(Writable::isDirectory)\n- .findFirst()\n- .orElseThrow();\n-\n- String resourcePaths = CountryIndexingDecorator.getExposureKeyExportPaths(dateDirectory)\n- .stream()\n- .sorted()\n- .collect(Collectors.joining(NEW_LINE_SEPARATOR));\n-\n- directory.addWritable(new FileOnDisk(fileName, resourcePaths.getBytes(StandardCharsets.UTF_8)));\n- }\n-\n- private static Set getExposureKeyExportPaths(Directory rootDirectory) {\n- Collection> directories = rootDirectory.getWritables()\n- .stream()\n- .filter(Writable::isDirectory)\n- .filter(directory -> !(directory instanceof Archive))\n- .map(directory -> (Directory) directory)\n- .collect(Collectors.toSet());\n-\n- if (directories.isEmpty()) {\n- return Set.of(rootDirectory.getName());\n- } else {\n- return directories.stream()\n- .map(CountryIndexingDecorator::getExposureKeyExportPaths)\n- .flatMap(Set::stream)\n- .map(childName -> rootDirectory.getName() + \"/\" + childName)\n- .collect(Collectors.toSet());\n- }\n- }\n-}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTime.java\n+++ /dev/null\n@@ -1,79 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util;\n-\n-import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import java.time.LocalDate;\n-import java.time.LocalDateTime;\n-import java.time.ZoneOffset;\n-import java.util.Collection;\n-import java.util.Set;\n-import java.util.concurrent.TimeUnit;\n-import java.util.stream.Collectors;\n-\n-/**\n- * Methods for conversions of time/date data.\n- */\n-public class DateTime {\n-\n- /**\n- * The submission timestamp is counted in 1 hour intervals since epoch.\n- */\n- public static final long ONE_HOUR_INTERVAL_SECONDS = TimeUnit.HOURS.toSeconds(1);\n-\n- /**\n- * The rolling start interval number is counted in 10 minute intervals since epoch.\n- */\n- public static final long TEN_MINUTES_INTERVAL_SECONDS = TimeUnit.MINUTES.toSeconds(10);\n-\n- private DateTime() {\n- }\n-\n- /**\n- * Returns a set of all {@link LocalDate dates} that are associated with the submission timestamps of the specified\n- * {@link DiagnosisKey diagnosis keys}.\n- */\n- public static Set getDates(Collection diagnosisKeys) {\n- return diagnosisKeys.stream()\n- .map(DiagnosisKey::getSubmissionTimestamp)\n- .map(timestamp -> LocalDate.ofEpochDay(timestamp / 24))\n- .collect(Collectors.toSet());\n- }\n-\n- /**\n- * Returns a set of all {@link LocalDateTime hours} that are associated with the submission timestamps of the\n- * specified {@link DiagnosisKey diagnosis keys} and the specified {@link LocalDate date}.\n- */\n- public static Set getHours(LocalDate currentDate, Collection diagnosisKeys) {\n- return diagnosisKeys.stream()\n- .map(DiagnosisKey::getSubmissionTimestamp)\n- .map(DateTime::getLocalDateTimeFromHoursSinceEpoch)\n- .filter(currentDateTime -> currentDateTime.toLocalDate().equals(currentDate))\n- .collect(Collectors.toSet());\n- }\n-\n- /**\n- * Creates a {@link LocalDateTime} based on the specified epoch timestamp.\n- */\n- public static LocalDateTime getLocalDateTimeFromHoursSinceEpoch(long timestamp) {\n- return LocalDateTime.ofEpochSecond(TimeUnit.HOURS.toSeconds(timestamp), 0, ZoneOffset.UTC);\n- }\n-}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n@@ -20,8 +20,8 @@\n \n package app.coronawarn.server.services.distribution.runner;\n \n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.ONE_HOUR_INTERVAL_SECONDS;\n-import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util.DateTime.TEN_MINUTES_INTERVAL_SECONDS;\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler.ONE_HOUR_INTERVAL_SECONDS;\n+import static app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler.TEN_MINUTES_INTERVAL_SECONDS;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerExpiryPolicyTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerExpiryPolicyTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerExpiryPolicyTest.java\n@@ -0,0 +1,88 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.common.Helpers;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDateTime;\n+import java.util.List;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {DistributionServiceConfig.class, ProdDiagnosisKeyBundler.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class ProdDiagnosisKeyBundlerExpiryPolicyTest {\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ DiagnosisKeyBundler bundler;\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {0L, 24L, 24L + 2L})\n+ void testLastPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n+ List diagnosisKeys = Helpers.buildDiagnosisKeys(5, submissionTimestamp, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 3, 0, 0))).hasSize(10);\n+ }\n+\n+ @Test\n+ void testLastPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n+ List diagnosisKeys = Helpers.buildDiagnosisKeys(5, 24L + 3L, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 3, 0, 0))).hasSize(10);\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {0L, 24L, 24L + 2L, 24L + 3L})\n+ void testFirstPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n+ List diagnosisKeys = Helpers.buildDiagnosisKeys(6, submissionTimestamp, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n+ }\n+\n+ @Test\n+ void testFirstPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n+ List diagnosisKeys = Helpers.buildDiagnosisKeys(6, 24L + 4L, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n+ }\n+\n+ @Test\n+ void testLastPeriodOfHourAndSubmissionGreaterDistributionDateTime() {\n+ List diagnosisKeys = Helpers.buildDiagnosisKeys(5, 24L + 4L, 10);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n@@ -0,0 +1,185 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static java.util.Collections.emptySet;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDate;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.Stream;\n+import org.junit.jupiter.api.DisplayName;\n+import org.junit.jupiter.api.Nested;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.Arguments;\n+import org.junit.jupiter.params.provider.MethodSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {DistributionServiceConfig.class, ProdDiagnosisKeyBundler.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class ProdDiagnosisKeyBundlerKeyRetrievalTest {\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ DiagnosisKeyBundler bundler;\n+\n+ @Test\n+ void testGetsAllDiagnosisKeys() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, 50L, 5), buildDiagnosisKeys(6, 51L, 5), buildDiagnosisKeys(6, 52L, 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getAllDiagnosisKeys()).hasSize(15);\n+ }\n+\n+ @Test\n+ void testGetDatesForEmptyList() {\n+ bundler.setDiagnosisKeys(emptySet(), LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDatesWithDistributableDiagnosisKeys()).isEmpty();\n+ }\n+\n+ @Test\n+ void testGetsDatesWithDistributableDiagnosisKeys() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, 26L, 5), buildDiagnosisKeys(6, 50L, 1), buildDiagnosisKeys(6, 74L, 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDatesWithDistributableDiagnosisKeys()).containsAll(List.of(\n+ LocalDate.of(1970, 1, 2),\n+ LocalDate.of(1970, 1, 4)\n+ ));\n+ }\n+\n+ @ParameterizedTest\n+ @MethodSource(\"createDiagnosisKeysForEpochDay0\")\n+ void testGetDatesForEpochDay0(Collection diagnosisKeys) {\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ var expDates = Set.of(LocalDate.ofEpochDay(2L));\n+ var actDates = bundler.getDatesWithDistributableDiagnosisKeys();\n+ assertThat(actDates).isEqualTo(expDates);\n+ }\n+\n+ private static Stream createDiagnosisKeysForEpochDay0() {\n+ return Stream.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 23, 59, 59), 5)\n+ ).map(Arguments::of);\n+ }\n+\n+ @Test\n+ void testGetDatesFor2Days() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 1, 0), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ var expDates = Set.of(LocalDate.ofEpochDay(2L), LocalDate.ofEpochDay(3L));\n+ assertThat(bundler.getDatesWithDistributableDiagnosisKeys()).isEqualTo(expDates);\n+ }\n+\n+ @Test\n+ void testGetHoursForEmptyList() {\n+ bundler.setDiagnosisKeys(emptySet(), LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getHoursWithDistributableDiagnosisKeys(LocalDate.of(1970, 1, 3))).isEmpty();\n+ }\n+\n+ @Test\n+ void testGetsHoursWithDistributableDiagnosisKeys() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 5, 0), 1),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 6, 0), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getHoursWithDistributableDiagnosisKeys(LocalDate.of(1970, 1, 2))).containsAll(List.of(\n+ LocalDateTime.of(1970, 1, 2, 4, 0, 0),\n+ LocalDateTime.of(1970, 1, 2, 6, 0, 0)\n+ ));\n+ }\n+\n+ @Test\n+ void testGetsDiagnosisKeysForDate() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 2, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 2, 0), 1),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 2, 0), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 20, 0));\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 1))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 2))).hasSize(5);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 3))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 4))).hasSize(6);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 5))).hasSize(0);\n+ }\n+\n+ @Test\n+ void testEmptyListWhenGettingDiagnosisKeysForDateBeforeEarliestDiagnosisKey() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 1))).hasSize(0);\n+ }\n+\n+ @Test\n+ void testGetsDiagnosisKeysForHour() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 5, 0), 1),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 6, 0), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 3, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 4, 0))).hasSize(5);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 5, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 6, 0))).hasSize(6);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 7, 0))).hasSize(0);\n+ }\n+\n+ @Test\n+ void testEmptyListWhenGettingDiagnosisKeysForHourBeforeEarliestDiagnosisKey() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).hasSize(0);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java\n@@ -0,0 +1,121 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDateTime;\n+import java.util.List;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n+import java.util.stream.Stream;\n+import org.junit.jupiter.api.DisplayName;\n+import org.junit.jupiter.api.Nested;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {DistributionServiceConfig.class, ProdDiagnosisKeyBundler.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class ProdDiagnosisKeyBundlerShiftingPolicyTest {\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ DiagnosisKeyBundler bundler;\n+\n+ @Test\n+ void testDoesNotShiftIfPackageSizeGreaterThanThreshold() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, 50L, 6);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(6);\n+ }\n+\n+ @Test\n+ void testDoesNotShiftIfPackageSizeEqualsThreshold() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, 50L, 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n+ }\n+\n+ @Test\n+ void testShiftsIfPackageSizeLessThanThreshold() {\n+ List diagnosisKeys = Stream\n+ .concat(buildDiagnosisKeys(6, 50L, 4).stream(), buildDiagnosisKeys(6, 51L, 1).stream())\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(5);\n+ }\n+\n+ @Test\n+ void testShiftsSinceLastDistribution() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, 50L, 5), buildDiagnosisKeys(6, 51L, 2), buildDiagnosisKeys(6, 52L, 4))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(6);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n+ }\n+\n+ @Test\n+ void testShiftIncludesPreviouslyUndistributedKeys() {\n+ List diagnosisKeys = Stream\n+ .concat(buildDiagnosisKeys(6, 50L, 1).stream(), buildDiagnosisKeys(6, 51L, 5).stream())\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(6);\n+ }\n+\n+ @Test\n+ void testShiftsSparseDistributions() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, 50L, 1), buildDiagnosisKeys(6, 51L, 1), buildDiagnosisKeys(6, 52L, 1),\n+ buildDiagnosisKeys(6, 53L, 0), buildDiagnosisKeys(6, 54L, 0), buildDiagnosisKeys(6, 55L, 1),\n+ buildDiagnosisKeys(6, 56L, 1))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 6, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 7, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 8, 0, 0))).hasSize(5);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerTest.java\ndeleted file mode 100644\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerTest.java\n+++ /dev/null\n@@ -1,190 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys;\n-\n-import static org.assertj.core.api.Assertions.assertThat;\n-\n-import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import java.time.LocalDateTime;\n-import java.util.List;\n-import java.util.stream.Collectors;\n-import java.util.stream.IntStream;\n-import java.util.stream.Stream;\n-import org.junit.jupiter.api.DisplayName;\n-import org.junit.jupiter.api.Nested;\n-import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.api.extension.ExtendWith;\n-import org.junit.jupiter.params.ParameterizedTest;\n-import org.junit.jupiter.params.provider.ValueSource;\n-import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.context.properties.EnableConfigurationProperties;\n-import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n-import org.springframework.test.context.ContextConfiguration;\n-import org.springframework.test.context.junit.jupiter.SpringExtension;\n-\n-@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n-@ExtendWith(SpringExtension.class)\n-@ContextConfiguration(classes = {DistributionServiceConfig.class, ProdDiagnosisKeyBundler.class},\n- initializers = ConfigFileApplicationContextInitializer.class)\n-class ProdDiagnosisKeyBundlerTest {\n-\n- @Autowired\n- DistributionServiceConfig distributionServiceConfig;\n-\n- @Autowired\n- DiagnosisKeyBundler bundler;\n-\n- @Test\n- void testEmptyListWhenNoDiagnosisKeys() {\n- bundler.setDiagnosisKeys(List.of());\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).hasSize(0);\n- }\n-\n- @Test\n- void testEmptyListWhenGettingDistributableKeysBeforeEarliestDiagnosisKey() {\n- List diagnosisKeys = buildDiagnosisKeys(6, 50L, 5);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).hasSize(0);\n- }\n-\n- @Nested\n- @DisplayName(\"Expiry policy\")\n- class ProdDiagnosisKeyBundlerExpiryPolicyTest {\n-\n- @ParameterizedTest\n- @ValueSource(longs = {0L, 24L, 24L + 2L})\n- void testLastPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n- List diagnosisKeys = buildDiagnosisKeys(5, submissionTimestamp, 10);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 3, 0, 0))).hasSize(10);\n- }\n-\n- @Test\n- void testLastPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n- List diagnosisKeys = buildDiagnosisKeys(5, 24L + 3L, 10);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 3, 0, 0))).hasSize(10);\n- }\n-\n- @ParameterizedTest\n- @ValueSource(longs = {0L, 24L, 24L + 2L, 24L + 3L})\n- void testFirstPeriodOfHourAndSubmissionLessThanDistributionDateTime(long submissionTimestamp) {\n- List diagnosisKeys = buildDiagnosisKeys(6, submissionTimestamp, 10);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n- }\n-\n- @Test\n- void testFirstPeriodOfHourAndSubmissionEqualsDistributionDateTime() {\n- List diagnosisKeys = buildDiagnosisKeys(6, 24L + 4L, 10);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n- }\n-\n- @Test\n- void testLastPeriodOfHourAndSubmissionGreaterDistributionDateTime() {\n- List diagnosisKeys = buildDiagnosisKeys(5, 24L + 4L, 10);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 2, 4, 0, 0))).hasSize(10);\n- }\n- }\n-\n- @Nested\n- @DisplayName(\"Shifting policy\")\n- class ProdDiagnosisKeyBundlerShiftingPolicyTest {\n-\n- @Test\n- void testDoesNotShiftIfPackageSizeGreaterThanThreshold() {\n- List diagnosisKeys = buildDiagnosisKeys(6, 50L, 6);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(6);\n- }\n-\n- @Test\n- void testDoesNotShiftIfPackageSizeEqualsThreshold() {\n- List diagnosisKeys = buildDiagnosisKeys(6, 50L, 5);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n- }\n-\n- @Test\n- void testShiftsIfPackageSizeLessThanThreshold() {\n- List diagnosisKeys = Stream\n- .concat(buildDiagnosisKeys(6, 50L, 4).stream(), buildDiagnosisKeys(6, 51L, 1).stream())\n- .collect(Collectors.toList());\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(5);\n- }\n-\n- @Test\n- void testShiftsSinceLastDistribution() {\n- List diagnosisKeys = Stream\n- .of(buildDiagnosisKeys(6, 50L, 5), buildDiagnosisKeys(6, 51L, 2), buildDiagnosisKeys(6, 52L, 4))\n- .flatMap(List::stream)\n- .collect(Collectors.toList());\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(6);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n- }\n-\n- @Test\n- void testShiftIncludesPreviouslyUndistributedKeys() {\n- List diagnosisKeys = Stream\n- .concat(buildDiagnosisKeys(6, 50L, 1).stream(), buildDiagnosisKeys(6, 51L, 5).stream())\n- .collect(Collectors.toList());\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(5);\n- }\n-\n- @Test\n- void testShiftsSparseDistributions() {\n- List diagnosisKeys = Stream\n- .of(buildDiagnosisKeys(6, 50L, 1), buildDiagnosisKeys(6, 51L, 1), buildDiagnosisKeys(6, 52L, 1),\n- buildDiagnosisKeys(6, 53L, 0), buildDiagnosisKeys(6, 54L, 0), buildDiagnosisKeys(6, 55L, 1),\n- buildDiagnosisKeys(6, 56L, 1))\n- .flatMap(List::stream)\n- .collect(Collectors.toList());\n- bundler.setDiagnosisKeys(diagnosisKeys);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 6, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 7, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysDistributableAt(LocalDateTime.of(1970, 1, 3, 8, 0, 0))).hasSize(5);\n- }\n- }\n-\n- public static List buildDiagnosisKeys(int startIntervalNumber, long submissionTimestamp, int number) {\n- return IntStream.range(0, number)\n- .mapToObj(__ -> DiagnosisKey.builder()\n- .withKeyData(new byte[16])\n- .withRollingStartIntervalNumber(startIntervalNumber)\n- .withTransmissionRiskLevel(2)\n- .withSubmissionTimestamp(submissionTimestamp).build())\n- .collect(Collectors.toList());\n- }\n-}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n@@ -21,6 +21,7 @@\n package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeyForSubmissionTimestamp;\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n import static java.lang.String.join;\n import static org.assertj.core.api.Assertions.assertThat;\n \n@@ -28,6 +29,7 @@\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DemoDiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n@@ -35,6 +37,7 @@\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.io.File;\n import java.io.IOException;\n+import java.time.LocalDateTime;\n import java.util.Arrays;\n import java.util.List;\n import java.util.Objects;\n@@ -81,17 +84,18 @@ void setupAll() throws IOException {\n // 01.01.1970 - 00:00 UTC\n long startTimestamp = 0;\n \n- // Generate diagnosis keys covering 30 hours of submission timestamps\n- // Until 02.01.1970 - 06:00 UTC -> 1 full day + 6 hours\n+ // Generate diagnosis keys covering 29 hours of submission timestamps (one gap)\n+ // Until 04.01.1970 - 06:00 UTC -> 1 full day + 5 hours\n diagnosisKeys = IntStream.range(0, 30)\n- .mapToObj(\n- currentHour -> buildDiagnosisKeyForSubmissionTimestamp(startTimestamp + currentHour))\n+ .filter(currentHour -> currentHour != 20)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n .collect(Collectors.toList());\n }\n \n @Test\n void checkBuildsTheCorrectDirectoryStructureWhenNoKeys() {\n- DiagnosisKeyBundler bundler = new DemoDiagnosisKeyBundler(distributionServiceConfig);\n+ DiagnosisKeyBundler bundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n Directory directory = new DiagnosisKeysDirectory(bundler, cryptoProvider,\n distributionServiceConfig);\n parentDirectory.addWritable(directory);\n@@ -101,7 +105,6 @@ void checkBuildsTheCorrectDirectoryStructureWhenNoKeys() {\n String s = File.separator;\n Set expectedFiles = Set.of(\n join(s, \"diagnosis-keys\", \"country\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"index\"),\n join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"index\")\n );\n \n@@ -112,8 +115,8 @@ void checkBuildsTheCorrectDirectoryStructureWhenNoKeys() {\n \n @Test\n void checkBuildsTheCorrectDirectoryStructure() {\n- DiagnosisKeyBundler bundler = new DemoDiagnosisKeyBundler(distributionServiceConfig);\n- bundler.setDiagnosisKeys(diagnosisKeys);\n+ DiagnosisKeyBundler bundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n Directory directory = new DiagnosisKeysDirectory(bundler, cryptoProvider,\n distributionServiceConfig);\n parentDirectory.addWritable(directory);\n@@ -123,42 +126,41 @@ void checkBuildsTheCorrectDirectoryStructure() {\n String s = File.separator;\n Set expectedFiles = Set.of(\n join(s, \"diagnosis-keys\", \"country\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"index\"),\n join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"0\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"1\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"2\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"3\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"4\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"5\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"6\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"7\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"8\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"9\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"10\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"11\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"12\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"13\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"14\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"15\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"16\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"17\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"18\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"19\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"20\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"21\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"22\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-01\", \"hour\", \"23\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"0\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"1\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"2\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"3\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"4\", \"index\"),\n- join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-02\", \"hour\", \"5\", \"index\")\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"0\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"1\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"2\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"3\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"4\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"5\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"6\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"7\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"8\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"9\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"10\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"11\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"12\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"13\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"14\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"15\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"16\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"17\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"18\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"19\", \"index\"),\n+ // One missing\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"21\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"22\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-03\", \"hour\", \"23\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"0\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"1\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"2\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"3\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"4\", \"index\"),\n+ join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"5\", \"index\")\n );\n \n Set actualFiles = getActualFiles(outputFile);\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n@@ -0,0 +1,106 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DiagnosisKeysDateDirectory;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DiagnosisKeysHourDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDate;\n+import java.time.LocalDateTime;\n+import java.util.List;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.Stream;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class DateIndexingDecoratorTest {\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ CryptoProvider cryptoProvider;\n+\n+ private DiagnosisKeyBundler diagnosisKeyBundler;\n+\n+ @BeforeEach\n+ void setup() {\n+ diagnosisKeyBundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ }\n+\n+ @Test\n+ void excludesEmptyDatesFromIndex() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 0, 0), 0),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 0, 0), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 0, 0));\n+ DateIndexingDecorator decorator = makeDecoratedDateDirectory(diagnosisKeyBundler);\n+ decorator.prepare(new ImmutableStack<>().push(\"DE\"));\n+\n+ Set index = decorator.getIndex(new ImmutableStack<>());\n+\n+ assertThat(index).contains(LocalDate.of(1970, 1, 3));\n+ assertThat(index).doesNotContain(LocalDate.of(1970, 1, 4));\n+ assertThat(index).contains(LocalDate.of(1970, 1, 5));\n+ }\n+\n+ @Test\n+ void excludesCurrentDateFromIndex() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 0, 0), 5);\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ DateIndexingDecorator decorator = makeDecoratedDateDirectory(diagnosisKeyBundler);\n+ decorator.prepare(new ImmutableStack<>().push(\"DE\"));\n+\n+ Set index = decorator.getIndex(new ImmutableStack<>());\n+\n+ assertThat(index).contains(LocalDate.of(1970, 1, 4));\n+ assertThat(index).doesNotContain(LocalDate.of(1970, 1, 5));\n+ }\n+\n+ private DateIndexingDecorator makeDecoratedDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler) {\n+ return new DateIndexingDecorator(\n+ new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig),\n+ distributionServiceConfig\n+ );\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n@@ -0,0 +1,105 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.DiagnosisKeysHourDirectory;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.time.LocalDate;\n+import java.time.LocalDateTime;\n+import java.util.List;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.Stream;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class HourIndexingDecoratorTest {\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @Autowired\n+ CryptoProvider cryptoProvider;\n+\n+ private DiagnosisKeyBundler diagnosisKeyBundler;\n+\n+ @BeforeEach\n+ void setup() {\n+ diagnosisKeyBundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ }\n+\n+ @Test\n+ void excludesEmptyHoursFromIndex() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 4, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 5, 0), 0),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 6, 0), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ HourIndexingDecorator decorator = makeDecoratedHourDirectory(diagnosisKeyBundler);\n+ decorator.prepare(new ImmutableStack<>().push(\"DE\").push(LocalDate.of(1970, 1, 3)));\n+\n+ Set index = decorator.getIndex(new ImmutableStack<>().push(LocalDate.of(1970, 1, 3)));\n+\n+ assertThat(index).contains(LocalDateTime.of(1970, 1, 3, 4, 0));\n+ assertThat(index).doesNotContain(LocalDateTime.of(1970, 1, 3, 5, 0));\n+ assertThat(index).contains(LocalDateTime.of(1970, 1, 3, 6, 0));\n+ }\n+\n+ @Test\n+ void excludesCurrentHourFromIndex() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 0, 0), 5);\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 1, 0));\n+ HourIndexingDecorator decorator = makeDecoratedHourDirectory(diagnosisKeyBundler);\n+ decorator.prepare(new ImmutableStack<>().push(\"DE\").push(LocalDate.of(1970, 1, 5)));\n+\n+ Set index = decorator.getIndex(new ImmutableStack<>().push(LocalDate.of(1970, 1, 5)));\n+\n+ assertThat(index).contains(LocalDateTime.of(1970, 1, 5, 0, 0));\n+ assertThat(index).doesNotContain(LocalDateTime.of(1970, 1, 5, 1, 0));\n+ }\n+\n+ private HourIndexingDecorator makeDecoratedHourDirectory(DiagnosisKeyBundler diagnosisKeyBundler) {\n+ return new HourIndexingDecorator(\n+ new DiagnosisKeysHourDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig),\n+ distributionServiceConfig\n+ );\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTimeTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTimeTest.java\ndeleted file mode 100644\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/util/DateTimeTest.java\n+++ /dev/null\n@@ -1,103 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.util;\n-\n-import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeyForDateTime;\n-import static java.util.Collections.emptyList;\n-import static java.util.Collections.emptySet;\n-import static org.assertj.core.api.Assertions.assertThat;\n-\n-import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import app.coronawarn.server.services.distribution.common.Helpers;\n-import java.time.LocalDate;\n-import java.time.LocalDateTime;\n-import java.util.HashSet;\n-import java.util.Set;\n-import java.util.stream.Collectors;\n-import java.util.stream.Stream;\n-import org.junit.jupiter.api.Test;\n-import org.junit.jupiter.params.ParameterizedTest;\n-import org.junit.jupiter.params.provider.Arguments;\n-import org.junit.jupiter.params.provider.MethodSource;\n-\n-class DateTimeTest {\n-\n- @Test\n- void testGetDatesForEmptyList() {\n- assertThat(DateTime.getDates(emptyList())).isEmpty();\n- }\n-\n- @ParameterizedTest\n- @MethodSource(\"createDiagnosisKeysForEpochDay0\")\n- void testGetDatesForEpochDay0(DiagnosisKey diagnosisKey) {\n- var expDates = Set.of(LocalDate.ofEpochDay(0L));\n- var actDates = DateTime.getDates(Set.of(diagnosisKey));\n-\n- assertThat(actDates)\n- .withFailMessage(\n- \"Failed for submission timestamp: \" + diagnosisKey.getSubmissionTimestamp())\n- .isEqualTo(expDates);\n- }\n-\n- private static Stream createDiagnosisKeysForEpochDay0() {\n- return Stream.of(\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 1, 0, 0)),\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 1, 1, 0)),\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 1, 23, 59, 59))\n- ).map(Arguments::of);\n- }\n-\n- @Test\n- void testGetDatesFor2Days() {\n- var diagnosisKeys = Set.of(\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 1, 1, 0)),\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 2, 1, 0)));\n- var expDates = Set.of(LocalDate.ofEpochDay(0L), LocalDate.ofEpochDay(1L));\n-\n- assertThat(DateTime.getDates(diagnosisKeys)).isEqualTo(expDates);\n- }\n-\n- @ParameterizedTest\n- @MethodSource(\"createDiagnosisKeysForEpochDay1And3\")\n- void testGetHoursReturnsHoursOnlyForSpecifiedDate(Set diagnosisKeys) {\n- var expHours = Set.of(\n- LocalDateTime.of(1970, 1, 2, 0, 0),\n- LocalDateTime.of(1970, 1, 2, 5, 0));\n-\n- var diagnosisKeysIncludingExpHours = new HashSet<>(diagnosisKeys);\n- diagnosisKeysIncludingExpHours.addAll(expHours.stream()\n- .map(Helpers::buildDiagnosisKeyForDateTime).collect(Collectors.toSet()));\n-\n- var actHours = DateTime.getHours(LocalDate.ofEpochDay(1L), diagnosisKeysIncludingExpHours);\n-\n- assertThat(actHours).isEqualTo(expHours);\n- }\n-\n- private static Stream createDiagnosisKeysForEpochDay1And3() {\n- return Stream.of(\n- emptySet(),\n- Set.of(buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 1, 23, 59))),\n- Set.of(\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 1, 23, 59, 59)),\n- buildDiagnosisKeyForDateTime(LocalDateTime.of(1970, 1, 3, 0, 0)))\n- ).map(Arguments::of);\n- }\n-}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n@@ -25,6 +25,9 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import java.time.LocalDateTime;\n import java.time.ZoneOffset;\n+import java.util.List;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n \n public class Helpers {\n \n@@ -36,7 +39,7 @@ public static void prepareAndWrite(Directory directory) {\n public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n return DiagnosisKey.builder()\n .withKeyData(new byte[16])\n- .withRollingStartIntervalNumber(600)\n+ .withRollingStartIntervalNumber(1)\n .withTransmissionRiskLevel(2)\n .withSubmissionTimestamp(submissionTimeStamp).build();\n }\n@@ -44,4 +47,19 @@ public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissi\n public static DiagnosisKey buildDiagnosisKeyForDateTime(LocalDateTime dateTime) {\n return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond(ZoneOffset.UTC) / 3600);\n }\n+\n+ public static List buildDiagnosisKeys(int startIntervalNumber, LocalDateTime submissionTimestamp, int number) {\n+ long timestamp = submissionTimestamp.toEpochSecond(ZoneOffset.UTC) / 3600;\n+ return buildDiagnosisKeys(startIntervalNumber, timestamp, number);\n+ }\n+\n+ public static List buildDiagnosisKeys(int startIntervalNumber, long submissionTimestamp, int number) {\n+ return IntStream.range(0, number)\n+ .mapToObj(__ -> DiagnosisKey.builder()\n+ .withKeyData(new byte[16])\n+ .withRollingStartIntervalNumber(startIntervalNumber)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(submissionTimestamp).build())\n+ .collect(Collectors.toList());\n+ }\n }\n", "problem_statement": "Remove \"empty\" dates/hours from index files\n## Current Implementation\r\nAll dates/hours between the first submission and now (last full hour) are included in the index files, even if there were no submissions.\r\n\r\n## Suggested Enhancement\r\nOnly list dates/hours for which there were submissions in the index files. The \"empty\" date/hour files should, however, still be generated, even if they are not in the index.\r\n\r\n## Expected Benefits\r\nMobile clients need to do fewer requests (they can simply skip empty dates/hours).\n", "hints_text": "Why should the empty files still be generated?\nBasically to attest that there were really no submissions in that time window (and that the distribution run didn't just fail). Since we are not (yet) signing index files, I guess the best we can do is to just create and sign the empty exports.", "created_at": "2020-06-03T16:28:18Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 441, "instance_id": "corona-warn-app__cwa-server-441", "issue_numbers": ["437"], "base_commit": "2165f162938409e6401c926d8643835a114ab887", "patch": "diff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/attenuation_duration.proto\n@@ -6,6 +6,8 @@ option java_multiple_files = true;\n message AttenuationDuration {\n Thresholds thresholds = 1;\n Weights weights = 2;\n+ int32 defaultBucketOffset = 3;\n+ int32 riskScoreNormalizationDivisor = 4;\n }\n \n message Thresholds {\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidator.java\n@@ -26,6 +26,10 @@\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MAX;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.DEFAULT_BUCKET_OFFSET_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.DEFAULT_BUCKET_OFFSET_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.RISK_SCORE_NORMALIZATION_DIVISOR_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.RISK_SCORE_NORMALIZATION_DIVISOR_MIN;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.OUT_OF_RANGE;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.TOO_MANY_DECIMAL_PLACES;\n \n@@ -49,6 +53,8 @@ public ValidationResult validate() {\n \n validateThresholds();\n validateWeights();\n+ validateDefaultBucketOffset();\n+ validateRiskScoreNormalizationDivisor();\n \n return errors;\n }\n@@ -57,8 +63,8 @@ private void validateThresholds() {\n int lower = attenuationDuration.getThresholds().getLower();\n int upper = attenuationDuration.getThresholds().getUpper();\n \n- checkThresholdBound(\"lower\", lower);\n- checkThresholdBound(\"upper\", upper);\n+ checkValueRange(\"thresholds.lower\", lower, ATTENUATION_DURATION_THRESHOLD_MIN, ATTENUATION_DURATION_THRESHOLD_MAX);\n+ checkValueRange(\"thresholds.upper\", upper, ATTENUATION_DURATION_THRESHOLD_MIN, ATTENUATION_DURATION_THRESHOLD_MAX);\n \n if (lower > upper) {\n String parameters = \"attenuation-duration.thresholds.lower, attenuation-duration.thresholds.upper\";\n@@ -67,10 +73,10 @@ private void validateThresholds() {\n }\n }\n \n- private void checkThresholdBound(String thresholdLabel, int thresholdValue) {\n- if (thresholdValue < ATTENUATION_DURATION_THRESHOLD_MIN || thresholdValue > ATTENUATION_DURATION_THRESHOLD_MAX) {\n+ private void checkValueRange(String parameterLabel, int value, int min, int max) {\n+ if (value < min || value > max) {\n this.errors.add(new GeneralValidationError(\n- \"attenuation-duration.thresholds.\" + thresholdLabel, thresholdValue, VALUE_OUT_OF_BOUNDS));\n+ \"attenuation-duration.\" + parameterLabel, value, VALUE_OUT_OF_BOUNDS));\n }\n }\n \n@@ -91,4 +97,15 @@ private void checkWeight(String weightLabel, double weightValue) {\n \"attenuation-duration.weights.\" + weightLabel, weightValue, TOO_MANY_DECIMAL_PLACES));\n }\n }\n+\n+ private void validateDefaultBucketOffset() {\n+ int bucketOffset = attenuationDuration.getDefaultBucketOffset();\n+ checkValueRange(\"default-bucket-offset\", bucketOffset, DEFAULT_BUCKET_OFFSET_MIN, DEFAULT_BUCKET_OFFSET_MAX);\n+ }\n+\n+ private void validateRiskScoreNormalizationDivisor() {\n+ int riskScoreNormalizationDivisor = attenuationDuration.getRiskScoreNormalizationDivisor();\n+ checkValueRange(\"risk-score-normalization-divisor\", riskScoreNormalizationDivisor,\n+ RISK_SCORE_NORMALIZATION_DIVISOR_MIN, RISK_SCORE_NORMALIZATION_DIVISOR_MAX);\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ParameterSpec.java\n@@ -78,4 +78,25 @@ private ParameterSpec() {\n * Maximum number of allowed decimals for an attenuation weight.\n */\n public static final int ATTENUATION_DURATION_WEIGHT_MAX_DECIMALS = 3;\n+\n+\n+ /**\n+ * The allowed minimum value for a default bucket offset.\n+ */\n+ public static final int DEFAULT_BUCKET_OFFSET_MIN = 0;\n+\n+ /**\n+ * The allowed maximum value for a default bucket offset.\n+ */\n+ public static final int DEFAULT_BUCKET_OFFSET_MAX = 1;\n+\n+ /**\n+ * The allowed minimum value for a risk score normalization divisor.\n+ */\n+ public static final int RISK_SCORE_NORMALIZATION_DIVISOR_MIN = 0;\n+\n+ /**\n+ * The allowed maximum value for a risk score normalization divisor.\n+ */\n+ public static final int RISK_SCORE_NORMALIZATION_DIVISOR_MAX = 1000;\n }\ndiff --git a/services/distribution/src/main/resources/master-config/attenuation-duration.yaml b/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n--- a/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n+++ b/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n@@ -4,6 +4,9 @@\n # Each of the aforementioned partitions has a weight in the range of [0, 1]\n # assigned to it. The number of decimal places is restricted to 3.\n #\n+# default-bucket-offset value range: {0, 1}\n+# risk-score-normalization-divisor value range: [1, 1000]\n+#\n # Change this file with caution!\n \n thresholds:\n@@ -13,3 +16,5 @@ weights:\n low: 1.0\n mid: 0.5\n high: 0.0\n+default-bucket-offset: 0\n+risk-score-normalization-divisor: 25\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/AttenuationDurationValidatorTest.java\n@@ -26,6 +26,10 @@\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_THRESHOLD_MIN;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MAX;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.ATTENUATION_DURATION_WEIGHT_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.DEFAULT_BUCKET_OFFSET_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.DEFAULT_BUCKET_OFFSET_MIN;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.RISK_SCORE_NORMALIZATION_DIVISOR_MAX;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.RISK_SCORE_NORMALIZATION_DIVISOR_MIN;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildExpectedResult;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.WeightValidationError.ErrorType.OUT_OF_RANGE;\n@@ -44,12 +48,14 @@ public class AttenuationDurationValidatorTest {\n buildThresholds(ATTENUATION_DURATION_THRESHOLD_MIN, ATTENUATION_DURATION_THRESHOLD_MAX);\n private static final Weights VALID_WEIGHTS =\n buildWeights(ATTENUATION_DURATION_WEIGHT_MAX, ATTENUATION_DURATION_WEIGHT_MAX, ATTENUATION_DURATION_WEIGHT_MAX);\n+ private static final int VALID_BUCKET_OFFSET = DEFAULT_BUCKET_OFFSET_MAX;\n+ private static final int VALID_NORMALIZATION_DIVISOR = RISK_SCORE_NORMALIZATION_DIVISOR_MIN;\n \n @ParameterizedTest\n @ValueSource(ints = {ATTENUATION_DURATION_THRESHOLD_MIN - 1, ATTENUATION_DURATION_THRESHOLD_MAX + 1})\n void failsIfAttenuationDurationThresholdOutOfBounds(int invalidThresholdValue) {\n AttenuationDurationValidator validator = buildValidator(\n- buildThresholds(invalidThresholdValue, invalidThresholdValue), VALID_WEIGHTS);\n+ buildThresholds(invalidThresholdValue, invalidThresholdValue));\n \n ValidationResult expectedResult = buildExpectedResult(\n buildError(\"attenuation-duration.thresholds.lower\", invalidThresholdValue, VALUE_OUT_OF_BOUNDS),\n@@ -58,10 +64,35 @@ void failsIfAttenuationDurationThresholdOutOfBounds(int invalidThresholdValue) {\n assertThat(validator.validate()).isEqualTo(expectedResult);\n }\n \n+ @ParameterizedTest\n+ @ValueSource(ints = {DEFAULT_BUCKET_OFFSET_MIN - 1, DEFAULT_BUCKET_OFFSET_MAX + 1})\n+ void failsIfBucketOffsetOutOfBounds(int invalidDefaultBucketOffsetValue) {\n+ AttenuationDurationValidator validator = buildValidator(VALID_THRESHOLDS, VALID_WEIGHTS,\n+ invalidDefaultBucketOffsetValue, VALID_NORMALIZATION_DIVISOR);\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ buildError(\"attenuation-duration.default-bucket-offset\", invalidDefaultBucketOffsetValue, VALUE_OUT_OF_BOUNDS));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(ints = {RISK_SCORE_NORMALIZATION_DIVISOR_MIN - 1, RISK_SCORE_NORMALIZATION_DIVISOR_MAX + 1})\n+ void failsIfRiskScoreNormalizationDivisorOutOfBounds(int invalidRiskScoreNormalizationDivisorValue) {\n+ AttenuationDurationValidator validator = buildValidator(VALID_THRESHOLDS, VALID_WEIGHTS, VALID_BUCKET_OFFSET,\n+ invalidRiskScoreNormalizationDivisorValue);\n+\n+ ValidationResult expectedResult = buildExpectedResult(\n+ buildError(\"attenuation-duration.risk-score-normalization-divisor\", invalidRiskScoreNormalizationDivisorValue,\n+ VALUE_OUT_OF_BOUNDS));\n+\n+ assertThat(validator.validate()).isEqualTo(expectedResult);\n+ }\n+\n @Test\n void failsIfUpperAttenuationDurationThresholdLesserThanLower() {\n AttenuationDurationValidator validator = buildValidator(\n- buildThresholds(ATTENUATION_DURATION_THRESHOLD_MAX, ATTENUATION_DURATION_THRESHOLD_MIN), VALID_WEIGHTS);\n+ buildThresholds(ATTENUATION_DURATION_THRESHOLD_MAX, ATTENUATION_DURATION_THRESHOLD_MIN));\n \n ValidationResult expectedResult = buildExpectedResult(\n new GeneralValidationError(\"attenuation-duration.thresholds.lower, attenuation-duration.thresholds.upper\",\n@@ -73,7 +104,7 @@ void failsIfUpperAttenuationDurationThresholdLesserThanLower() {\n @ParameterizedTest\n @ValueSource(doubles = {ATTENUATION_DURATION_WEIGHT_MIN - .1, ATTENUATION_DURATION_WEIGHT_MAX + .1})\n void failsIfWeightsOutOfBounds(double invalidWeightValue) {\n- AttenuationDurationValidator validator = buildValidator(VALID_THRESHOLDS,\n+ AttenuationDurationValidator validator = buildValidator(\n buildWeights(invalidWeightValue, invalidWeightValue, invalidWeightValue));\n \n ValidationResult expectedResult = buildExpectedResult(\n@@ -87,7 +118,7 @@ void failsIfWeightsOutOfBounds(double invalidWeightValue) {\n @Test\n void failsIfWeightsHaveTooManyDecimalPlaces() {\n double invalidWeightValue = ATTENUATION_DURATION_WEIGHT_MAX - 0.0000001;\n- AttenuationDurationValidator validator = buildValidator(VALID_THRESHOLDS,\n+ AttenuationDurationValidator validator = buildValidator(\n buildWeights(invalidWeightValue, invalidWeightValue, invalidWeightValue));\n \n ValidationResult expectedResult = buildExpectedResult(\n@@ -98,10 +129,22 @@ void failsIfWeightsHaveTooManyDecimalPlaces() {\n assertThat(validator.validate()).isEqualTo(expectedResult);\n }\n \n- private static AttenuationDurationValidator buildValidator(Thresholds thresholds, Weights weights) {\n+ private static AttenuationDurationValidator buildValidator(Thresholds thresholds) {\n+ return buildValidator(thresholds, VALID_WEIGHTS, VALID_BUCKET_OFFSET, VALID_NORMALIZATION_DIVISOR);\n+ }\n+\n+ private static AttenuationDurationValidator buildValidator(Weights weights) {\n+ return buildValidator(VALID_THRESHOLDS, weights, VALID_BUCKET_OFFSET, VALID_NORMALIZATION_DIVISOR);\n+ }\n+\n+ private static AttenuationDurationValidator buildValidator(\n+ Thresholds thresholds, Weights weights, int defaultBucketOffset, int riskScoreNormalizationDivisor) {\n return new AttenuationDurationValidator(AttenuationDuration.newBuilder()\n .setThresholds(thresholds)\n- .setWeights(weights).build());\n+ .setWeights(weights)\n+ .setDefaultBucketOffset(defaultBucketOffset)\n+ .setRiskScoreNormalizationDivisor(riskScoreNormalizationDivisor)\n+ .build());\n }\n \n private static Thresholds buildThresholds(int lower, int upper) {\ndiff --git a/services/distribution/src/test/resources/configtests/attenuation-duration.yaml b/services/distribution/src/test/resources/configtests/attenuation-duration.yaml\n--- a/services/distribution/src/test/resources/configtests/attenuation-duration.yaml\n+++ b/services/distribution/src/test/resources/configtests/attenuation-duration.yaml\n@@ -5,3 +5,5 @@ weights:\n low: 1.0\n mid: 0.5\n high: 0.0\n+default-bucket-offset: 0\n+risk-score-normalization-divisor: 25\n", "problem_statement": "Application Configuration: Attenuation Duration Enhancements\nWe need two additional configuration variables for the attenuation duration, namely defaultBucketOffset and riskScoreNormalizationDivisor.\r\n\r\nThe target config should look like this:\r\n\r\n```yaml\r\ndefault-bucket-offset: 0 # discussed as W4\r\nrisk-score-normalization-divisor: 25 # discussed as W5 \r\nthresholds:\r\n lower: 50\r\n upper: 70\r\nweights:\r\n low: 1.0\r\n mid: 0.5\r\n high: 0.0\r\n```\r\n\r\nValue range for bucket offset: 0 or 1 (int)\r\nrisk score normalization divisor: 1...1000 (int)\n", "hints_text": "@michael-burwig \nProposed .proto file:\r\n```\r\nsyntax = \"proto3\";\r\npackage app.coronawarn.server.common.protocols.internal;\r\noption java_package = \"app.coronawarn.server.common.protocols.internal\";\r\noption java_multiple_files = true;\r\n\r\nmessage AttenuationDuration {\r\n Thresholds thresholds = 1;\r\n Weights weights = 2;\r\n int32 defaultBucketOffset = 3;\r\n int32 riskScoreNormalizationDivisor = 4;\r\n}\r\n\r\nmessage Thresholds {\r\n int32 lower = 1;\r\n int32 upper = 2;\r\n}\r\n\r\nmessage Weights {\r\n double low = 1;\r\n double mid = 2;\r\n double high = 3;\r\n}\r\n```", "created_at": "2020-06-03T19:38:59Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 463, "instance_id": "corona-warn-app__cwa-server-463", "issue_numbers": ["444"], "base_commit": "eb68e1126a4f9bcb169afef6a2ca1dbbbcf8b3cd", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n@@ -27,6 +27,7 @@\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n import java.time.LocalDateTime;\n+import java.time.temporal.Temporal;\n import java.util.Collection;\n import java.util.HashMap;\n import java.util.List;\n@@ -35,12 +36,16 @@\n import java.util.Set;\n import java.util.concurrent.TimeUnit;\n import java.util.stream.Collectors;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n \n /**\n * An instance of this class contains a collection of {@link DiagnosisKey DiagnosisKeys}.\n */\n public abstract class DiagnosisKeyBundler {\n \n+ private static final Logger logger = LoggerFactory.getLogger(DiagnosisKeyBundler.class);\n+\n /**\n * The submission timestamp is counted in 1 hour intervals since epoch.\n */\n@@ -51,8 +56,9 @@ public abstract class DiagnosisKeyBundler {\n */\n public static final long TEN_MINUTES_INTERVAL_SECONDS = TimeUnit.MINUTES.toSeconds(10);\n \n- protected final int minNumberOfKeysPerBundle;\n protected final long expiryPolicyMinutes;\n+ protected final int minNumberOfKeysPerBundle;\n+ private final int maxNumberOfKeysPerBundle;\n \n // The hour at which the distribution runs. This field is needed to prevent the run from distributing any keys that\n // have already been submitted but may only be distributed in the future (e.g. because they are not expired yet).\n@@ -61,9 +67,13 @@ public abstract class DiagnosisKeyBundler {\n // A map containing diagnosis keys, grouped by the LocalDateTime on which they may be distributed\n protected final Map> distributableDiagnosisKeys = new HashMap<>();\n \n+ /**\n+ * Constructs a DiagnosisKeyBundler based on the specified service configuration.\n+ */\n public DiagnosisKeyBundler(DistributionServiceConfig distributionServiceConfig) {\n- this.minNumberOfKeysPerBundle = distributionServiceConfig.getShiftingPolicyThreshold();\n this.expiryPolicyMinutes = distributionServiceConfig.getExpiryPolicyMinutes();\n+ this.minNumberOfKeysPerBundle = distributionServiceConfig.getShiftingPolicyThreshold();\n+ this.maxNumberOfKeysPerBundle = distributionServiceConfig.getMaximumNumberOfKeysPerBundle();\n }\n \n /**\n@@ -106,9 +116,14 @@ public List getAllDiagnosisKeys() {\n public Set getDatesWithDistributableDiagnosisKeys() {\n return this.distributableDiagnosisKeys.keySet().stream()\n .map(LocalDateTime::toLocalDate)\n+ .filter(this::numberOfKeysForDateBelowMaximum)\n .collect(Collectors.toSet());\n }\n \n+ public boolean numberOfKeysForDateBelowMaximum(LocalDate date) {\n+ return numberOfKeysBelowMaximum(getDiagnosisKeysForDate(date).size(), date);\n+ }\n+\n /**\n * Returns a set of all {@link LocalDateTime hours} of a specified {@link LocalDate date} during which {@link\n * DiagnosisKey diagnosis keys} shall be distributed.\n@@ -116,9 +131,23 @@ public Set getDatesWithDistributableDiagnosisKeys() {\n public Set getHoursWithDistributableDiagnosisKeys(LocalDate currentDate) {\n return this.distributableDiagnosisKeys.keySet().stream()\n .filter(dateTime -> dateTime.toLocalDate().equals(currentDate))\n+ .filter(this::numberOfKeysForHourBelowMaximum)\n .collect(Collectors.toSet());\n }\n \n+ private boolean numberOfKeysForHourBelowMaximum(LocalDateTime hour) {\n+ return numberOfKeysBelowMaximum(getDiagnosisKeysForHour(hour).size(), hour);\n+ }\n+\n+ private boolean numberOfKeysBelowMaximum(int numberOfKeys, Temporal time) {\n+ if (numberOfKeys > maxNumberOfKeysPerBundle) {\n+ logger.error(\"Number of diagnosis keys ({}) for {} exceeds the configured maximum.\", numberOfKeys, time);\n+ return false;\n+ } else {\n+ return true;\n+ }\n+ }\n+\n /**\n * Returns the submission timestamp of a {@link DiagnosisKey} as a {@link LocalDateTime}.\n */\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n@@ -67,6 +67,6 @@ public void prepare(ImmutableStack indices) {\n \n private IndexDirectory decorateDateDirectory(DiagnosisKeysDateDirectory dateDirectory) {\n return new DateAggregatingDecorator(new DateIndexingDecorator(dateDirectory, distributionServiceConfig),\n- cryptoProvider, distributionServiceConfig);\n+ cryptoProvider, distributionServiceConfig, diagnosisKeyBundler);\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n@@ -25,6 +25,7 @@\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKeyExport;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.singing.DiagnosisKeySigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n@@ -54,15 +55,17 @@ public class DateAggregatingDecorator extends IndexDirectoryDecorator directory, CryptoProvider cryptoProvider,\n- DistributionServiceConfig distributionServiceConfig) {\n+ DistributionServiceConfig distributionServiceConfig, DiagnosisKeyBundler diagnosisKeyBundler) {\n super(directory);\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n+ this.diagnosisKeyBundler = diagnosisKeyBundler;\n }\n \n @Override\n@@ -77,6 +80,7 @@ public void prepare(ImmutableStack indices) {\n }\n \n Set dates = this.getIndex(indices).stream()\n+ .filter(diagnosisKeyBundler::numberOfKeysForDateBelowMaximum)\n .map(this.getIndexFormatter())\n .map(Object::toString)\n .collect(Collectors.toSet());\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/io/IO.java\n@@ -30,6 +30,11 @@\n */\n public class IO {\n \n+ /**\n+ * The maximum acceptable file size in bytes.\n+ */\n+ public static final int MAXIMUM_FILE_SIZE = 16000000;\n+\n private IO() {\n }\n \n@@ -51,12 +56,20 @@ public static void makeNewFile(File root, String name) {\n }\n \n /**\n- * Writes bytes into a file.\n+ * Writes bytes into a file. If the resulting file would exceed the specified maximum file size, it is not written but\n+ * removed instead.\n *\n * @param bytes The content to write\n * @param outputFile The file to write the content into.\n */\n public static void writeBytesToFile(byte[] bytes, File outputFile) {\n+ if (bytes.length > MAXIMUM_FILE_SIZE) {\n+ String fileName = outputFile.getName();\n+ throw new UncheckedIOException(\n+ new IOException(\n+ \"File size of \" + bytes.length + \" bytes exceeds the maximum file size. Deleting\" + fileName));\n+ }\n+\n try (FileOutputStream outputFileStream = new FileOutputStream(outputFile)) {\n outputFileStream.write(bytes);\n } catch (IOException e) {\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n@@ -33,6 +33,7 @@ public class DistributionServiceConfig {\n private Integer retentionDays;\n private Integer expiryPolicyMinutes;\n private Integer shiftingPolicyThreshold;\n+ private Integer maximumNumberOfKeysPerBundle;\n private String outputFileName;\n private Boolean includeIncompleteDays;\n private Boolean includeIncompleteHours;\n@@ -81,6 +82,14 @@ public void setShiftingPolicyThreshold(Integer shiftingPolicyThreshold) {\n this.shiftingPolicyThreshold = shiftingPolicyThreshold;\n }\n \n+ public Integer getMaximumNumberOfKeysPerBundle() {\n+ return this.maximumNumberOfKeysPerBundle;\n+ }\n+\n+ public void setMaximumNumberOfKeysPerBundle(Integer maximumNumberOfKeysPerBundle) {\n+ this.maximumNumberOfKeysPerBundle = maximumNumberOfKeysPerBundle;\n+ }\n+\n public String getOutputFileName() {\n return outputFileName;\n }\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\n--- a/services/distribution/src/main/resources/application.yaml\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -13,6 +13,7 @@ services:\n retention-days: 14\n expiry-policy-minutes: 120\n shifting-policy-threshold: 140\n+ maximum-number-of-keys-per-bundle: 600000\n include-incomplete-days: false\n include-incomplete-hours: false\n paths:\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n@@ -22,6 +22,8 @@\n \n import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n import static org.assertj.core.api.Assertions.assertThat;\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.when;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n@@ -96,6 +98,30 @@ void excludesCurrentDateFromIndex() {\n assertThat(index).doesNotContain(LocalDate.of(1970, 1, 5));\n }\n \n+ @Test\n+ void excludesDatesThatExceedTheMaximumNumberOfKeys() {\n+ List diagnosisKeys = Stream\n+ .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 6, 0), 1),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 10, 0), 1))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+\n+ DistributionServiceConfig svcConfig = mock(DistributionServiceConfig.class);\n+ when(svcConfig.getExpiryPolicyMinutes()).thenReturn(120);\n+ when(svcConfig.getShiftingPolicyThreshold()).thenReturn(1);\n+ when(svcConfig.getMaximumNumberOfKeysPerBundle()).thenReturn(1);\n+\n+ DiagnosisKeyBundler diagnosisKeyBundler = new ProdDiagnosisKeyBundler(svcConfig);\n+ diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+\n+ DateIndexingDecorator decorator = makeDecoratedDateDirectory(diagnosisKeyBundler);\n+\n+ decorator.prepare(new ImmutableStack<>().push(\"DE\"));\n+\n+ Set index = decorator.getIndex(new ImmutableStack<>());\n+ assertThat(index).isEmpty();\n+ }\n+\n private DateIndexingDecorator makeDecoratedDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler) {\n return new DateIndexingDecorator(\n new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig),\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n@@ -22,6 +22,8 @@\n \n import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n import static org.assertj.core.api.Assertions.assertThat;\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.when;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n@@ -34,8 +36,6 @@\n import java.time.LocalDateTime;\n import java.util.List;\n import java.util.Set;\n-import java.util.stream.Collectors;\n-import java.util.stream.Stream;\n import org.junit.jupiter.api.BeforeEach;\n import org.junit.jupiter.api.Test;\n import org.junit.jupiter.api.extension.ExtendWith;\n@@ -65,26 +65,27 @@ void setup() {\n }\n \n @Test\n- void excludesEmptyHoursFromIndex() {\n- List diagnosisKeys = Stream\n- .of(buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 4, 0), 5),\n- buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 5, 0), 0),\n- buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 6, 0), 5))\n- .flatMap(List::stream)\n- .collect(Collectors.toList());\n+ void excludesHoursThatExceedTheMaximumNumberOfKeys() {\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 4, 0), 2);\n+\n+ DistributionServiceConfig svcConfig = mock(DistributionServiceConfig.class);\n+ when(svcConfig.getExpiryPolicyMinutes()).thenReturn(120);\n+ when(svcConfig.getShiftingPolicyThreshold()).thenReturn(1);\n+ when(svcConfig.getMaximumNumberOfKeysPerBundle()).thenReturn(1);\n+\n+ DiagnosisKeyBundler diagnosisKeyBundler = new ProdDiagnosisKeyBundler(svcConfig);\n diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+\n HourIndexingDecorator decorator = makeDecoratedHourDirectory(diagnosisKeyBundler);\n- decorator.prepare(new ImmutableStack<>().push(\"DE\").push(LocalDate.of(1970, 1, 3)));\n \n+ decorator.prepare(new ImmutableStack<>().push(\"DE\").push(LocalDate.of(1970, 1, 3)));\n Set index = decorator.getIndex(new ImmutableStack<>().push(LocalDate.of(1970, 1, 3)));\n \n- assertThat(index).contains(LocalDateTime.of(1970, 1, 3, 4, 0));\n- assertThat(index).doesNotContain(LocalDateTime.of(1970, 1, 3, 5, 0));\n- assertThat(index).contains(LocalDateTime.of(1970, 1, 3, 6, 0));\n+ assertThat(index).isEmpty();\n }\n \n @Test\n- void excludesCurrentHourFromIndex() {\n+ void excludesEmptyHoursFromIndex() {\n List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 0, 0), 5);\n diagnosisKeyBundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 1, 0));\n HourIndexingDecorator decorator = makeDecoratedHourDirectory(diagnosisKeyBundler);\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/io/IOTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/io/IOTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/io/IOTest.java\n@@ -0,0 +1,42 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.io;\n+\n+\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.never;\n+import static org.mockito.Mockito.verify;\n+\n+import java.io.File;\n+import java.io.UncheckedIOException;\n+import org.junit.jupiter.api.Test;\n+\n+class IOTest {\n+\n+ @Test\n+ void doesNotWriteIfMaximumFileSize() {\n+ File file = mock(File.class);\n+ assertThatExceptionOfType(UncheckedIOException.class)\n+ .isThrownBy(() -> IO.writeBytesToFile(new byte[IO.MAXIMUM_FILE_SIZE + 1], file));\n+ verify(file, never()).getPath();\n+ }\n+}\ndiff --git a/services/distribution/src/test/resources/application.yaml b/services/distribution/src/test/resources/application.yaml\n--- a/services/distribution/src/test/resources/application.yaml\n+++ b/services/distribution/src/test/resources/application.yaml\n@@ -11,6 +11,7 @@ services:\n retention-days: 14\n expiry-policy-minutes: 120\n shifting-policy-threshold: 5\n+ maximum-number-of-keys-per-bundle: 600000\n include-incomplete-days: false\n include-incomplete-hours: false\n paths:\n", "problem_statement": "Distribution: Add Safeguard to not generate any exposure key file > 16MB\nIn order to prevent issues on the mobile device & potential abuse, add a safeguard, so that we do not publish any files, which are bigger than 16MB. In case this threshold is reached for any file, an error message must be logged.\r\n\r\nMake sure to keep consistency with the index files. In order to align with the current concept of always generating a file, we should generate an empty file in this case as well.\r\n\r\n@pithumke \r\n\r\n\r\n\r\n\n", "hints_text": "> In order to align with the current concept of always generating a file, we should generate an empty file in this case as well.\r\n\r\nWill skip generating files larger than 600,000 keys in order to stay constistent with the current implementation.", "created_at": "2020-06-05T22:23:20Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 466, "instance_id": "corona-warn-app__cwa-server-466", "issue_numbers": ["150"], "base_commit": "b148f9eae02d75e509e9b0cc1ae0cdd3fbbad77e", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n@@ -404,6 +404,7 @@ public static class ObjectStore {\n private String bucket;\n private Boolean setPublicReadAclOnPutObject;\n private Integer maxNumberOfFailedOperations;\n+ private Integer maxNumberOfS3Threads;\n \n public String getAccessKey() {\n return accessKey;\n@@ -460,5 +461,13 @@ public Integer getMaxNumberOfFailedOperations() {\n public void setMaxNumberOfFailedOperations(Integer maxNumberOfFailedOperations) {\n this.maxNumberOfFailedOperations = maxNumberOfFailedOperations;\n }\n+\n+ public Integer getMaxNumberOfS3Threads() {\n+ return maxNumberOfS3Threads;\n+ }\n+\n+ public void setMaxNumberOfS3Threads(Integer maxNumberOfS3Threads) {\n+ this.maxNumberOfS3Threads = maxNumberOfS3Threads;\n+ }\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n@@ -28,9 +28,13 @@\n import java.io.IOException;\n import java.nio.file.Path;\n import java.util.List;\n+import java.util.concurrent.ExecutionException;\n+import java.util.concurrent.Future;\n import java.util.stream.Collectors;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;\n+import org.springframework.stereotype.Component;\n \n /**\n * Publishes a folder on the disk to S3 while keeping the folder and file structure. \n@@ -46,6 +50,7 @@\n *
Currently not implemented: Supports multi threaded upload of files.
\n *
\n */\n+@Component\n public class S3Publisher {\n \n private static final Logger logger = LoggerFactory.getLogger(S3Publisher.class);\n@@ -55,32 +60,33 @@ public class S3Publisher {\n */\n private static final String CWA_S3_ROOT = CwaApiStructureProvider.VERSION_DIRECTORY;\n \n- private final Path root;\n private final ObjectStoreAccess objectStoreAccess;\n private final FailedObjectStoreOperationsCounter failedOperationsCounter;\n+ private final ThreadPoolTaskExecutor executor;\n \n /**\n * Creates an {@link S3Publisher} instance that attempts to publish the files at the specified location to an object\n * store. Object store operations are performed through the specified {@link ObjectStoreAccess} instance.\n *\n- * @param root The path of the directory that shall be published.\n * @param objectStoreAccess The {@link ObjectStoreAccess} used to communicate with the object store.\n * @param failedOperationsCounter The {@link FailedObjectStoreOperationsCounter} that is used to monitor the number of\n * failed operations.\n+ * @param executor The executor that manages the upload task submission.\n */\n- public S3Publisher(Path root, ObjectStoreAccess objectStoreAccess,\n- FailedObjectStoreOperationsCounter failedOperationsCounter) {\n- this.root = root;\n+ public S3Publisher(ObjectStoreAccess objectStoreAccess, FailedObjectStoreOperationsCounter failedOperationsCounter,\n+ ThreadPoolTaskExecutor executor) {\n this.objectStoreAccess = objectStoreAccess;\n this.failedOperationsCounter = failedOperationsCounter;\n+ this.executor = executor;\n }\n \n /**\n * Synchronizes the files to S3.\n *\n+ * @param root The path of the directory that shall be published.\n * @throws IOException in case there were problems reading files from the disk.\n */\n- public void publish() throws IOException {\n+ public void publish(Path root) throws IOException {\n PublishedFileSet published;\n List toPublish = new PublishFileSet(root).getFiles();\n List diff;\n@@ -97,14 +103,25 @@ public void publish() throws IOException {\n diff = toPublish;\n }\n \n- logger.info(\"Beginning upload... \");\n- for (LocalFile file : diff) {\n- try {\n- this.objectStoreAccess.putObject(file);\n- } catch (ObjectStoreOperationFailedException e) {\n- failedOperationsCounter.incrementAndCheckThreshold(e);\n- }\n+ logger.info(\"Beginning upload of {} files... \", diff.size());\n+ try {\n+ diff.stream()\n+ .map(file -> executor.submit(() -> objectStoreAccess.putObject(file)))\n+ .forEach(this::awaitThread);\n+ } finally {\n+ executor.shutdown();\n }\n logger.info(\"Upload completed.\");\n }\n+\n+ private void awaitThread(Future> result) {\n+ try {\n+ result.get();\n+ } catch (ExecutionException e) {\n+ failedOperationsCounter.incrementAndCheckThreshold(new ObjectStoreOperationFailedException(e.getMessage(), e));\n+ } catch (InterruptedException e) {\n+ Thread.currentThread().interrupt();\n+ throw new ObjectStoreOperationFailedException(e.getMessage(), e);\n+ }\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStorePublishingConfig.java\nsimilarity index 77%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStorePublishingConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStorePublishingConfig.java\n@@ -26,6 +26,7 @@\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.Configuration;\n import org.springframework.retry.annotation.EnableRetry;\n+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;\n import software.amazon.awssdk.auth.credentials.AwsBasicCredentials;\n import software.amazon.awssdk.auth.credentials.AwsCredentialsProvider;\n import software.amazon.awssdk.auth.credentials.StaticCredentialsProvider;\n@@ -37,7 +38,7 @@\n */\n @Configuration\n @EnableRetry\n-public class ObjectStoreClientConfig {\n+public class ObjectStorePublishingConfig {\n \n private static final Region DEFAULT_REGION = Region.EU_CENTRAL_1;\n \n@@ -61,4 +62,17 @@ private ObjectStoreClient createClient(ObjectStore objectStore) {\n private String removeTrailingSlash(String string) {\n return string.endsWith(\"/\") ? string.substring(0, string.length() - 1) : string;\n }\n+\n+ /**\n+ * Creates a {@link ThreadPoolTaskExecutor}, which is used to submit object store upload tasks.\n+ */\n+ @Bean\n+ public ThreadPoolTaskExecutor createExecutor(DistributionServiceConfig distributionServiceConfig) {\n+ ThreadPoolTaskExecutor executor = new ThreadPoolTaskExecutor();\n+ executor.setCorePoolSize(distributionServiceConfig.getObjectStore().getMaxNumberOfS3Threads());\n+ executor.setMaxPoolSize(distributionServiceConfig.getObjectStore().getMaxNumberOfS3Threads());\n+ executor.setThreadNamePrefix(\"object-store-operation-worker-\");\n+ executor.initialize();\n+ return executor;\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n@@ -21,8 +21,6 @@\n package app.coronawarn.server.services.distribution.runner;\n \n import app.coronawarn.server.services.distribution.assembly.component.OutputDirectoryProvider;\n-import app.coronawarn.server.services.distribution.objectstore.FailedObjectStoreOperationsCounter;\n-import app.coronawarn.server.services.distribution.objectstore.ObjectStoreAccess;\n import app.coronawarn.server.services.distribution.objectstore.S3Publisher;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import java.io.IOException;\n@@ -44,23 +42,19 @@ public class S3Distribution implements ApplicationRunner {\n private static final Logger logger = LoggerFactory.getLogger(S3Distribution.class);\n \n private final OutputDirectoryProvider outputDirectoryProvider;\n- private final ObjectStoreAccess objectStoreAccess;\n- private final FailedObjectStoreOperationsCounter failedOperationsCounter;\n+ private final S3Publisher s3Publisher;\n \n- S3Distribution(OutputDirectoryProvider outputDirectoryProvider, ObjectStoreAccess objectStoreAccess,\n- FailedObjectStoreOperationsCounter failedOperationsCounter) {\n+ S3Distribution(OutputDirectoryProvider outputDirectoryProvider, S3Publisher s3Publisher) {\n this.outputDirectoryProvider = outputDirectoryProvider;\n- this.objectStoreAccess = objectStoreAccess;\n- this.failedOperationsCounter = failedOperationsCounter;\n+ this.s3Publisher = s3Publisher;\n }\n \n @Override\n public void run(ApplicationArguments args) {\n try {\n Path pathToDistribute = outputDirectoryProvider.getFileOnDisk().toPath().toAbsolutePath();\n- S3Publisher s3Publisher = new S3Publisher(pathToDistribute, objectStoreAccess, failedOperationsCounter);\n \n- s3Publisher.publish();\n+ s3Publisher.publish(pathToDistribute);\n logger.info(\"Data pushed to Object Store successfully.\");\n } catch (UnsupportedOperationException | ObjectStoreOperationFailedException | IOException e) {\n logger.error(\"Distribution failed.\", e);\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\n--- a/services/distribution/src/main/resources/application.yaml\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -51,6 +51,7 @@ services:\n retry-attempts: 3\n retry-backoff: 2000\n max-number-of-failed-operations: 5\n+ max-number-of-s3-threads: 4\n \n spring:\n main:\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n@@ -25,7 +25,7 @@\n import static org.mockito.Mockito.when;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClientConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStorePublishingConfig;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalGenericFile;\n import java.io.IOException;\n@@ -43,7 +43,7 @@\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @ExtendWith(SpringExtension.class)\n-@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStoreClientConfig.class})\n+@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStorePublishingConfig.class})\n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\n @Tag(\"s3-integration\")\n class ObjectStoreAccessTest {\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStorePublishingConfigTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStorePublishingConfigTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStorePublishingConfigTest.java\n@@ -0,0 +1,64 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.objectstore;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClient;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStorePublishingConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.S3ClientWrapper;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@ExtendWith({SpringExtension.class})\n+@SpringBootTest(classes = {ObjectStorePublishingConfig.class})\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+class ObjectStorePublishingConfigTest {\n+\n+ @MockBean\n+ private ObjectStoreClient objectStoreClient;\n+\n+ @Autowired\n+ private ThreadPoolTaskExecutor executor;\n+\n+ @Autowired\n+ private DistributionServiceConfig distributionServiceConfig;\n+\n+ @Test\n+ void testS3ClientWrapperInstantiation() {\n+ ObjectStorePublishingConfig config = new ObjectStorePublishingConfig();\n+ assertThat(config.createObjectStoreClient(distributionServiceConfig)).isInstanceOf(S3ClientWrapper.class);\n+ }\n+\n+ @Test\n+ void testThreadPoolExecutorPoolSize() {\n+ int expNumberOfThreads = distributionServiceConfig.getObjectStore().getMaxNumberOfS3Threads();\n+ assertThat(executor.getCorePoolSize()).isEqualTo(expNumberOfThreads);\n+ assertThat(executor.getMaxPoolSize()).isEqualTo(expNumberOfThreads);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherIntegrationTest.java\n@@ -21,10 +21,9 @@\n package app.coronawarn.server.services.distribution.objectstore;\n \n import static org.assertj.core.api.Assertions.assertThat;\n-import static org.mockito.Mockito.mock;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClientConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStorePublishingConfig;\n import app.coronawarn.server.services.distribution.objectstore.client.S3Object;\n import java.io.IOException;\n import java.nio.file.Path;\n@@ -37,11 +36,12 @@\n import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.boot.test.mock.mockito.MockBean;\n import org.springframework.core.io.ResourceLoader;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @ExtendWith(SpringExtension.class)\n-@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStoreClientConfig.class})\n+@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStorePublishingConfig.class, S3Publisher.class})\n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\n @Tag(\"s3-integration\")\n class S3PublisherIntegrationTest {\n@@ -54,12 +54,15 @@ class S3PublisherIntegrationTest {\n @Autowired\n private ResourceLoader resourceLoader;\n \n+ @MockBean\n+ private FailedObjectStoreOperationsCounter failedObjectStoreOperationsCounter;\n+\n+ @Autowired\n+ private S3Publisher s3Publisher;\n+\n @Test\n void publishTestFolderOk() throws IOException {\n- S3Publisher publisher = new S3Publisher(\n- getFolderAsPath(rootTestFolder), objectStoreAccess, mock(FailedObjectStoreOperationsCounter.class));\n-\n- publisher.publish();\n+ s3Publisher.publish(getFolderAsPath(rootTestFolder));\n List s3Objects = objectStoreAccess.getObjectsWithPrefix(\"version\");\n \n assertThat(s3Objects).hasSize(5);\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/S3PublisherTest.java\n@@ -20,26 +20,37 @@\n \n package app.coronawarn.server.services.distribution.objectstore;\n \n+import static org.assertj.core.util.Lists.emptyList;\n import static org.mockito.ArgumentMatchers.any;\n+import static org.mockito.Mockito.doAnswer;\n+import static org.mockito.Mockito.doReturn;\n+import static org.mockito.Mockito.doThrow;\n import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.spy;\n import static org.mockito.Mockito.times;\n import static org.mockito.Mockito.verify;\n import static org.mockito.Mockito.when;\n \n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import app.coronawarn.server.services.distribution.objectstore.client.S3Object;\n import java.io.IOException;\n+import java.nio.file.Path;\n import java.util.List;\n+import java.util.concurrent.ExecutionException;\n+import java.util.concurrent.Future;\n+import org.assertj.core.api.Assertions;\n+import org.junit.jupiter.api.BeforeEach;\n import org.junit.jupiter.api.Test;\n import org.junit.jupiter.api.extension.ExtendWith;\n import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.test.mock.mockito.MockBean;\n import org.springframework.core.io.ResourceLoader;\n+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @ExtendWith(SpringExtension.class)\n class S3PublisherTest {\n \n- private static final String PUBLISHING_PATH = \"testsetups/s3publishertest/topublish\";\n private static final S3Object FILE_1 = new S3Object(\"file1.txt\", \"cf7fb1ca5c32adc0941c35a6f7fc5eba\");\n private static final S3Object FILE_2 = new S3Object(\"file2.txt\", \"d882afb9fa9c26f7e9d0965b8faa79b8\");\n private static final S3Object FILE_3 = new S3Object(\"file3.txt\", \"0385524c9fdc83634467a11667c851ac\");\n@@ -47,14 +58,32 @@ class S3PublisherTest {\n @MockBean\n private ObjectStoreAccess objectStoreAccess;\n \n+ @MockBean\n+ private FailedObjectStoreOperationsCounter failedObjectStoreOperationsCounter;\n+\n @Autowired\n private ResourceLoader resourceLoader;\n \n+ private ThreadPoolTaskExecutor executor;\n+ private Path publishingPath;\n+ private S3Publisher s3Publisher;\n+\n+ @BeforeEach\n+ void setup() throws IOException {\n+ publishingPath = resourceLoader.getResource(\"testsetups/s3publishertest/topublish\").getFile().toPath();\n+ executor = new ThreadPoolTaskExecutor();\n+ executor.setMaxPoolSize(1);\n+ executor.setCorePoolSize(1);\n+ executor.initialize();\n+ executor = spy(executor);\n+ s3Publisher = new S3Publisher(objectStoreAccess, failedObjectStoreOperationsCounter, executor);\n+ }\n+\n @Test\n void allNewNoExisting() throws IOException {\n- when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(noneExisting());\n+ when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(emptyList());\n \n- createTestPublisher().publish();\n+ s3Publisher.publish(publishingPath);\n \n verify(objectStoreAccess, times(3)).putObject(any());\n }\n@@ -63,7 +92,7 @@ void allNewNoExisting() throws IOException {\n void noUploadsDueToAlreadyExist() throws IOException {\n when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(allExistAllSame());\n \n- createTestPublisher().publish();\n+ s3Publisher.publish(publishingPath);\n \n verify(objectStoreAccess, times(0)).putObject(any());\n }\n@@ -72,7 +101,7 @@ void noUploadsDueToAlreadyExist() throws IOException {\n void uploadAllOtherFilesDifferentNames() throws IOException {\n when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(otherExisting());\n \n- createTestPublisher().publish();\n+ s3Publisher.publish(publishingPath);\n \n verify(objectStoreAccess, times(3)).putObject(any());\n }\n@@ -81,28 +110,75 @@ void uploadAllOtherFilesDifferentNames() throws IOException {\n void uploadOneDueToOneChanged() throws IOException {\n when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(twoIdenticalOneOtherOneChange());\n \n- createTestPublisher().publish();\n+ s3Publisher.publish(publishingPath);\n \n verify(objectStoreAccess, times(1)).putObject(any());\n }\n \n- private List noneExisting() {\n- return List.of();\n+ @Test\n+ void executorGetsShutDown() throws IOException {\n+ when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(emptyList());\n+\n+ s3Publisher.publish(publishingPath);\n+\n+ verify(executor, times(1)).shutdown();\n+ }\n+\n+ @Test\n+ void taskExecutionHaltsWhenMaximumFailedOperationsReached() {\n+ when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(emptyList());\n+ setUpFailureThresholdExceededOnSecondUpload();\n+\n+ Assertions.assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3Publisher.publish(publishingPath));\n+\n+ // third invocation does not happen\n+ verify(objectStoreAccess, times(2)).putObject(any());\n+ }\n+\n+ @Test\n+ void threadPoolShutDownWhenMaximumFailedOperationsReached() {\n+ when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(emptyList());\n+ setUpFailureThresholdExceededOnSecondUpload();\n+\n+ Assertions.assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3Publisher.publish(publishingPath));\n+\n+ verify(executor, times(1)).shutdown();\n+ }\n+\n+ private void setUpFailureThresholdExceededOnSecondUpload() {\n+ doThrow(ObjectStoreOperationFailedException.class).when(objectStoreAccess).putObject(any());\n+ doAnswer(__ -> null)\n+ .doThrow(ObjectStoreOperationFailedException.class)\n+ .when(failedObjectStoreOperationsCounter)\n+ .incrementAndCheckThreshold(any(ObjectStoreOperationFailedException.class));\n+ }\n+\n+ @Test\n+ void interruptedExceptionHandling() throws ExecutionException, InterruptedException {\n+ var result = mock(Future.class);\n+ when(result.get()).thenThrow(new InterruptedException());\n+ doReturn(result).when(executor).submit(any(Runnable.class));\n+ when(objectStoreAccess.getObjectsWithPrefix(\"version\")).thenReturn(emptyList());\n+\n+ Assertions.assertThatExceptionOfType(ObjectStoreOperationFailedException.class)\n+ .isThrownBy(() -> s3Publisher.publish(publishingPath));\n+\n+ verify(executor, times(1)).shutdown();\n }\n \n private List otherExisting() {\n return List.of(\n new S3Object(\"some_old_file.txt\", \"1fb772815c837b6294d9f163db89e962\"),\n- new S3Object(\"other_old_file.txt\", \"2fb772815c837b6294d9f163db89e962\")\n- );\n+ new S3Object(\"other_old_file.txt\", \"2fb772815c837b6294d9f163db89e962\"));\n }\n \n private List allExistAllSame() {\n return List.of(\n FILE_1,\n FILE_2,\n- FILE_3\n- );\n+ FILE_3);\n }\n \n private List twoIdenticalOneOtherOneChange() {\n@@ -110,12 +186,6 @@ private List twoIdenticalOneOtherOneChange() {\n new S3Object(\"newfile.txt\", \"1fb772815c837b6294d9f163db89e962\"), // new\n FILE_1,\n FILE_2,\n- new S3Object(\"file3.txt\", \"111772815c837b6294d9f163db89e962\") // changed\n- );\n- }\n-\n- private S3Publisher createTestPublisher() throws IOException {\n- var publishPath = resourceLoader.getResource(PUBLISHING_PATH).getFile().toPath();\n- return new S3Publisher(publishPath, objectStoreAccess, mock(FailedObjectStoreOperationsCounter.class));\n+ new S3Object(\"file3.txt\", \"111772815c837b6294d9f163db89e962\")); // changed\n }\n }\ndiff --git a/services/distribution/src/test/resources/application.yaml b/services/distribution/src/test/resources/application.yaml\n--- a/services/distribution/src/test/resources/application.yaml\n+++ b/services/distribution/src/test/resources/application.yaml\n@@ -50,6 +50,7 @@ services:\n retry-attempts: 3\n retry-backoff: 1\n max-number-of-failed-operations: 5\n+ max-number-of-s3-threads: 2\n spring:\n main:\n banner-mode: off\n", "problem_statement": "S3Publisher: Increase performance\nThe S3Publisher is currently running in only one thread, making it quite slow for uploads/requests for metadata.\r\n\r\nEnhance the S3Publisher/ObjectStoreAccess, so that multiple threads are being used for interacting with S3.\n", "hints_text": "", "created_at": "2020-06-06T12:41:36Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 541, "instance_id": "corona-warn-app__cwa-server-541", "issue_numbers": ["482"], "base_commit": "27ba812e04d6f842e15999adfbe388137b0c316b", "patch": "diff --git a/README.md b/README.md\n--- a/README.md\n+++ b/README.md\n@@ -113,12 +113,14 @@ For the distribution module:\n ```bash\n POSTGRESQL_SERVICE_PORT=8001\n VAULT_FILESIGNING_SECRET=\n+SPRING_PROFILES_ACTIVE=signature-dev,disable-ssl-client-postgres\n ```\n \n For the submission module:\n \n ```bash\n POSTGRESQL_SERVICE_PORT=8001\n+SPRING_PROFILES_ACTIVE=disable-ssl-server,disable-ssl-client-postgres,disable-ssl-client-verification,disable-ssl-client-verification-verify-hostname\n ```\n \n #### Configure\n@@ -159,8 +161,8 @@ To be able to set breakpoints (e.g. in IntelliJ), it may be necessary to use the\n \n The API that is being exposed by the backend services is documented in an [OpenAPI](https://www.openapis.org/) specification. The specification files are available at the following locations:\n \n-Service | OpenAPI Specification\n--------------|-------------\n+Service | OpenAPI Specification\n+--------------------------|-------------\n Submission Service | [services/submission/api_v1.json](https://github.com/corona-warn-app/cwa-server/raw/master/services/submission/api_v1.json)\n Distribution Service | [services/distribution/api_v1.json](https://github.com/corona-warn-app/cwa-server/raw/master/services/distribution/api_v1.json)\n \n@@ -168,25 +170,26 @@ Distribution Service | [services/distribution/api_v1.json](https://github.c\n \n ### Distribution\n \n-Profile | Effect\n-----------------------|-------------\n-`dev` | Turns the log level to `DEBUG`.\n-`cloud` | Removes default values for the `datasource` and `objectstore` configurations.\n-`demo` | Includes incomplete days and hours into the distribution run, thus creating aggregates for the current day and the current hour (and including both in the respective indices). When running multiple distributions in one hour with this profile, the date aggregate for today and the hours aggregate for the current hour will be updated and overwritten. This profile also turns off the expiry policy (Keys must be expired for at least 2 hours before distribution) and the shifting policy (there must be at least 140 keys in a distribution).\n-`testdata` | Causes test data to be inserted into the database before each distribution run. By default, around 1000 random diagnosis keys will be generated per hour. If there are no diagnosis keys in the database yet, random keys will be generated for every hour from the beginning of the retention period (14 days ago at 00:00 UTC) until one hour before the present hour. If there are already keys in the database, the random keys will be generated for every hour from the latest diagnosis key in the database (by submission timestamp) until one hour before the present hour (or none at all, if the latest diagnosis key in the database was submitted one hour ago or later).\n-`signature-dev` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp-dev` so that the non-productive/test public key will be used for client-side validation.\n-`signature-prod` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp` so that the productive public key will be used for client-side validation.\n-`ssl-client-postgres` | Enforces SSL with a pinned certificate for the connection to the postgres (see [here](https://github.com/corona-warn-app/cwa-server/blob/master/services/distribution/src/main/resources/application-ssl-client-postgres.yaml)).\n+Profile | Effect\n+------------------------------|-------------\n+`dev` | Turns the log level to `DEBUG`.\n+`cloud` | Removes default values for the `datasource` and `objectstore` configurations.\n+`demo` | Includes incomplete days and hours into the distribution run, thus creating aggregates for the current day and the current hour (and including both in the respective indices). When running multiple distributions in one hour with this profile, the date aggregate for today and the hours aggregate for the current hour will be updated and overwritten. This profile also turns off the expiry policy (Keys must be expired for at least 2 hours before distribution) and the shifting policy (there must be at least 140 keys in a distribution).\n+`testdata` | Causes test data to be inserted into the database before each distribution run. By default, around 1000 random diagnosis keys will be generated per hour. If there are no diagnosis keys in the database yet, random keys will be generated for every hour from the beginning of the retention period (14 days ago at 00:00 UTC) until one hour before the present hour. If there are already keys in the database, the random keys will be generated for every hour from the latest diagnosis key in the database (by submission timestamp) until one hour before the present hour (or none at all, if the latest diagnosis key in the database was submitted one hour ago or later).\n+`signature-dev` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp-dev` so that the non-productive/test public key will be used for client-side validation.\n+`signature-prod` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp` so that the productive public key will be used for client-side validation.\n+`disable-ssl-client-postgres` | Disables SSL for the connection to the postgres database.\n \n ### Submission\n \n-Profile | Effect\n---------------------------|-------------\n-`dev` | Turns the log level to `DEBUG`.\n-`cloud` | Removes default values for the `datasource` configuration.\n-`ssl-server` | Enables SSL for the submission endpoint (see [here](https://github.com/corona-warn-app/cwa-server/blob/master/services/submission/src/main/resources/application-ssl-server.yaml)).\n-`ssl-client-postgres` | Enforces SSL with a pinned certificate for the connection to the postgres (see [here](https://github.com/corona-warn-app/cwa-server/blob/master/services/submission/src/main/resources/application-ssl-client-postgres.yaml)).\n-`ssl-client-verification` | Enforces SSL with a pinned certificate for the connection to the verification server (see [here](https://github.com/corona-warn-app/cwa-server/blob/master/services/submission/src/main/resources/application-ssl-client-verification.yaml)).\n+Profile | Effect\n+--------------------------------------------------|-------------\n+`dev` | Turns the log level to `DEBUG`.\n+`cloud` | Removes default values for the `datasource` configuration.\n+`disable-ssl-server` | Disables SSL for the submission endpoint.\n+`disable-ssl-client-postgres` | Disables SSL with a pinned certificate for the connection to the postgres database.\n+`disable-ssl-client-verification` | Disables SSL with a pinned certificate for the connection to the verification server.\n+`disable-ssl-client-verification-verify-hostname` | Disables the verification of the SSL hostname for the connection to the verification server.\n \n ## Documentation\n \ndiff --git a/docker-compose.yml b/docker-compose.yml\n--- a/docker-compose.yml\n+++ b/docker-compose.yml\n@@ -11,7 +11,7 @@ services:\n - \"8000:8080\"\n - \"8006:8081\"\n environment:\n- SPRING_PROFILES_ACTIVE: dev\n+ SPRING_PROFILES_ACTIVE: dev,disable-ssl-server,disable-ssl-client-postgres,disable-ssl-client-verification,disable-ssl-client-verification-verify-hostname\n POSTGRESQL_SERVICE_PORT: '5432'\n POSTGRESQL_SERVICE_HOST: postgres\n POSTGRESQL_DATABASE: ${POSTGRES_DB}\n@@ -29,7 +29,7 @@ services:\n - objectstore\n - create-bucket\n environment:\n- SPRING_PROFILES_ACTIVE: dev,signature-dev,testdata\n+ SPRING_PROFILES_ACTIVE: dev,signature-dev,testdata,disable-ssl-client-postgres\n POSTGRESQL_SERVICE_PORT: '5432'\n POSTGRESQL_SERVICE_HOST: postgres\n POSTGRESQL_DATABASE: ${POSTGRES_DB}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java\n@@ -21,6 +21,8 @@\n package app.coronawarn.server.services.distribution;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.util.Arrays;\n+import java.util.List;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n import org.springframework.boot.SpringApplication;\n@@ -28,7 +30,9 @@\n import org.springframework.boot.autoconfigure.domain.EntityScan;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.context.ApplicationContext;\n+import org.springframework.context.EnvironmentAware;\n import org.springframework.context.annotation.ComponentScan;\n+import org.springframework.core.env.Environment;\n import org.springframework.data.jpa.repository.config.EnableJpaRepositories;\n \n /**\n@@ -42,7 +46,7 @@\n @ComponentScan({\"app.coronawarn.server.common.persistence\",\n \"app.coronawarn.server.services.distribution\"})\n @EnableConfigurationProperties({DistributionServiceConfig.class})\n-public class Application {\n+public class Application implements EnvironmentAware {\n \n private static final Logger logger = LoggerFactory.getLogger(Application.class);\n \n@@ -58,4 +62,13 @@ public static void killApplication(ApplicationContext appContext) {\n logger.error(\"Application terminated abnormally.\");\n System.exit(1);\n }\n+\n+ @Override\n+ public void setEnvironment(Environment environment) {\n+ List profiles = Arrays.asList(environment.getActiveProfiles());\n+ if (profiles.contains(\"disable-ssl-client-postgres\")) {\n+ logger.warn(\"The distribution runner is started with postgres connection TLS disabled. \"\n+ + \"This should never be used in PRODUCTION!\");\n+ }\n+ }\n }\ndiff --git a/services/distribution/src/main/resources/application-cloud.yaml b/services/distribution/src/main/resources/application-cloud.yaml\n--- a/services/distribution/src/main/resources/application-cloud.yaml\n+++ b/services/distribution/src/main/resources/application-cloud.yaml\n@@ -5,7 +5,6 @@ spring:\n user: ${POSTGRESQL_USER_FLYWAY}\n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n username: ${POSTGRESQL_USER_DISTRIBUTION}\n password: ${POSTGRESQL_PASSWORD_DISTRIBUTION}\n \ndiff --git a/services/distribution/src/main/resources/application-disable-ssl-client-postgres.yaml b/services/distribution/src/main/resources/application-disable-ssl-client-postgres.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/application-disable-ssl-client-postgres.yaml\n@@ -0,0 +1,4 @@\n+---\n+spring:\n+ datasource:\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\ndiff --git a/services/distribution/src/main/resources/application-ssl-client-postgres.yaml b/services/distribution/src/main/resources/application-ssl-client-postgres.yaml\ndeleted file mode 100644\n--- a/services/distribution/src/main/resources/application-ssl-client-postgres.yaml\n+++ /dev/null\n@@ -1,4 +0,0 @@\n----\n-spring:\n- datasource:\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_SUBMISSION_CERTIFICATE_PATH}&sslkey=${SSL_SUBMISSION_PRIVATE_KEY_PATH}\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\n--- a/services/distribution/src/main/resources/application.yaml\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -68,6 +68,6 @@ spring:\n \n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_DISTRIBUTION_CERTIFICATE_PATH}&sslkey=${SSL_DISTRIBUTION_PRIVATE_KEY_PATH}\n username: ${POSTGRESQL_USER_DISTRIBUTION:local_setup_distribution}\n password: ${POSTGRESQL_PASSWORD_DISTRIBUTION:local_setup_distribution}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n@@ -22,13 +22,19 @@\n \n import io.micrometer.core.aop.TimedAspect;\n import io.micrometer.core.instrument.MeterRegistry;\n+import java.util.Arrays;\n+import java.util.List;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n import org.springframework.boot.SpringApplication;\n import org.springframework.boot.autoconfigure.SpringBootApplication;\n import org.springframework.boot.autoconfigure.domain.EntityScan;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.cloud.openfeign.EnableFeignClients;\n+import org.springframework.context.EnvironmentAware;\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.ComponentScan;\n+import org.springframework.core.env.Environment;\n import org.springframework.data.jpa.repository.config.EnableJpaRepositories;\n import org.springframework.http.converter.protobuf.ProtobufHttpMessageConverter;\n \n@@ -39,7 +45,13 @@\n \"app.coronawarn.server.services.submission\"})\n @EnableConfigurationProperties\n @EnableFeignClients\n-public class ServerApplication {\n+public class ServerApplication implements EnvironmentAware {\n+\n+ private static final Logger logger = LoggerFactory.getLogger(ServerApplication.class);\n+\n+ public static void main(String[] args) {\n+ SpringApplication.run(ServerApplication.class);\n+ }\n \n @Bean\n TimedAspect timedAspect(MeterRegistry registry) {\n@@ -51,7 +63,27 @@ ProtobufHttpMessageConverter protobufHttpMessageConverter() {\n return new ProtobufHttpMessageConverter();\n }\n \n- public static void main(String[] args) {\n- SpringApplication.run(ServerApplication.class);\n+ @Override\n+ public void setEnvironment(Environment environment) {\n+ List profiles = Arrays.asList(environment.getActiveProfiles());\n+ if (profiles.contains(\"disable-ssl-server\")) {\n+ logger.warn(\n+ \"The submission service is started with endpoint TLS disabled. This should never be used in PRODUCTION!\");\n+ }\n+ if (profiles.contains(\"disable-ssl-client-postgres\")) {\n+ logger.warn(\n+ \"The submission service is started with postgres connection TLS disabled. This should never be used in\"\n+ + \"PRODUCTION!\");\n+ }\n+ if (profiles.contains(\"disable-ssl-client-verification\")) {\n+ logger.warn(\n+ \"The submission service is started with verification service connection TLS disabled. This should never be\"\n+ + \"used in PRODUCTION!\");\n+ }\n+ if (profiles.contains(\"disable-ssl-client-verification-verify-hostname\")) {\n+ logger.warn(\n+ \"The submission service is started with verification service TLS hostname validation disabled. This should\"\n+ + \"never be used in PRODUCTION!\");\n+ }\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n@@ -20,6 +20,7 @@\n \n package app.coronawarn.server.services.submission.config;\n \n+import java.io.File;\n import org.springframework.boot.context.properties.ConfigurationProperties;\n import org.springframework.stereotype.Component;\n \n@@ -35,6 +36,7 @@ public class SubmissionServiceConfig {\n private Payload payload;\n private Verification verification;\n private Monitoring monitoring;\n+ private Client client;\n \n public Double getInitialFakeDelayMilliseconds() {\n return initialFakeDelayMilliseconds;\n@@ -142,4 +144,74 @@ public Long getMonitoringBatchSize() {\n public void setMonitoringBatchSize(Long batchSize) {\n this.monitoring.setBatchSize(batchSize);\n }\n+\n+ public Client getClient() {\n+ return client;\n+ }\n+\n+ public void setClient(Client client) {\n+ this.client = client;\n+ }\n+\n+ public static class Client {\n+\n+ private Ssl ssl;\n+\n+ public Ssl getSsl() {\n+ return ssl;\n+ }\n+\n+ public void setSsl(Ssl ssl) {\n+ this.ssl = ssl;\n+ }\n+\n+ public static class Ssl {\n+\n+ private File keyStore;\n+ private String keyStorePassword;\n+ private String keyPassword;\n+ private File trustStore;\n+ private String trustStorePassword;\n+\n+ public File getKeyStore() {\n+ return keyStore;\n+ }\n+\n+ public void setKeyStore(File keyStore) {\n+ this.keyStore = keyStore;\n+ }\n+\n+ public String getKeyStorePassword() {\n+ return keyStorePassword;\n+ }\n+\n+ public void setKeyStorePassword(String keyStorePassword) {\n+ this.keyStorePassword = keyStorePassword;\n+ }\n+\n+ public String getKeyPassword() {\n+ return keyPassword;\n+ }\n+\n+ public void setKeyPassword(String keyPassword) {\n+ this.keyPassword = keyPassword;\n+ }\n+\n+ public File getTrustStore() {\n+ return trustStore;\n+ }\n+\n+ public void setTrustStore(File trustStore) {\n+ this.trustStore = trustStore;\n+ }\n+\n+ public String getTrustStorePassword() {\n+ return trustStorePassword;\n+ }\n+\n+ public void setTrustStorePassword(String trustStorePassword) {\n+ this.trustStorePassword = trustStorePassword;\n+ }\n+ }\n+ }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java\n@@ -20,8 +20,11 @@\n \n package app.coronawarn.server.services.submission.verification;\n \n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig.Client.Ssl;\n import feign.Client;\n import feign.httpclient.ApacheHttpClient;\n+import java.io.File;\n import java.io.IOException;\n import java.security.GeneralSecurityException;\n import javax.net.ssl.SSLContext;\n@@ -33,19 +36,29 @@\n import org.springframework.cloud.commons.httpclient.DefaultApacheHttpClientFactory;\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.Profile;\n-import org.springframework.core.env.Environment;\n import org.springframework.stereotype.Component;\n-import org.springframework.util.ResourceUtils;\n \n @Component\n-@Profile(\"ssl-client-verification\")\n+@Profile(\"!disable-ssl-client-verification\")\n public class CloudFeignClientProvider implements FeignClientProvider {\n \n- private final Environment environment;\n private final HostnameVerifierProvider hostnameVerifierProvider;\n+ private final File keyStore;\n+ private final String keyStorePassword;\n+ private final String keyPassword;\n+ private final File trustStore;\n+ private final String trustStorePassword;\n \n- public CloudFeignClientProvider(Environment environment, HostnameVerifierProvider hostnameVerifierProvider) {\n- this.environment = environment;\n+ /**\n+ * Creates a {@link CloudFeignClientProvider} that provides feign clients with fixed key and trust material.\n+ */\n+ public CloudFeignClientProvider(SubmissionServiceConfig config, HostnameVerifierProvider hostnameVerifierProvider) {\n+ Ssl sslConfig = config.getClient().getSsl();\n+ this.keyStore = sslConfig.getKeyStore();\n+ this.keyStorePassword = sslConfig.getKeyStorePassword();\n+ this.keyPassword = sslConfig.getKeyPassword();\n+ this.trustStore = sslConfig.getTrustStore();\n+ this.trustStorePassword = sslConfig.getTrustStorePassword();\n this.hostnameVerifierProvider = hostnameVerifierProvider;\n }\n \n@@ -56,18 +69,10 @@ public Client createFeignClient() {\n \n private SSLContext getSslContext() {\n try {\n- String keyStorePath = environment.getProperty(\"client.ssl.key-store\");\n- String keyStorePassword = environment.getProperty(\"client.ssl.key-store-password\");\n- String keyPassword = environment.getProperty(\"client.ssl.key-password\");\n-\n- String trustStorePath = environment.getProperty(\"client.ssl.verification.trust-store\");\n- String trustStorePassword = environment.getProperty(\"client.ssl.verification.trust-store-password\");\n-\n return SSLContextBuilder\n .create()\n- .loadKeyMaterial(ResourceUtils.getFile(keyStorePath), keyStorePassword.toCharArray(),\n- keyPassword.toCharArray())\n- .loadTrustMaterial(ResourceUtils.getFile(trustStorePath), trustStorePassword.toCharArray())\n+ .loadKeyMaterial(this.keyStore, this.keyStorePassword.toCharArray(), this.keyPassword.toCharArray())\n+ .loadTrustMaterial(this.trustStore, this.trustStorePassword.toCharArray())\n .build();\n } catch (IOException | GeneralSecurityException e) {\n throw new RuntimeException(e);\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java\n@@ -26,7 +26,7 @@\n import org.springframework.stereotype.Component;\n \n @Component\n-@Profile(\"ssl-client-verification-verify-hostname\")\n+@Profile(\"!disable-ssl-client-verification-verify-hostname\")\n public class DefaultHostnameVerifierProvider implements HostnameVerifierProvider {\n \n @Override\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java\n@@ -32,9 +32,15 @@\n import org.springframework.stereotype.Component;\n \n @Component\n-@Profile(\"!ssl-client-verification\")\n+@Profile(\"disable-ssl-client-verification\")\n public class DevelopmentFeignClientProvider implements FeignClientProvider {\n \n+ private final HostnameVerifierProvider hostnameVerifierProvider;\n+\n+ public DevelopmentFeignClientProvider(HostnameVerifierProvider hostnameVerifierProvider) {\n+ this.hostnameVerifierProvider = hostnameVerifierProvider;\n+ }\n+\n @Override\n public Client createFeignClient() {\n return new ApacheHttpClient(createHttpClientFactory().createBuilder().build());\n@@ -45,7 +51,8 @@ public Client createFeignClient() {\n */\n @Bean\n public ApacheHttpClientFactory createHttpClientFactory() {\n- return new DefaultApacheHttpClientFactory(HttpClientBuilder.create());\n+ return new DefaultApacheHttpClientFactory(HttpClientBuilder.create()\n+ .setSSLHostnameVerifier(this.hostnameVerifierProvider.createHostnameVerifier()));\n }\n \n @Bean\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java\n@@ -26,7 +26,7 @@\n import org.springframework.stereotype.Component;\n \n @Component\n-@Profile(\"!ssl-client-verification-verify-hostname\")\n+@Profile(\"disable-ssl-client-verification-verify-hostname\")\n public class NoopHostnameVerifierProvider implements HostnameVerifierProvider {\n \n @Override\ndiff --git a/services/submission/src/main/resources/application-cloud.yaml b/services/submission/src/main/resources/application-cloud.yaml\n--- a/services/submission/src/main/resources/application-cloud.yaml\n+++ b/services/submission/src/main/resources/application-cloud.yaml\n@@ -5,7 +5,6 @@ spring:\n user: ${POSTGRESQL_USER_FLYWAY}\n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n username: ${POSTGRESQL_USER_SUBMISSION}\n password: ${POSTGRESQL_PASSWORD_SUBMISSION}\n \ndiff --git a/services/submission/src/main/resources/application-disable-ssl-client-postgres.yaml b/services/submission/src/main/resources/application-disable-ssl-client-postgres.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application-disable-ssl-client-postgres.yaml\n@@ -0,0 +1,4 @@\n+---\n+spring:\n+ datasource:\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\ndiff --git a/services/submission/src/main/resources/application-disable-ssl-server.yaml b/services/submission/src/main/resources/application-disable-ssl-server.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application-disable-ssl-server.yaml\n@@ -0,0 +1,4 @@\n+---\n+server:\n+ ssl:\n+ enabled: false\ndiff --git a/services/submission/src/main/resources/application-ssl-client-postgres.yaml b/services/submission/src/main/resources/application-ssl-client-postgres.yaml\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-ssl-client-postgres.yaml\n+++ /dev/null\n@@ -1,4 +0,0 @@\n----\n-spring:\n- datasource:\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_SUBMISSION_CERTIFICATE_PATH}&sslkey=${SSL_SUBMISSION_PRIVATE_KEY_PATH}\ndiff --git a/services/submission/src/main/resources/application-ssl-client-verification.yaml b/services/submission/src/main/resources/application-ssl-client-verification.yaml\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-ssl-client-verification.yaml\n+++ /dev/null\n@@ -1,9 +0,0 @@\n----\n-client:\n- ssl:\n- key-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- key-store: ${SSL_SUBMISSION_KEYSTORE_PATH}\n- key-store-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- verification:\n- trust-store: ${SSL_VERIFICATION_TRUSTSTORE_PATH}\n- trust-store-password: ${SSL_VERIFICATION_TRUSTSTORE_PASSWORD}\ndiff --git a/services/submission/src/main/resources/application-ssl-server.yaml b/services/submission/src/main/resources/application-ssl-server.yaml\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-ssl-server.yaml\n+++ /dev/null\n@@ -1,23 +0,0 @@\n----\n-server:\n- ssl:\n- enabled: true\n- enabled-protocols: TLSv1.2,TLSv1.3\n- protocol: TLS\n- ciphers: >-\n- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256\n- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384\n- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256\n- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384\n- TLS_AES_128_GCM_SHA256\n- TLS_AES_256_GCM_SHA384\n- TLS_AES_128_CCM_SHA256\n- key-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- key-store: ${SSL_SUBMISSION_KEYSTORE_PATH}\n- key-store-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- key-store-provider: SUN\n- key-store-type: JKS\ndiff --git a/services/submission/src/main/resources/application.yaml b/services/submission/src/main/resources/application.yaml\n--- a/services/submission/src/main/resources/application.yaml\n+++ b/services/submission/src/main/resources/application.yaml\n@@ -32,7 +32,7 @@ spring:\n # Postgres configuration\n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_SUBMISSION_CERTIFICATE_PATH}&sslkey=${SSL_SUBMISSION_PRIVATE_KEY_PATH}\n username: ${POSTGRESQL_USER_SUBMISSION:local_setup_submission}\n password: ${POSTGRESQL_PASSWORD_SUBMISSION:local_setup_submission}\n \n@@ -64,4 +64,4 @@ management:\n feign:\n httpclient:\n maxConnections: 200\n- maxConnectionsPerRoute: 200\n+ maxConnectionsPerRoute: 200\n\\ No newline at end of file\n", "test_patch": "diff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/ServerApplicationTests.java\n@@ -28,8 +28,10 @@\n import org.springframework.boot.test.context.SpringBootTest;\n import org.springframework.boot.test.mock.mockito.MockBean;\n import org.springframework.boot.test.web.client.TestRestTemplate;\n+import org.springframework.test.context.ActiveProfiles;\n \n @SpringBootTest\n+@ActiveProfiles({ \"disable-ssl-client-verification\", \"disable-ssl-client-verification-verify-hostname\" })\n class ServerApplicationTests {\n \n @Autowired\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/PayloadValidationTest.java\n@@ -44,8 +44,10 @@\n import org.springframework.boot.test.context.SpringBootTest;\n import org.springframework.boot.test.mock.mockito.MockBean;\n import org.springframework.http.ResponseEntity;\n+import org.springframework.test.context.ActiveProfiles;\n \n @SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n+@ActiveProfiles({\"disable-ssl-client-verification\", \"disable-ssl-client-verification-verify-hostname\"})\n class PayloadValidationTest {\n \n @MockBean\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n@@ -73,8 +73,10 @@\n import org.springframework.http.HttpMethod;\n import org.springframework.http.HttpStatus;\n import org.springframework.http.ResponseEntity;\n+import org.springframework.test.context.ActiveProfiles;\n \n @SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n+@ActiveProfiles({ \"disable-ssl-client-verification\", \"disable-ssl-client-verification-verify-hostname\" })\n class SubmissionControllerTest {\n \n private static final URI SUBMISSION_URL = URI.create(\"/version/v1/diagnosis-keys\");\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/VerificationServiceHealthIndicatorTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/VerificationServiceHealthIndicatorTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/VerificationServiceHealthIndicatorTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/VerificationServiceHealthIndicatorTest.java\n@@ -32,14 +32,15 @@\n import org.springframework.beans.factory.annotation.Autowired;\n import org.springframework.boot.test.context.SpringBootTest;\n import org.springframework.boot.test.mock.mockito.MockBean;\n+import org.springframework.test.context.ActiveProfiles;\n import org.springframework.test.context.TestPropertySource;\n import org.springframework.test.web.servlet.MockMvc;\n import org.springframework.test.web.servlet.setup.MockMvcBuilders;\n import org.springframework.web.context.WebApplicationContext;\n \n-\n @TestPropertySource(properties = {\"management.port=\"})\n @SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n+@ActiveProfiles({ \"disable-ssl-client-verification\", \"disable-ssl-client-verification-verify-hostname\" })\n class VerificationServiceHealthIndicatorTest {\n \n @MockBean\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/verification/TanVerifierTest.java\n@@ -20,7 +20,6 @@\n \n package app.coronawarn.server.services.submission.verification;\n \n-\n import static com.github.tomakehurst.wiremock.client.WireMock.aResponse;\n import static com.github.tomakehurst.wiremock.client.WireMock.equalTo;\n import static com.github.tomakehurst.wiremock.client.WireMock.matchingJsonPath;\n@@ -49,11 +48,11 @@\n import org.springframework.http.MediaType;\n import org.springframework.test.context.ActiveProfiles;\n \n-@SpringBootTest(classes = {TanVerifier.class, DevelopmentFeignClientProvider.class})\n+@SpringBootTest(classes = {TanVerifier.class, DevelopmentFeignClientProvider.class, NoopHostnameVerifierProvider.class})\n @ImportAutoConfiguration({FeignAutoConfiguration.class, FeignTestConfiguration.class})\n @EnableConfigurationProperties(value = SubmissionServiceConfig.class)\n @EnableFeignClients\n-@ActiveProfiles(\"feign\")\n+@ActiveProfiles({ \"feign\", \"disable-ssl-client-verification\", \"disable-ssl-client-verification-verify-hostname\" })\n class TanVerifierTest {\n \n @Autowired\n", "problem_statement": "SSL: Set a profile to willingly decrease security\nCurrently, we have the profiles `ssl-server`, `ssl-client-verification` and `ssl-client-postgres` which will enable `ssl` for certain situations. \r\n\r\nIn context of secure-by-default, we should have it in the opposite way - you can set a profile to willingly decrease security.\n", "hints_text": "", "created_at": "2020-06-11T13:35:23Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 551, "instance_id": "corona-warn-app__cwa-server-551", "issue_numbers": ["548", "546"], "base_commit": "39cf982dab39722accf5cbb2cc6f2c6ef15c8456", "patch": "diff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n@@ -116,13 +116,13 @@ public void setPath(String path) {\n }\n \n private static class Monitoring {\n- private Integer batchSize;\n+ private Long batchSize;\n \n- public Integer getBatchSize() {\n+ public Long getBatchSize() {\n return batchSize;\n }\n \n- public void setBatchSize(Integer batchSize) {\n+ public void setBatchSize(Long batchSize) {\n this.batchSize = batchSize;\n }\n }\n@@ -135,11 +135,11 @@ public void setMonitoring(Monitoring monitoring) {\n this.monitoring = monitoring;\n }\n \n- public Integer getMonitoringBatchSize() {\n+ public Long getMonitoringBatchSize() {\n return this.monitoring.getBatchSize();\n }\n \n- public void setMonitoringBatchSize(Integer batchSize) {\n+ public void setMonitoringBatchSize(Long batchSize) {\n this.monitoring.setBatchSize(batchSize);\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java\n@@ -22,6 +22,7 @@\n \n import io.micrometer.core.instrument.Counter;\n import io.micrometer.core.instrument.MeterRegistry;\n+import java.util.concurrent.atomic.AtomicLong;\n \n /**\n * Batch counter for counting requests for monitoring. Counts up in batches, given batch size. This way, single requests\n@@ -33,11 +34,11 @@ public class BatchCounter {\n private static final String SUBMISSION_CONTROLLER_REQUESTS_COUNTER_DESCRIPTION\n = \"Counts requests to the Submission Controller.\";\n \n- private final int batchSize;\n+ private final long batchSize;\n private final Counter counter;\n- private Double batch = 0.;\n+ private final AtomicLong count = new AtomicLong(0L);\n \n- BatchCounter(MeterRegistry meterRegistry, int batchSize, String type) {\n+ BatchCounter(MeterRegistry meterRegistry, long batchSize, String type) {\n this.batchSize = batchSize;\n counter = Counter.builder(SUBMISSION_CONTROLLER_REQUESTS_COUNTER_NAME)\n .tag(\"type\", type)\n@@ -50,11 +51,8 @@ public class BatchCounter {\n * counter is incremented.\n */\n public void increment() {\n- if (batch < batchSize) {\n- batch++;\n- } else {\n- counter.increment(batch);\n- batch = 1.;\n+ if (0 == count.incrementAndGet() % batchSize) {\n+ counter.increment(batchSize);\n }\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java\n@@ -38,7 +38,7 @@ public class SubmissionControllerMonitor {\n \n private final MeterRegistry meterRegistry;\n \n- private final Integer batchSize;\n+ private final long batchSize;\n private BatchCounter requests;\n private BatchCounter realRequests;\n private BatchCounter fakeRequests;\n", "test_patch": "diff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/BatchCounterTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/BatchCounterTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/monitoring/BatchCounterTest.java\n@@ -0,0 +1,64 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.monitoring;\n+\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.never;\n+import static org.mockito.Mockito.spy;\n+import static org.mockito.Mockito.times;\n+import static org.mockito.Mockito.verify;\n+\n+import io.micrometer.core.instrument.Counter;\n+import io.micrometer.core.instrument.MeterRegistry;\n+import io.micrometer.core.instrument.MeterRegistryMock;\n+import java.util.stream.LongStream;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.ValueSource;\n+\n+class BatchCounterTest {\n+\n+ private static final String COUNTER_TYPE = \"FooCounter\";\n+ private MeterRegistry meterRegistry;\n+ private Counter meterCounter;\n+\n+ @BeforeEach\n+ void setUpCounter() {\n+ meterCounter = mock(Counter.class);\n+ meterRegistry = spy(new MeterRegistryMock(meterCounter));\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {1L, 2L, 4L})\n+ void incrementSubmittedOnceIfBatchSizeReached(long batchSize) {\n+ BatchCounter batchCounter = new BatchCounter(meterRegistry, batchSize, COUNTER_TYPE);\n+ LongStream.range(0, batchSize).forEach(__ -> batchCounter.increment());\n+ verify(meterCounter, times(1)).increment(batchSize);\n+ }\n+\n+ @ParameterizedTest\n+ @ValueSource(longs = {2L, 4L, 7L})\n+ void doesNotIncrementIfLesserThanBatchSize(long batchSize) {\n+ BatchCounter batchCounter = new BatchCounter(meterRegistry, batchSize, COUNTER_TYPE);\n+ LongStream.range(0, batchSize - 1).forEach(__ -> batchCounter.increment());\n+ verify(meterCounter, never()).increment(batchSize);\n+ }\n+}\ndiff --git a/services/submission/src/test/java/io/micrometer/core/instrument/MeterRegistryMock.java b/services/submission/src/test/java/io/micrometer/core/instrument/MeterRegistryMock.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/io/micrometer/core/instrument/MeterRegistryMock.java\n@@ -0,0 +1,40 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package io.micrometer.core.instrument;\n+\n+import io.micrometer.core.instrument.simple.SimpleMeterRegistry;\n+\n+/**\n+ * Used to get access to the {@link Counter} instance in BatchCounterTest.\n+ */\n+public class MeterRegistryMock extends SimpleMeterRegistry {\n+\n+ final Counter counter;\n+\n+ public MeterRegistryMock(Counter counter) {\n+ this.counter = counter;\n+ }\n+\n+ @Override\n+ Counter counter(Meter.Id id) {\n+ return counter;\n+ }\n+}\n", "problem_statement": "BatchCounter uses Double for counting\n## Describe the bug\r\n\r\nBatchCounter uses `double` for integer arithmetics, which is commonly discouraged.\r\n\r\n## Expected behaviour\r\n\r\nBatchCounter uses `int` for counting up to `batchSize`, since `batchSize` is also of type `int`.\r\nIt's faster.\r\nIn theory it's more accurate. (In practice there is no difference in this case since the maximum value that is representable in a double is larger than `Integer.MAX_VALUE`. But for `long` instead of `int`, there would be a difference.)\r\n\r\n## Possible Fix\r\n\r\n~~~java\r\nprivate int batch;\r\n~~~\r\n\r\nWhile here, `batch` should be renamed to `batchCount` to better express its actual meaning.\nBatchCounter is not thread-safe\n## Describe the bug\r\n\r\nWhen multiple threads call `BatchCounter.increment` at the same time, the resulting count is unspecified.\r\n\r\n## Expected behaviour\r\n\r\n`synchronized void increment`\r\n\r\n## Steps to reproduce the issue\r\n\r\nCall `BatchCounter` from several threads at the same time.\r\n\r\n## Possible Fix\r\n\r\nAdd `synchronized`.\n", "hints_text": "\n", "created_at": "2020-06-11T18:31:41Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 572, "instance_id": "corona-warn-app__cwa-server-572", "issue_numbers": ["562"], "base_commit": "97f16ca7b711a30eec695c1ae7a6f032df16533b", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n@@ -20,9 +20,11 @@\n \n package app.coronawarn.server.services.distribution.objectstore.client;\n \n+import static java.lang.Boolean.TRUE;\n import static java.util.stream.Collectors.toList;\n \n import java.nio.file.Path;\n+import java.util.ArrayList;\n import java.util.Collection;\n import java.util.List;\n import java.util.Map;\n@@ -78,13 +80,20 @@ public boolean bucketExists(String bucketName) {\n backoff = @Backoff(delayExpression = \"${services.distribution.objectstore.retry-backoff}\"))\n public List getObjects(String bucket, String prefix) {\n logRetryStatus(\"object download\");\n-\n- ListObjectsV2Response response =\n- s3Client.listObjectsV2(ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).build());\n-\n- return response.contents().stream()\n- .map(s3Object -> buildS3Object(s3Object, bucket))\n- .collect(toList());\n+ List allS3Objects = new ArrayList<>();\n+ String continuationToken = null;\n+\n+ do {\n+ ListObjectsV2Request request =\n+ ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).continuationToken(continuationToken).build();\n+ ListObjectsV2Response response = s3Client.listObjectsV2(request);\n+ response.contents().stream()\n+ .map(s3Object -> buildS3Object(s3Object, bucket))\n+ .forEach(allS3Objects::add);\n+ continuationToken = TRUE.equals(response.isTruncated()) ? response.continuationToken() : null;\n+ } while (continuationToken != null);\n+\n+ return allS3Objects;\n }\n \n @Recover\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapperTest.java\n@@ -150,6 +150,25 @@ void testGetObjects(List expResult) {\n assertThat(actResult).isEqualTo(expResult);\n }\n \n+ @Test\n+ void testContinuationToken() {\n+ var continuationToken = \"1ueGcxLPRx1Tr/XYExHnhbYLgveDs2J/wm36Hy4vbOwM=<\";\n+\n+ when(s3Client.listObjectsV2(any(ListObjectsV2Request.class)))\n+ .thenReturn(ListObjectsV2Response.builder().isTruncated(true).continuationToken(continuationToken).build(),\n+ ListObjectsV2Response.builder().isTruncated(false).build());\n+\n+ s3ClientWrapper.getObjects(VALID_BUCKET_NAME, VALID_PREFIX);\n+\n+ ListObjectsV2Request continuationRequest = ListObjectsV2Request.builder()\n+ .prefix(VALID_PREFIX).bucket(VALID_BUCKET_NAME).continuationToken(continuationToken).build();\n+ ListObjectsV2Request noContinuationRequest = ListObjectsV2Request.builder()\n+ .prefix(VALID_PREFIX).bucket(VALID_BUCKET_NAME).build();\n+\n+ verify(s3Client, times(1)).listObjectsV2(eq(continuationRequest));\n+ verify(s3Client, times(1)).listObjectsV2(eq(noContinuationRequest));\n+ }\n+\n private static Stream createGetObjectsResults() {\n return Stream.of(\n Lists.emptyList(),\n", "problem_statement": "S3ClientWrapper getObjects: Not all objects could be received\n\r\n\r\n## Describe the bug\r\n\r\nhttps://github.com/corona-warn-app/cwa-server/blob/a953c054f8b4dc97d6a40525c5c3d5aa4d867394/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java#L83\r\n\r\nIt is possible that not all objects are received, because the **listObjectsV2(ListObjectsV2Request listObjectsV2Request)** method limits them up to 1000.\r\n\r\nJavadoc [listObjectsV2](https://sdk.amazonaws.com/java/api/latest/software/amazon/awssdk/services/s3/S3Client.html#listObjectsV2-software.amazon.awssdk.services.s3.model.ListObjectsV2Request-)\r\n> Returns some or all (up to 1,000) of the objects in a bucket.\r\n\r\n## Possible Fix\r\n\r\n1. Checking the response for more data with the **isTruncated** method.\r\nJavaDoc [isTruncated](https://sdk.amazonaws.com/java/api/latest/software/amazon/awssdk/services/s3/model/ListObjectsV2Response.html#isTruncated--)\r\n> Set to false if all of the results were returned. Set to true if more keys are available to return. If the number of results exceeds that specified by MaxKeys, all of the results might not be returned.\r\n2. When the response is truncated, calling the **nextContinuationToken** method for the next token.\r\nJavaDoc [nextContinuationToken](https://sdk.amazonaws.com/java/api/latest/software/amazon/awssdk/services/s3/model/ListObjectsV2Response.html#nextContinuationToken--)\r\n\r\n> NextContinuationToken is sent when isTruncated is true, which means there are more keys in the bucket that can be listed. The next list requests to Amazon S3 can be continued with this NextContinuationToken.\r\n\r\n3. Build a new ListObjectsV2Request with the **continuationToken** and call **listObjectsV2** again\r\nJavaDoc [continuationToken](https://sdk.amazonaws.com/java/api/latest/software/amazon/awssdk/services/s3/model/ListObjectsV2Request.Builder.html#continuationToken-java.lang.String-)\r\n\r\n> ContinuationToken indicates Amazon S3 that the list is being continued on this bucket with a token. ContinuationToken is obfuscated and is not a real key.\r\n\r\n4. Repeat everything until isTruncate is false.\r\n\r\nHere is a pretty good example from AWS. They use a different S3Client, but it is very similar to the one you use. ([source](https://docs.aws.amazon.com/AmazonS3/latest/dev/ListingObjectKeysUsingJava.html))\r\n\r\n```java\r\nimport com.amazonaws.AmazonServiceException;\r\nimport com.amazonaws.SdkClientException;\r\nimport com.amazonaws.auth.profile.ProfileCredentialsProvider;\r\nimport com.amazonaws.regions.Regions;\r\nimport com.amazonaws.services.s3.AmazonS3;\r\nimport com.amazonaws.services.s3.AmazonS3ClientBuilder;\r\nimport com.amazonaws.services.s3.model.ListObjectsV2Request;\r\nimport com.amazonaws.services.s3.model.ListObjectsV2Result;\r\nimport com.amazonaws.services.s3.model.S3ObjectSummary;\r\n\r\nimport java.io.IOException;\r\n\r\npublic class ListKeys {\r\n\r\n public static void main(String[] args) throws IOException {\r\n Regions clientRegion = Regions.DEFAULT_REGION;\r\n String bucketName = \"*** Bucket name ***\";\r\n\r\n try {\r\n AmazonS3 s3Client = AmazonS3ClientBuilder.standard()\r\n .withCredentials(new ProfileCredentialsProvider())\r\n .withRegion(clientRegion)\r\n .build();\r\n\r\n System.out.println(\"Listing objects\");\r\n\r\n // maxKeys is set to 2 to demonstrate the use of\r\n // ListObjectsV2Result.getNextContinuationToken()\r\n ListObjectsV2Request req = new ListObjectsV2Request().withBucketName(bucketName).withMaxKeys(2);\r\n ListObjectsV2Result result;\r\n\r\n do {\r\n result = s3Client.listObjectsV2(req);\r\n\r\n for (S3ObjectSummary objectSummary : result.getObjectSummaries()) {\r\n System.out.printf(\" - %s (size: %d)\\n\", objectSummary.getKey(), objectSummary.getSize());\r\n }\r\n // If there are more than maxKeys keys in the bucket, get a continuation token\r\n // and list the next objects.\r\n String token = result.getNextContinuationToken();\r\n System.out.println(\"Next Continuation Token: \" + token);\r\n req.setContinuationToken(token);\r\n } while (result.isTruncated());\r\n } catch (AmazonServiceException e) {\r\n // The call was transmitted successfully, but Amazon S3 couldn't process \r\n // it, so it returned an error response.\r\n e.printStackTrace();\r\n } catch (SdkClientException e) {\r\n // Amazon S3 couldn't be contacted for a response, or the client\r\n // couldn't parse the response from Amazon S3.\r\n e.printStackTrace();\r\n }\r\n }\r\n}\r\n``\n", "hints_text": "", "created_at": "2020-06-13T13:23:53Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 573, "instance_id": "corona-warn-app__cwa-server-573", "issue_numbers": ["557"], "base_commit": "670560bd755a94fe8cf7dfea5bba13c9b64858ed", "patch": "diff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n@@ -24,6 +24,7 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.Builder;\n import app.coronawarn.server.common.persistence.domain.validation.ValidRollingStartIntervalNumber;\n+import app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestamp;\n import java.time.Instant;\n import java.time.LocalDateTime;\n import java.util.Arrays;\n@@ -70,6 +71,7 @@ public class DiagnosisKey {\n @Range(min = 0, max = 8, message = \"Risk level must be between 0 and 8.\")\n private int transmissionRiskLevel;\n \n+ @ValidSubmissionTimestamp\n private long submissionTimestamp;\n \n protected DiagnosisKey() {\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n@@ -24,6 +24,7 @@\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.FinalBuilder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.RollingStartIntervalNumberBuilder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.TransmissionRiskLevelBuilder;\n+import static app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestampValidator.SECONDS_PER_HOUR;\n \n import app.coronawarn.server.common.persistence.exception.InvalidDiagnosisKeyException;\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n@@ -47,7 +48,7 @@ public class DiagnosisKeyBuilder implements\n private int rollingStartIntervalNumber;\n private int rollingPeriod = DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n private int transmissionRiskLevel;\n- private long submissionTimestamp = -1L;\n+ private Long submissionTimestamp = null;\n \n DiagnosisKeyBuilder() {\n }\n@@ -93,9 +94,9 @@ public FinalBuilder withRollingPeriod(int rollingPeriod) {\n \n @Override\n public DiagnosisKey build() {\n- if (submissionTimestamp < 0) {\n+ if (submissionTimestamp == null) {\n // hours since epoch\n- submissionTimestamp = Instant.now().getEpochSecond() / 3600L;\n+ submissionTimestamp = Instant.now().getEpochSecond() / SECONDS_PER_HOUR;\n }\n \n var diagnosisKey = new DiagnosisKey(\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestamp.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestamp.java\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestamp.java\n@@ -0,0 +1,58 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.common.persistence.domain.validation;\n+\n+import java.lang.annotation.Documented;\n+import java.lang.annotation.ElementType;\n+import java.lang.annotation.Retention;\n+import java.lang.annotation.RetentionPolicy;\n+import java.lang.annotation.Target;\n+import javax.validation.Constraint;\n+import javax.validation.Payload;\n+\n+@Constraint(validatedBy = ValidSubmissionTimestampValidator.class)\n+@Target({ElementType.FIELD})\n+@Retention(RetentionPolicy.RUNTIME)\n+@Documented\n+public @interface ValidSubmissionTimestamp {\n+\n+ /**\n+ * Error message.\n+ *\n+ * @return the error message\n+ */\n+ String message() default \"Submission timestamp (hours since epoch)\"\n+ + \" must be greater or equal 0 and cannot be in the future.\";\n+\n+ /**\n+ * Groups.\n+ *\n+ * @return\n+ */\n+ Class>[] groups() default {};\n+\n+ /**\n+ * Payload.\n+ *\n+ * @return\n+ */\n+ Class extends Payload>[] payload() default {};\n+}\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestampValidator.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestampValidator.java\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestampValidator.java\n@@ -0,0 +1,38 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.common.persistence.domain.validation;\n+\n+import java.time.Instant;\n+import java.util.concurrent.TimeUnit;\n+import javax.validation.ConstraintValidator;\n+import javax.validation.ConstraintValidatorContext;\n+\n+public class ValidSubmissionTimestampValidator\n+ implements ConstraintValidator {\n+\n+ public static final long SECONDS_PER_HOUR = TimeUnit.HOURS.toSeconds(1);\n+\n+ @Override\n+ public boolean isValid(Long submissionTimestamp, ConstraintValidatorContext constraintValidatorContext) {\n+ long currentHoursSinceEpoch = Instant.now().getEpochSecond() / SECONDS_PER_HOUR;\n+ return submissionTimestamp >= 0L && submissionTimestamp <= currentHoursSinceEpoch;\n+ }\n+}\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyService.java\n@@ -20,6 +20,7 @@\n \n package app.coronawarn.server.common.persistence.service;\n \n+import static app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestampValidator.SECONDS_PER_HOUR;\n import static java.time.ZoneOffset.UTC;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n@@ -109,7 +110,7 @@ public void applyRetentionPolicy(int daysToRetain) {\n long threshold = LocalDateTime\n .ofInstant(Instant.now(), UTC)\n .minusDays(daysToRetain)\n- .toEpochSecond(UTC) / 3600L;\n+ .toEpochSecond(UTC) / SECONDS_PER_HOUR;\n int numberOfDeletions = keyRepository.deleteBySubmissionTimestampIsLessThanEqual(threshold);\n logger.info(\"Deleted {} diagnosis key(s) with a submission timestamp older than {} day(s) ago.\",\n numberOfDeletions, daysToRetain);\n", "test_patch": "diff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n@@ -20,6 +20,8 @@\n \n package app.coronawarn.server.common.persistence.domain;\n \n+import static app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestampValidator.SECONDS_PER_HOUR;\n+import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.buildDiagnosisKeyForSubmissionTimestamp;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatCode;\n import static org.assertj.core.api.Assertions.catchThrowable;\n@@ -28,6 +30,7 @@\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n import com.google.protobuf.ByteString;\n import java.nio.charset.StandardCharsets;\n+import java.time.Duration;\n import java.time.Instant;\n import java.time.LocalDate;\n import java.time.ZoneOffset;\n@@ -189,6 +192,33 @@ void keyDataDoesNotThrowOnValid() {\n .doesNotThrowAnyException();\n }\n \n+ @ParameterizedTest\n+ @ValueSource(longs = {-1L, Long.MAX_VALUE})\n+ void submissionTimestampMustBeValid(long submissionTimestamp) {\n+ assertThat(\n+ catchThrowable(() -> buildDiagnosisKeyForSubmissionTimestamp(submissionTimestamp)))\n+ .isInstanceOf(InvalidDiagnosisKeyException.class);\n+ }\n+\n+ @Test\n+ void submissionTimestampMustNotBeInTheFuture() {\n+ assertThat(catchThrowable(\n+ () -> buildDiagnosisKeyForSubmissionTimestamp(getCurrentHoursSinceEpoch() + 1)))\n+ .isInstanceOf(InvalidDiagnosisKeyException.class);\n+ assertThat(catchThrowable(() -> buildDiagnosisKeyForSubmissionTimestamp(\n+ Instant.now().getEpochSecond() /* accidentally forgot to divide by SECONDS_PER_HOUR */)))\n+ .isInstanceOf(InvalidDiagnosisKeyException.class);\n+ }\n+\n+ @Test\n+ void submissionTimestampDoesNotThrowOnValid() {\n+ assertThatCode(() -> buildDiagnosisKeyForSubmissionTimestamp(0L)).doesNotThrowAnyException();\n+ assertThatCode(() -> buildDiagnosisKeyForSubmissionTimestamp(getCurrentHoursSinceEpoch())).doesNotThrowAnyException();\n+ assertThatCode(\n+ () -> buildDiagnosisKeyForSubmissionTimestamp(Instant.now().minus(Duration.ofHours(2)).getEpochSecond() / SECONDS_PER_HOUR))\n+ .doesNotThrowAnyException();\n+ }\n+ \n private DiagnosisKey keyWithKeyData(byte[] expKeyData) {\n return DiagnosisKey.builder()\n .withKeyData(expKeyData)\n@@ -223,7 +253,7 @@ private void assertDiagnosisKeyEquals(DiagnosisKey actDiagnosisKey) {\n }\n \n private long getCurrentHoursSinceEpoch() {\n- return Instant.now().getEpochSecond() / 3600L;\n+ return Instant.now().getEpochSecond() / SECONDS_PER_HOUR;\n }\n \n private void assertDiagnosisKeyEquals(DiagnosisKey actDiagnosisKey, long expSubmissionTimestamp) {\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n@@ -21,6 +21,8 @@\n package app.coronawarn.server.common.persistence.service;\n \n import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.assertDiagnosisKeysEqual;\n+import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.buildDiagnosisKeyForDateTime;\n+import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.buildDiagnosisKeyForSubmissionTimestamp;\n import static java.time.ZoneOffset.UTC;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatCode;\n@@ -33,7 +35,6 @@\n import java.util.ArrayList;\n import java.util.Collections;\n import java.util.List;\n-import java.util.Random;\n import org.assertj.core.util.Lists;\n import org.junit.jupiter.api.AfterEach;\n import org.junit.jupiter.api.DisplayName;\n@@ -171,19 +172,4 @@ void shouldNotUpdateExistingKey() {\n assertThat(actKeys.size()).isEqualTo(1);\n assertThat(actKeys.iterator().next().getTransmissionRiskLevel()).isEqualTo(2);\n }\n-\n- public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n- byte[] randomBytes = new byte[16];\n- Random random = new Random(submissionTimeStamp);\n- random.nextBytes(randomBytes);\n- return DiagnosisKey.builder()\n- .withKeyData(randomBytes)\n- .withRollingStartIntervalNumber(600)\n- .withTransmissionRiskLevel(2)\n- .withSubmissionTimestamp(submissionTimeStamp).build();\n- }\n-\n- public static DiagnosisKey buildDiagnosisKeyForDateTime(OffsetDateTime dateTime) {\n- return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond() / 3600);\n- }\n }\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java\n@@ -23,7 +23,9 @@\n import static org.assertj.core.api.Assertions.assertThat;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import java.time.OffsetDateTime;\n import java.util.List;\n+import java.util.Random;\n \n public class DiagnosisKeyServiceTestHelper {\n \n@@ -48,4 +50,19 @@ public static void assertDiagnosisKeysEqual(List expKeys,\n .isEqualTo(expKey.getSubmissionTimestamp());\n }\n }\n+\n+ public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n+ byte[] randomBytes = new byte[16];\n+ Random random = new Random(submissionTimeStamp);\n+ random.nextBytes(randomBytes);\n+ return DiagnosisKey.builder()\n+ .withKeyData(randomBytes)\n+ .withRollingStartIntervalNumber(600)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(submissionTimeStamp).build();\n+ }\n+\n+ public static DiagnosisKey buildDiagnosisKeyForDateTime(OffsetDateTime dateTime) {\n+ return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond() / 3600);\n+ }\n }\n", "problem_statement": "Add JPA range validator for submissionTimestamp of DiagnosisKey\nDiagnosisKey uses a submissionTimestamp field of type long\r\n\r\nhttps://github.com/corona-warn-app/cwa-server/blob/7059232b48d2507d142fe683fbebdda371a98652/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java#L73 \r\n\r\nthe value is actually the *hours* since epoch but there are no sanity checks on the value.\r\n\r\nJust from reading the code you could e.g. easily think it's seconds since epoch and use it the wrong way without noticing at runtime.\r\n\r\nProposal:\r\n\r\n* Add a JPA ConstraintValidator similar to ValidRollingStartIntervalNumberValidator which checks the value range to be greater or equal zero and not in the future (current hour since epoch rounded up)\r\n* Add field javadoc to submissionTimestamp: \"hours since epoch\"\r\n\r\nExpected Benefits:\r\n\r\n* discard invalid data\r\n* less potential for programming errors\r\n\r\n\n", "hints_text": "I could open a PR wit the proposal if you think it makes sense\nthe getter and Builder already do have javadoc \"hours since epoch\" \r\n\r\nhttps://github.com/corona-warn-app/cwa-server/blob/master/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilders.java#L80\r\n\r\nso it's actually documented. Would still be nice to validate it though.\n@jsievers makes sense. Please go ahead with a proposal PR.", "created_at": "2020-06-13T22:50:51Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 624, "instance_id": "corona-warn-app__cwa-server-624", "issue_numbers": ["536"], "base_commit": "b690586ea60876791d7a71ee733dfd6faf8d87d5", "patch": "diff --git a/services/distribution/src/main/resources/bootstrap-cloud.yaml b/services/distribution/src/main/resources/bootstrap-cloud.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/bootstrap-cloud.yaml\n@@ -0,0 +1,27 @@\n+---\n+spring:\n+ application:\n+ name: cwa-server\n+ cloud:\n+ vault:\n+ enabled: true\n+ generic:\n+ enabled: false\n+ kv:\n+ enabled: true\n+ backend: ${VAULT_BACKEND}\n+ profile-separator: '/'\n+ application-name: 'distribution'\n+ default-context: ''\n+ profiles: cloud\n+ fail-fast: true\n+ authentication: KUBERNETES\n+ kubernetes:\n+ role: ${VAULT_ROLE}\n+ kubernetes-path: kubernetes\n+ service-account-token-file: /var/run/secrets/kubernetes.io/serviceaccount/token\n+ uri: ${VAULT_URI}\n+ connection-timeout: 5000\n+ read-timeout: 15000\n+ config:\n+ order: -10\ndiff --git a/services/distribution/src/main/resources/bootstrap.yaml b/services/distribution/src/main/resources/bootstrap.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/bootstrap.yaml\n@@ -0,0 +1,5 @@\n+---\n+spring:\n+ cloud:\n+ vault:\n+ enabled: false\ndiff --git a/services/submission/pom.xml b/services/submission/pom.xml\n--- a/services/submission/pom.xml\n+++ b/services/submission/pom.xml\n@@ -17,6 +17,11 @@\n \n \n \n+ \n+ org.springframework.cloud\n+ spring-cloud-starter-vault-config\n+ 2.2.3.RELEASE\n+ \n \n org.springframework.boot\n spring-boot-starter-web\ndiff --git a/services/submission/src/main/resources/bootstrap-cloud.yaml b/services/submission/src/main/resources/bootstrap-cloud.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/bootstrap-cloud.yaml\n@@ -0,0 +1,27 @@\n+---\n+spring:\n+ application:\n+ name: cwa-server\n+ cloud:\n+ vault:\n+ enabled: true\n+ generic:\n+ enabled: false\n+ kv:\n+ enabled: true\n+ backend: ${VAULT_BACKEND}\n+ profile-separator: '/'\n+ application-name: 'submission'\n+ default-context: ''\n+ profiles: cloud\n+ fail-fast: true\n+ authentication: KUBERNETES\n+ kubernetes:\n+ role: ${VAULT_ROLE}\n+ kubernetes-path: kubernetes\n+ service-account-token-file: /var/run/secrets/kubernetes.io/serviceaccount/token\n+ uri: ${VAULT_URI}\n+ connection-timeout: 5000\n+ read-timeout: 15000\n+ config:\n+ order: -10\ndiff --git a/services/submission/src/main/resources/bootstrap.yaml b/services/submission/src/main/resources/bootstrap.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/bootstrap.yaml\n@@ -0,0 +1,5 @@\n+---\n+spring:\n+ cloud:\n+ vault:\n+ enabled: false\n", "test_patch": "diff --git a/services/distribution/src/test/resources/bootstrap.yaml b/services/distribution/src/test/resources/bootstrap.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/bootstrap.yaml\n@@ -0,0 +1,5 @@\n+---\n+spring:\n+ cloud:\n+ vault:\n+ enabled: false\ndiff --git a/services/submission/src/test/resources/bootstrap.yaml b/services/submission/src/test/resources/bootstrap.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/resources/bootstrap.yaml\n@@ -0,0 +1,5 @@\n+---\n+spring:\n+ cloud:\n+ vault:\n+ enabled: false\n", "problem_statement": "Integrate Spring Cloud Vault\n## Suggested Enhancement\r\nEvaluate how the project can integrate the [Spring Cloud Vault](https://cloud.spring.io/spring-cloud-vault/reference/html/) to enhance the process of credential handling.\n", "hints_text": "", "created_at": "2020-06-25T07:53:17Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 629, "instance_id": "corona-warn-app__cwa-server-629", "issue_numbers": ["607"], "base_commit": "2e2655a94ae13a663cdbbcb17c5b1065edccf90b", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java\n@@ -32,6 +32,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing.IndexingDecoratorOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.file.FileOnDisk;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.util.Optional;\n import java.util.Set;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n@@ -86,6 +87,7 @@ private void addConfigurationArchiveIfValid(String archiveName) {\n ArchiveOnDisk appConfigurationFile = new ArchiveOnDisk(archiveName);\n appConfigurationFile.addWritable(new FileOnDisk(\"export.bin\", applicationConfiguration.toByteArray()));\n countryDirectory.addWritableToAll(ignoredValue ->\n- new AppConfigurationSigningDecorator(appConfigurationFile, cryptoProvider, distributionServiceConfig));\n+ Optional\n+ .of(new AppConfigurationSigningDecorator(appConfigurationFile, cryptoProvider, distributionServiceConfig)));\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n@@ -25,6 +25,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing.IndexingDecoratorOnDisk;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.util.Optional;\n import java.util.Set;\n import org.springframework.stereotype.Component;\n \n@@ -59,8 +60,10 @@ public Directory getDirectory() {\n ignoredValue -> Set.of(distributionServiceConfig.getApi().getVersionV1()),\n Object::toString);\n \n- versionDirectory.addWritableToAll(ignoredValue -> appConfigurationStructureProvider.getAppConfiguration());\n- versionDirectory.addWritableToAll(ignoredValue -> diagnosisKeysStructureProvider.getDiagnosisKeys());\n+ versionDirectory.addWritableToAll(ignoredValue ->\n+ Optional.of(appConfigurationStructureProvider.getAppConfiguration()));\n+ versionDirectory.addWritableToAll(ignoredValue ->\n+ Optional.of(diagnosisKeysStructureProvider.getDiagnosisKeys()));\n \n return new IndexingDecoratorOnDisk<>(versionDirectory, distributionServiceConfig.getOutputFileName());\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n@@ -95,6 +95,13 @@ public void setDiagnosisKeys(Collection diagnosisKeys, LocalDateTi\n this.createDiagnosisKeyDistributionMap(diagnosisKeys);\n }\n \n+ /**\n+ * Returns the {@link LocalDateTime} at which the distribution runs.\n+ */\n+ public LocalDateTime getDistributionTime() {\n+ return this.distributionTime;\n+ }\n+\n /**\n * Returns all {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler}.\n */\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n@@ -23,7 +23,6 @@\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateAggregatingDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateIndexingDecorator;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n@@ -31,6 +30,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n+import java.util.Optional;\n import java.util.Set;\n \n public class DiagnosisKeysCountryDirectory extends IndexDirectoryOnDisk {\n@@ -57,14 +57,12 @@ public DiagnosisKeysCountryDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n \n @Override\n public void prepare(ImmutableStack indices) {\n- this.addWritableToAll(ignoredValue ->\n- decorateDateDirectory(\n- new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig)));\n+ this.addWritableToAll(ignoredValue -> Optional.of(decorateDateDirectory(\n+ new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig))));\n super.prepare(indices);\n }\n \n private IndexDirectory decorateDateDirectory(DiagnosisKeysDateDirectory dateDirectory) {\n- return new DateAggregatingDecorator(new DateIndexingDecorator(dateDirectory, distributionServiceConfig),\n- cryptoProvider, distributionServiceConfig, diagnosisKeyBundler);\n+ return new DateIndexingDecorator(dateDirectory, distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n@@ -23,14 +23,23 @@\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.signing.DiagnosisKeySigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.HourIndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n+import app.coronawarn.server.services.distribution.assembly.structure.archive.ArchiveOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n+import java.time.ZoneOffset;\n import java.time.format.DateTimeFormatter;\n+import java.util.List;\n+import java.util.Optional;\n \n public class DiagnosisKeysDateDirectory extends IndexDirectoryOnDisk {\n \n@@ -61,12 +70,39 @@ public void prepare(ImmutableStack indices) {\n this.addWritableToAll(ignoredValue -> {\n DiagnosisKeysHourDirectory hourDirectory =\n new DiagnosisKeysHourDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig);\n- return decorateHourDirectory(hourDirectory);\n+ return Optional.of(decorateHourDirectory(hourDirectory));\n });\n+ this.addWritableToAll(this::indicesToDateDirectoryArchive);\n super.prepare(indices);\n }\n \n+ private Optional> indicesToDateDirectoryArchive(ImmutableStack currentIndices) {\n+ LocalDate currentDate = (LocalDate) currentIndices.peek();\n+ if (currentDate.equals(diagnosisKeyBundler.getDistributionTime().toLocalDate())) {\n+ return Optional.empty();\n+ }\n+ String region = (String) currentIndices.pop().peek();\n+\n+ List diagnosisKeysForCurrentHour =\n+ this.diagnosisKeyBundler.getDiagnosisKeysForDate(currentDate);\n+\n+ long startTimestamp = currentDate.atStartOfDay().toEpochSecond(ZoneOffset.UTC);\n+ long endTimestamp = currentDate.plusDays(1).atStartOfDay().toEpochSecond(ZoneOffset.UTC);\n+\n+ File temporaryExposureKeyExportFile = TemporaryExposureKeyExportFile.fromDiagnosisKeys(\n+ diagnosisKeysForCurrentHour, region, startTimestamp, endTimestamp, distributionServiceConfig);\n+\n+ Archive dateArchive = new ArchiveOnDisk(distributionServiceConfig.getOutputFileName());\n+ dateArchive.addWritable(temporaryExposureKeyExportFile);\n+\n+ return Optional.of(decorateDiagnosisKeyArchive(dateArchive));\n+ }\n+\n private Directory decorateHourDirectory(DiagnosisKeysHourDirectory hourDirectory) {\n return new HourIndexingDecorator(hourDirectory, distributionServiceConfig);\n }\n+\n+ private Directory decorateDiagnosisKeyArchive(Archive archive) {\n+ return new DiagnosisKeySigningDecorator(archive, cryptoProvider, distributionServiceConfig);\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n@@ -37,6 +37,7 @@\n import java.time.LocalDateTime;\n import java.time.ZoneOffset;\n import java.util.List;\n+import java.util.Optional;\n \n public class DiagnosisKeysHourDirectory extends IndexDirectoryOnDisk {\n \n@@ -80,7 +81,7 @@ public void prepare(ImmutableStack indices) {\n Archive hourArchive = new ArchiveOnDisk(distributionServiceConfig.getOutputFileName());\n hourArchive.addWritable(temporaryExposureKeyExportFile);\n \n- return decorateDiagnosisKeyArchive(hourArchive);\n+ return Optional.of(decorateDiagnosisKeyArchive(hourArchive));\n });\n super.prepare(indices);\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n+++ /dev/null\n@@ -1,202 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator;\n-\n-import static app.coronawarn.server.services.distribution.assembly.structure.util.functional.CheckedFunction.uncheckedFunction;\n-\n-import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n-import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKeyExport;\n-import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.signing.DiagnosisKeySigningDecorator;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n-import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n-import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n-import app.coronawarn.server.services.distribution.assembly.structure.archive.ArchiveOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.DirectoryDecorator;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexDirectoryDecorator;\n-import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n-import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n-import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import java.time.LocalDate;\n-import java.util.List;\n-import java.util.NoSuchElementException;\n-import java.util.Optional;\n-import java.util.Set;\n-import java.util.stream.Collectors;\n-import java.util.stream.Stream;\n-\n-/**\n- * A {@link DirectoryDecorator} that will bundle hour aggregates into date aggregates and sign them.\n- */\n-public class DateAggregatingDecorator extends IndexDirectoryDecorator {\n-\n- private final CryptoProvider cryptoProvider;\n- private final DistributionServiceConfig distributionServiceConfig;\n- private final DiagnosisKeyBundler diagnosisKeyBundler;\n-\n- /**\n- * Creates a new DateAggregatingDecorator.\n- */\n- public DateAggregatingDecorator(IndexDirectory directory, CryptoProvider cryptoProvider,\n- DistributionServiceConfig distributionServiceConfig, DiagnosisKeyBundler diagnosisKeyBundler) {\n- super(directory);\n- this.cryptoProvider = cryptoProvider;\n- this.distributionServiceConfig = distributionServiceConfig;\n- this.diagnosisKeyBundler = diagnosisKeyBundler;\n- }\n-\n- @Override\n- public void prepare(ImmutableStack indices) {\n- super.prepare(indices);\n- Set> dayDirectories = this.getWritables().stream()\n- .filter(writable -> writable instanceof DirectoryOnDisk)\n- .map(directory -> (DirectoryOnDisk) directory)\n- .collect(Collectors.toSet());\n- if (dayDirectories.isEmpty()) {\n- return;\n- }\n-\n- Set dates = this.getIndex(indices).stream()\n- .filter(diagnosisKeyBundler::numberOfKeysForDateBelowMaximum)\n- .map(this.getIndexFormatter())\n- .map(Object::toString)\n- .collect(Collectors.toSet());\n-\n- dayDirectories.stream()\n- .filter(dayDirectory -> dates.contains(dayDirectory.getName()))\n- .forEach(currentDirectory -> Stream.of(currentDirectory)\n- .map(this::getSubSubDirectoryArchives)\n- .map(this::getTemporaryExposureKeyExportFilesFromArchives)\n- .map(this::parseTemporaryExposureKeyExportsFromFiles)\n- .map(this::reduceTemporaryExposureKeyExportsToNewFile)\n- .map(temporaryExposureKeyExportFile -> {\n- Archive aggregate = new ArchiveOnDisk(distributionServiceConfig.getOutputFileName());\n- aggregate.addWritable(temporaryExposureKeyExportFile);\n- return aggregate;\n- })\n- .map(file -> new DiagnosisKeySigningDecorator(file, cryptoProvider, distributionServiceConfig))\n- .forEach(aggregate -> {\n- currentDirectory.addWritable(aggregate);\n- aggregate.prepare(indices);\n- })\n- );\n- }\n-\n- /**\n- * Returns all archives that are 3 levels down from the root directory.\n- */\n- private Set> getSubSubDirectoryArchives(Directory rootDirectory) {\n- return getWritablesInDirectory(rootDirectory, 3).stream()\n- .filter(Writable::isArchive)\n- .map(archive -> (Archive) archive)\n- .collect(Collectors.toSet());\n- }\n-\n- /**\n- * Traverses a directory {@code depth} levels deep and returns a flattened list of all writables at that depth. A\n- * {@code depth} of 0 or less returns a set only containing the root directory. A depth of 1 returns a set of\n- * writables in the root directory. A depth of 2 returns a set of all writables in all directories in the root\n- * directory, and so on.\n- *\n- * @param rootDirectory The directory in which to start traversal.\n- * @param depth The depth to traverse.\n- * @return All writables that are {@code depth} levels down.\n- */\n- private Set> getWritablesInDirectory(Directory rootDirectory, int depth) {\n- if (depth <= 0) {\n- return Set.of(rootDirectory);\n- } else if (depth == 1) {\n- return rootDirectory.getWritables();\n- } else {\n- return rootDirectory.getWritables().stream()\n- .filter(Writable::isDirectory)\n- .flatMap(directory -> getWritablesInDirectory((Directory) directory, depth - 1).stream())\n- .collect(Collectors.toSet());\n- }\n- }\n-\n- private Set getTemporaryExposureKeyExportFilesFromArchives(\n- Set> hourArchives) {\n- return hourArchives.stream()\n- .map(Directory::getWritables)\n- .map(writables -> writables.stream()\n- .filter(writable -> writable.getName().equals(\"export.bin\")))\n- .map(Stream::findFirst)\n- .map(Optional::orElseThrow)\n- .filter(writable -> writable instanceof File)\n- .map(file -> (TemporaryExposureKeyExportFile) file)\n- .collect(Collectors.toSet());\n- }\n-\n- private Set parseTemporaryExposureKeyExportsFromFiles(\n- Set temporaryExposureKeyExportFiles) {\n- return temporaryExposureKeyExportFiles.stream()\n- .map(TemporaryExposureKeyExportFile::getBytesWithoutHeader)\n- .map(uncheckedFunction(TemporaryExposureKeyExport::parseFrom))\n- .collect(Collectors.toSet());\n- }\n-\n- private TemporaryExposureKeyExportFile reduceTemporaryExposureKeyExportsToNewFile(\n- Set temporaryExposureKeyExports) {\n- return TemporaryExposureKeyExportFile.fromTemporaryExposureKeys(\n- getTemporaryExposureKeys(temporaryExposureKeyExports),\n- getRegion(temporaryExposureKeyExports),\n- getStartTimestamp(temporaryExposureKeyExports),\n- getEndTimestamp(temporaryExposureKeyExports),\n- distributionServiceConfig\n- );\n- }\n-\n- private static Set getTemporaryExposureKeys(\n- Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .map(TemporaryExposureKeyExport::getKeysList)\n- .flatMap(List::stream)\n- .collect(Collectors.toSet());\n- }\n-\n- private static String getRegion(Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .map(TemporaryExposureKeyExport::getRegion)\n- .findAny()\n- .orElseThrow(NoSuchElementException::new);\n- }\n-\n- private static long getStartTimestamp(\n- Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .mapToLong(TemporaryExposureKeyExport::getStartTimestamp)\n- .min()\n- .orElseThrow(NoSuchElementException::new);\n- }\n-\n- private static long getEndTimestamp(Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .mapToLong(TemporaryExposureKeyExport::getEndTimestamp)\n- .max()\n- .orElseThrow(NoSuchElementException::new);\n- }\n-}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n@@ -27,6 +27,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.IndexFunction;\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.WritableFunction;\n import java.util.HashSet;\n+import java.util.Optional;\n import java.util.Set;\n \n /**\n@@ -74,9 +75,9 @@ public void addWritableToAll(WritableFunction writableFunction)\n }\n \n /**\n- * Creates a new subdirectory for every element of the {@link IndexDirectory#getIndex index} and writes all its\n- * {@link IndexDirectory#addWritableToAll writables} to those. The respective element of the index will be pushed\n- * onto the Stack for subsequent {@link Writable#prepare} calls.\n+ * Creates a new subdirectory for every element of the {@link IndexDirectory#getIndex index} and writes all its {@link\n+ * IndexDirectory#addWritableToAll writables} to those. The respective element of the index will be pushed onto the\n+ * Stack for subsequent {@link Writable#prepare} calls.\n *\n * @param indices A {@link ImmutableStack} of parameters from all {@link IndexDirectory IndexDirectories} further up\n * in the hierarchy. The Stack may contain different types, depending on the types {@code T} of {@link\n@@ -104,9 +105,11 @@ private DirectoryOnDisk makeSubDirectory(T index) {\n \n private void prepareMetaWritables(ImmutableStack indices, DirectoryOnDisk target) {\n this.metaWritables.forEach(metaWritableFunction -> {\n- Writable newWritable = metaWritableFunction.apply(indices);\n- target.addWritable(newWritable);\n- newWritable.prepare(indices);\n+ Optional> maybeNewWritable = metaWritableFunction.apply(indices);\n+ maybeNewWritable.ifPresent(newWritable -> {\n+ target.addWritable(newWritable);\n+ newWritable.prepare(indices);\n+ });\n });\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import java.util.Optional;\n import java.util.function.Function;\n \n /**\n@@ -30,7 +31,8 @@\n * @param The specific type of {@link Writable} that this {@link WritableFunction} can create.\n */\n @FunctionalInterface\n-public interface WritableFunction> extends Function, Writable> {\n+public interface WritableFunction> extends\n+ Function, Optional>> {\n \n- Writable apply(ImmutableStack t);\n+ Optional> apply(ImmutableStack t);\n }\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n@@ -180,4 +180,12 @@ void testEmptyListWhenGettingDiagnosisKeysForHourBeforeEarliestDiagnosisKey() {\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).isEmpty();\n }\n+\n+ @Test\n+ void testGetsCorrectDistributionDate(){\n+ LocalDateTime expected = LocalDateTime.of(1970, 1, 5, 0, 0);\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys, expected);\n+ assertThat(bundler.getDistributionTime()).isEqualTo(expected);\n+ }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryTest.java\n@@ -0,0 +1,185 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getExpectedDateAndHourFiles;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.common.Helpers;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.io.File;\n+import java.io.IOException;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Map;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n+import org.junit.Rule;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.rules.TemporaryFolder;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class DiagnosisKeysDateDirectoryTest {\n+\n+ @Rule\n+ private final TemporaryFolder outputFolder = new TemporaryFolder();\n+\n+ @Autowired\n+ CryptoProvider cryptoProvider;\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ private File outputFile;\n+\n+ @BeforeEach\n+ void setupAll() throws IOException {\n+ outputFolder.create();\n+ outputFile = outputFolder.newFolder();\n+ }\n+\n+ private void runDateDistribution(Collection diagnosisKeys, LocalDateTime distributionTime) {\n+ DiagnosisKeyBundler bundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ bundler\n+ .setDiagnosisKeys(diagnosisKeys, distributionTime);\n+ DiagnosisKeysDateDirectory dateDirectory = new DiagnosisKeysDateDirectory(bundler, cryptoProvider,\n+ distributionServiceConfig);\n+ Directory outputDirectory = new DirectoryOnDisk(outputFile);\n+ outputDirectory.addWritable(dateDirectory);\n+ dateDirectory.prepare(new ImmutableStack<>()\n+ .push(\"version-directory\")\n+ .push(\"country-directory\"));\n+ outputDirectory.write();\n+ }\n+\n+ @Test\n+ void testCreatesCorrectDirectoryStructureForMultipleDates() {\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 0, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-04\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-06\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeCurrentDateInDirectoryStructure() {\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-04\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-05\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeEmptyDatesInDirectoryStructure() {\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .filter(currentDate -> currentDate != 1)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-05\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeDatesWithTooFewKeysInDirectoryStructure() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 1, 0), 4),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 1, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"1\"),\n+ \"1970-01-05\", List.of(\"1\")), \"1970-01-06\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeDatesInTheFuture() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 1, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 4, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"1\"),\n+ \"1970-01-04\", List.of(\"1\")), \"1970-01-04\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryTest.java\n@@ -0,0 +1,156 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getExpectedHourFiles;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getFilePaths;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.io.File;\n+import java.io.IOException;\n+import java.time.LocalDate;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n+import org.junit.Rule;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.rules.TemporaryFolder;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class DiagnosisKeysHourDirectoryTest {\n+\n+ @Rule\n+ private final TemporaryFolder outputFolder = new TemporaryFolder();\n+\n+ @Autowired\n+ CryptoProvider cryptoProvider;\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ private File outputFile;\n+\n+ @BeforeEach\n+ void setupAll() throws IOException {\n+ outputFolder.create();\n+ outputFile = outputFolder.newFolder();\n+ }\n+\n+ private void runHourDistribution(Collection diagnosisKeys, LocalDateTime distributionTime) {\n+ DiagnosisKeyBundler bundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ bundler.setDiagnosisKeys(diagnosisKeys, distributionTime);\n+ DiagnosisKeysHourDirectory hourDirectory = new DiagnosisKeysHourDirectory(bundler, cryptoProvider,\n+ distributionServiceConfig);\n+ Directory outputDirectory = new DirectoryOnDisk(outputFile);\n+ outputDirectory.addWritable(hourDirectory);\n+ hourDirectory.prepare(new ImmutableStack<>()\n+ .push(\"version-directory\")\n+ .push(\"country-directory\")\n+ .push(LocalDate.of(1970, 1, 3)) // date-directory\n+ );\n+ outputDirectory.write();\n+ }\n+\n+ @Test\n+ void testCreatesCorrectStructureForMultipleHours() {\n+ Collection diagnosisKeys = IntStream.range(0, 5)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"1\", \"2\", \"3\", \"4\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeEmptyHours() {\n+ Collection diagnosisKeys = IntStream.range(0, 5)\n+ .filter(currentHour -> currentHour != 3)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"1\", \"2\", \"4\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeCurrentHour() {\n+ Collection diagnosisKeys = IntStream.range(0, 5)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 3, 4, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"1\", \"2\", \"3\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeHoursWithTooFewKeys() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 4),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 2, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 12, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"2\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeHoursInTheFuture() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 2, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 3, 1, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\")));\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java\n@@ -32,6 +32,7 @@\n import java.util.Arrays;\n import java.util.List;\n import java.util.Objects;\n+import java.util.Optional;\n import java.util.Set;\n import java.util.stream.Collectors;\n import java.util.stream.Stream;\n@@ -79,7 +80,7 @@ void checkAddFileToAll() {\n indexDirectory.addWritableToAll(ignoredValue -> {\n FileOnDisk newFile = new FileOnDisk(\"index\", new byte[0]);\n expectedFileList.add(newFile);\n- return newFile;\n+ return Optional.of(newFile);\n });\n \n prepareAndWrite(outputDirectory);\n@@ -104,7 +105,7 @@ void checkAddDirectoryToAll() {\n indexDirectory.addWritableToAll(ignoredValue -> {\n DirectoryOnDisk newDirectory = new DirectoryOnDisk(\"something\");\n expectedFileList.add(newDirectory);\n- return newDirectory;\n+ return Optional.of(newDirectory);\n });\n \n prepareAndWrite(outputDirectory);\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n@@ -21,6 +21,7 @@\n package app.coronawarn.server.services.distribution.common;\n \n import static app.coronawarn.server.services.distribution.assembly.appconfig.YamlLoader.loadYamlIntoProtobufBuilder;\n+import static java.io.File.separator;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n@@ -31,7 +32,10 @@\n import java.time.LocalDateTime;\n import java.time.ZoneOffset;\n import java.util.Arrays;\n+import java.util.Collection;\n+import java.util.HashSet;\n import java.util.List;\n+import java.util.Map;\n import java.util.Objects;\n import java.util.Set;\n import java.util.stream.Collectors;\n@@ -95,4 +99,34 @@ public static Set getFilePaths(java.io.File root, String basePath) {\n public static ApplicationConfiguration loadApplicationConfiguration(String path) throws UnableToLoadFileException {\n return loadYamlIntoProtobufBuilder(path, ApplicationConfiguration.Builder.class).build();\n }\n+\n+ public static Set getExpectedHourFiles(Collection hours) {\n+ return hours.stream()\n+ .map(hour -> Set.of(\n+ String.join(separator, \"hour\", hour, \"index\"),\n+ String.join(separator, \"hour\", hour, \"index.checksum\")))\n+ .flatMap(Set::stream)\n+ .collect(Collectors.toSet());\n+ }\n+\n+ public static Set getExpectedDateAndHourFiles(Map> datesAndHours, String currentDate) {\n+ Set expectedFiles = new HashSet<>();\n+\n+ datesAndHours.forEach((date, hours) -> {\n+ if (!date.equals(currentDate)) {\n+ expectedFiles.add(String.join(separator, \"date\", date, \"index\"));\n+ expectedFiles.add(String.join(separator, \"date\", date, \"index.checksum\"));\n+ }\n+\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", \"index\"));\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", \"index.checksum\"));\n+\n+ hours.forEach(hour -> {\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", hour, \"index\"));\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", hour, \"index.checksum\"));\n+ });\n+ });\n+\n+ return expectedFiles;\n+ }\n }\n", "problem_statement": "Simplifying DateAggregatingDecorator\nThe DateAggregatingDecorator should make more use of the `DiagnosisKeyBundler`. Please team up with @pithumke on this. \n", "hints_text": "", "created_at": "2020-06-25T15:35:31Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 642, "instance_id": "corona-warn-app__cwa-server-642", "issue_numbers": ["638"], "base_commit": "fa9adc6631233172684910191efdf00429799365", "patch": "diff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\n@@ -59,6 +59,6 @@ message RiskScoreParameters {\n RiskLevel gt_27_le_33_dbm = 5; // 27 < A <= 33 dBm\n RiskLevel gt_15_le_27_dbm = 6; // 15 < A <= 27 dBm\n RiskLevel gt_10_le_15_dbm = 7; // 10 < A <= 15 dBm\n- RiskLevel lt_10_dbm = 8; // A <= 10 dBm, highest risk\n+ RiskLevel le_10_dbm = 8; // A <= 10 dBm, highest risk\n }\n-}\n\\ No newline at end of file\n+}\ndiff --git a/services/distribution/src/main/resources/master-config/exposure-config.yaml b/services/distribution/src/main/resources/master-config/exposure-config.yaml\n--- a/services/distribution/src/main/resources/master-config/exposure-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/exposure-config.yaml\n@@ -55,4 +55,4 @@ attenuation:\n gt_27_le_33_dbm: 1\n gt_15_le_27_dbm: 1\n gt_10_le_15_dbm: 1\n- lt_10_dbm: 1\n+ le_10_dbm: 1\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java\n@@ -40,8 +40,9 @@ void okFile() throws UnableToLoadFileException {\n @ValueSource(strings = {\n \"configtests/app-config_empty.yaml\",\n \"configtests/wrong_file.yaml\",\n- \"configtests/broken_syntax.yaml\",\n- \"file_does_not_exist_anywhere.yaml\"\n+ \"configtests/app-config_broken_syntax.yaml\",\n+ \"configtests/naming_mismatch.yaml\",\n+ \"configtests/file_does_not_exist_anywhere.yaml\"\n })\n void throwsLoadFailure(String fileName) {\n assertThatExceptionOfType(UnableToLoadFileException.class).isThrownBy(() -> loadApplicationConfiguration(fileName));\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n@@ -22,8 +22,7 @@\n \n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ExposureConfigurationValidator.CONFIG_PREFIX;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.TOO_MANY_DECIMAL_PLACES;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.*;\n import static org.assertj.core.api.Assertions.assertThat;\n \n import app.coronawarn.server.common.protocols.internal.RiskLevel;\ndiff --git a/services/distribution/src/test/resources/configtests/exposure-config_ok.yaml b/services/distribution/src/test/resources/configtests/exposure-config_ok.yaml\n--- a/services/distribution/src/test/resources/configtests/exposure-config_ok.yaml\n+++ b/services/distribution/src/test/resources/configtests/exposure-config_ok.yaml\n@@ -55,4 +55,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/configtests/naming_mismatch.yaml b/services/distribution/src/test/resources/configtests/naming_mismatch.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/resources/configtests/naming_mismatch.yaml\n@@ -0,0 +1,43 @@\n+transmission_weight: 10.001\n+duration_weight: 0.001\n+attenuation_weight: 100\n+\n+transmission:\n+ foo: 2 # \"foo\" does not exist in proto\n+ app_defined_2: 2\n+ app_defined_3: 3\n+ app_defined_4: 4\n+ app_defined_5: 5\n+ app_defined_6: 6\n+ app_defined_7: 7\n+ app_defined_8: 8\n+\n+duration:\n+ eq_0_min: 1\n+ gt_0_le_5_min: 2\n+ gt_5_le_10_min: 3\n+ gt_10_le_15_min: 4\n+ gt_15_le_20_min: 5\n+ gt_20_le_25_min: 6\n+ gt_25_le_30_min: 7\n+ gt_30_min: 8\n+\n+days_since_last_exposure:\n+ ge_14_days: 1\n+ ge_12_lt_14_days: 2\n+ ge_10_lt_12_days: 3\n+ ge_8_lt_10_days: 4\n+ ge_6_lt_8_days: 5\n+ ge_4_lt_6_days: 6\n+ ge_2_lt_4_days: 7\n+ ge_0_lt_2_days: 8\n+\n+attenuation:\n+ gt_73_dbm: 1\n+ gt_63_le_73_dbm: 2\n+ gt_51_le_63_dbm: 3\n+ gt_33_le_51_dbm: 4\n+ gt_27_le_33_dbm: 5\n+ gt_15_le_27_dbm: 6\n+ gt_10_le_15_dbm: 7\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/objectstore/publisher/examplefile b/services/distribution/src/test/resources/objectstore/publisher/examplefile\n--- a/services/distribution/src/test/resources/objectstore/publisher/examplefile\n+++ b/services/distribution/src/test/resources/objectstore/publisher/examplefile\n@@ -43,4 +43,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/all_ok.yaml b/services/distribution/src/test/resources/parameters/all_ok.yaml\n--- a/services/distribution/src/test/resources/parameters/all_ok.yaml\n+++ b/services/distribution/src/test/resources/parameters/all_ok.yaml\n@@ -43,4 +43,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/broken_syntax.yaml b/services/distribution/src/test/resources/parameters/broken_syntax.yaml\n--- a/services/distribution/src/test/resources/parameters/broken_syntax.yaml\n+++ b/services/distribution/src/test/resources/parameters/broken_syntax.yaml\n@@ -40,4 +40,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/partly_filled.yaml b/services/distribution/src/test/resources/parameters/partly_filled.yaml\n--- a/services/distribution/src/test/resources/parameters/partly_filled.yaml\n+++ b/services/distribution/src/test/resources/parameters/partly_filled.yaml\n@@ -43,4 +43,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/score_too_high.yaml b/services/distribution/src/test/resources/parameters/score_too_high.yaml\n--- a/services/distribution/src/test/resources/parameters/score_too_high.yaml\n+++ b/services/distribution/src/test/resources/parameters/score_too_high.yaml\n@@ -40,4 +40,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/weight_negative.yaml b/services/distribution/src/test/resources/parameters/weight_negative.yaml\n--- a/services/distribution/src/test/resources/parameters/weight_negative.yaml\n+++ b/services/distribution/src/test/resources/parameters/weight_negative.yaml\n@@ -41,4 +41,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/weight_ok.yaml b/services/distribution/src/test/resources/parameters/weight_ok.yaml\n--- a/services/distribution/src/test/resources/parameters/weight_ok.yaml\n+++ b/services/distribution/src/test/resources/parameters/weight_ok.yaml\n@@ -40,4 +40,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\ndiff --git a/services/distribution/src/test/resources/parameters/weight_too_high.yaml b/services/distribution/src/test/resources/parameters/weight_too_high.yaml\n--- a/services/distribution/src/test/resources/parameters/weight_too_high.yaml\n+++ b/services/distribution/src/test/resources/parameters/weight_too_high.yaml\n@@ -40,4 +40,4 @@ attenuation:\n gt_27_le_33_dbm: 5\n gt_15_le_27_dbm: 6\n gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n\\ No newline at end of file\n+ le_10_dbm: 8\n", "problem_statement": "[MINOR] Incorrect value range in attenuation risk parameter\n## Describe the bug\r\nThe `AttenuationRiskParameters` proto message (see [here](https://github.com/corona-warn-app/cwa-server/blob/master/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto)) is defined as follows:\r\n```proto3\r\nmessage AttenuationRiskParameters {\r\n RiskLevel gt_73_dbm = 1; // A > 73 dBm, lowest risk\r\n RiskLevel gt_63_le_73_dbm = 2; // 63 < A <= 73 dBm\r\n RiskLevel gt_51_le_63_dbm = 3; // 51 < A <= 63 dBm\r\n RiskLevel gt_33_le_51_dbm = 4; // 33 < A <= 51 dBm\r\n RiskLevel gt_27_le_33_dbm = 5; // 27 < A <= 33 dBm\r\n RiskLevel gt_15_le_27_dbm = 6; // 15 < A <= 27 dBm\r\n RiskLevel gt_10_le_15_dbm = 7; // 10 < A <= 15 dBm\r\n RiskLevel lt_10_dbm = 8; // A <= 10 dBm, highest risk\r\n}\r\n```\r\n\r\nThere is no value range that includes an attenuation of **exactly** 10dBm.\r\n\r\n## Expected behaviour\r\nAccording to the [Google/Apple spec](https://developer.apple.com/documentation/exposurenotification/enexposureconfiguration), the last value range should be \"less than or equal to 10dBm\" (`le_10_dbm`):\r\n\r\n![image](https://user-images.githubusercontent.com/8984460/86034663-57f91580-ba3b-11ea-9444-e5020e6dcc46.png)\r\n\r\n## Possible Fix\r\n- Correct the last attenuation value range according to spec\r\n- Update dependent code/configuration respectively ([here](https://github.com/corona-warn-app/cwa-server/blob/b8afdce9a3bc8fd927fe4ec9be2e910ee8f1635d/services/distribution/src/test/resources/objectstore/publisher/examplefile), [here](https://github.com/corona-warn-app/cwa-server/tree/b8afdce9a3bc8fd927fe4ec9be2e910ee8f1635d/services/distribution/src/test/resources/parameters), [here](https://github.com/corona-warn-app/cwa-server/tree/d6c0ad58f6473bd55af9a0cbe2c0cc8db3914af6/services/distribution/src/main/resources/master-config) and possibly more).\r\n\r\n## Additional context\r\n- This \"bug\" doesn't have any technical implications and should only be fixed for consistency\r\n- Downwards-compatibility of the proto messages should not be infringed by the proposed change\n", "hints_text": "", "created_at": "2020-07-01T11:58:13Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 652, "instance_id": "corona-warn-app__cwa-server-652", "issue_numbers": ["320"], "base_commit": "ac86a35d9c4a40d55315ce50052ea0e4a64f036e", "patch": "diff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java\n@@ -79,7 +79,6 @@ public enum ErrorType {\n VALUE_OUT_OF_BOUNDS,\n INVALID_URL,\n INVALID_PARTITIONING,\n- TOO_MANY_DECIMAL_PLACES,\n- MISSING_ENTRY\n+ TOO_MANY_DECIMAL_PLACES\n }\n }\n", "test_patch": "diff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n@@ -22,7 +22,6 @@\n \n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ExposureConfigurationValidator.CONFIG_PREFIX;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.MISSING_ENTRY;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.TOO_MANY_DECIMAL_PLACES;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n import static org.assertj.core.api.Assertions.assertThat;\n@@ -69,8 +68,6 @@ private static Stream createOkTests() {\n private static Stream createFailedTests() {\n return Stream.of(\n ScoreTooHigh(),\n- // TODO cwa-server/#320 Validate that no attributes are missing in .yaml\n- // ScoreNegative(),\n WeightNegative(),\n WeightTooHigh()\n ).map(Arguments::of);\n@@ -103,12 +100,6 @@ public static TestWithExpectedResult WeightTooHigh() {\n .with(buildError(CONFIG_PREFIX + \"transmission\", 101d, VALUE_OUT_OF_BOUNDS));\n }\n \n- public static TestWithExpectedResult ScoreNegative() {\n- return new TestWithExpectedResult(\"score_negative.yaml\")\n- .with(buildError(CONFIG_PREFIX + \"transmission.appDefined1\", RiskLevel.UNRECOGNIZED, VALUE_OUT_OF_BOUNDS))\n- .with(buildError(CONFIG_PREFIX + \"transmission.appDefined3\", null, MISSING_ENTRY));\n- }\n-\n public static TestWithExpectedResult ScoreTooHigh() {\n return new TestWithExpectedResult(\"score_too_high.yaml\")\n .with(buildError(CONFIG_PREFIX + \"transmission.appDefined1\", RiskLevel.UNRECOGNIZED, VALUE_OUT_OF_BOUNDS))\ndiff --git a/services/distribution/src/test/resources/parameters/score_negative.yaml b/services/distribution/src/test/resources/parameters/score_negative.yaml\ndeleted file mode 100644\n--- a/services/distribution/src/test/resources/parameters/score_negative.yaml\n+++ /dev/null\n@@ -1,44 +0,0 @@\n-transmission_weight: 100\n-duration_weight: 50\n-attenuation_weight: 80\n-\n-\n-transmission:\n- app_defined_1: -2 # not ok, negative\n- app_defined_2: 0\n- #app_defined_3: 3 # not ok (missing -> unspecified)\n- app_defined_4: 5\n- app_defined_5: 5\n- app_defined_6: 6\n- app_defined_7: 7\n- app_defined_8: 8\n-\n-duration:\n- eq_0_min: 1\n- gt_0_le_5_min: 2\n- gt_5_le_10_min: 3\n- gt_10_le_15_min: 4\n- gt_15_le_20_min: 5\n- gt_20_le_25_min: 6\n- gt_25_le_30_min: 7\n- gt_30_min: 8\n-\n-days_since_last_exposure:\n- ge_14_days: 1\n- ge_12_lt_14_days: 2\n- ge_10_lt_12_days: 3\n- ge_8_lt_10_days: 4\n- ge_6_lt_8_days: 5\n- ge_4_lt_6_days: 6\n- ge_2_lt_4_days: 7\n- ge_0_lt_2_days: 8\n-\n-attenuation:\n- gt_73_dbm: 1\n- gt_63_le_73_dbm: 2\n- gt_51_le_63_dbm: 3\n- gt_33_le_51_dbm: 4\n- gt_27_le_33_dbm: 5\n- gt_15_le_27_dbm: 6\n- gt_10_le_15_dbm: 7\n- lt_10_dbm: 8\n", "problem_statement": "Validate that no attributes are missing in .yaml\nvalidate that no attributes are missing in .yaml when accordingly re-enable the ``ScoreNegative`` test case in:\r\nhttps://github.com/corona-warn-app/cwa-server/blob/master/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\r\n\r\nNote: the validation probably should be done on the loading the values from yaml into a proto object, since validating directly on the resulting proto object is too late as the default value for an unloaded attribute in proto is 0 which we consider as a valid value (or risk score in the allowed range of 0-8)\r\n\r\nSee PR which disabled the test: https://github.com/corona-warn-app/cwa-server/pull/299\n", "hints_text": "", "created_at": "2020-07-06T08:16:37Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 659, "instance_id": "corona-warn-app__cwa-server-659", "issue_numbers": ["658"], "base_commit": "ee78bf15ece7f282836149b5f39422892f055096", "patch": "diff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/submission_payload.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/submission_payload.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/submission_payload.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/submission_payload.proto\n@@ -6,4 +6,5 @@ import \"app/coronawarn/server/common/protocols/external/exposurenotification/tem\n \n message SubmissionPayload {\n repeated app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey keys = 1;\n-}\n\\ No newline at end of file\n+ bytes padding = 2;\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n@@ -20,6 +20,7 @@\n \n package app.coronawarn.server.services.submission;\n \n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfigValidator;\n import io.micrometer.core.aop.TimedAspect;\n import io.micrometer.core.instrument.MeterRegistry;\n import java.util.Arrays;\n@@ -40,6 +41,7 @@\n import org.springframework.core.env.Environment;\n import org.springframework.data.jdbc.repository.config.EnableJdbcRepositories;\n import org.springframework.http.converter.protobuf.ProtobufHttpMessageConverter;\n+import org.springframework.validation.Validator;\n \n @SpringBootApplication(exclude = {UserDetailsServiceAutoConfiguration.class})\n @EnableJdbcRepositories(basePackages = \"app.coronawarn.server.common.persistence\")\n@@ -74,6 +76,11 @@ ProtobufHttpMessageConverter protobufHttpMessageConverter() {\n return new ProtobufHttpMessageConverter();\n }\n \n+ @Bean\n+ public static Validator configurationPropertiesValidator() {\n+ return new SubmissionServiceConfigValidator();\n+ }\n+\n @Override\n public void setEnvironment(Environment environment) {\n List profiles = Arrays.asList(environment.getActiveProfiles());\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionPayloadSizeFilter.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionPayloadSizeFilter.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionPayloadSizeFilter.java\n@@ -0,0 +1,58 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.config;\n+\n+import java.io.IOException;\n+import javax.servlet.FilterChain;\n+import javax.servlet.ServletException;\n+import javax.servlet.http.HttpServletRequest;\n+import javax.servlet.http.HttpServletResponse;\n+import org.springframework.http.HttpStatus;\n+import org.springframework.stereotype.Component;\n+import org.springframework.web.filter.OncePerRequestFilter;\n+\n+/**\n+ * {@link SubmissionPayloadSizeFilter} instances filter requests exceeding a certain size limit.\n+ */\n+@Component\n+public class SubmissionPayloadSizeFilter extends OncePerRequestFilter {\n+\n+ private final long maximumRequestSize;\n+\n+ public SubmissionPayloadSizeFilter(SubmissionServiceConfig config) {\n+ this.maximumRequestSize = config.getMaximumRequestSize().toBytes();\n+ }\n+\n+ /**\n+ * Filters each request that exceeds the maximum size.\n+ */\n+ @Override\n+ protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)\n+ throws ServletException, IOException {\n+ if (request.getContentLengthLong() > maximumRequestSize) {\n+ response.setStatus(HttpStatus.BAD_REQUEST.value());\n+ response.getWriter().write(\"Request size exceeded limit of \" + maximumRequestSize + \" bytes\");\n+ } else {\n+ filterChain.doFilter(request, response);\n+ }\n+ }\n+\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n@@ -26,6 +26,7 @@\n import javax.validation.constraints.Pattern;\n import org.springframework.boot.context.properties.ConfigurationProperties;\n import org.springframework.stereotype.Component;\n+import org.springframework.util.unit.DataSize;\n import org.springframework.validation.annotation.Validated;\n \n @Component\n@@ -53,6 +54,7 @@ public class SubmissionServiceConfig {\n @Min(1)\n @Max(10000)\n private Integer connectionPoolSize;\n+ private DataSize maximumRequestSize;\n private Payload payload;\n private Verification verification;\n private Monitoring monitoring;\n@@ -98,6 +100,14 @@ public void setConnectionPoolSize(Integer connectionPoolSize) {\n this.connectionPoolSize = connectionPoolSize;\n }\n \n+ public DataSize getMaximumRequestSize() {\n+ return maximumRequestSize;\n+ }\n+\n+ public void setMaximumRequestSize(DataSize maximumRequestSize) {\n+ this.maximumRequestSize = maximumRequestSize;\n+ }\n+\n public Integer getMaxNumberOfKeys() {\n return payload.getMaxNumberOfKeys();\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigValidator.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigValidator.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigValidator.java\n@@ -0,0 +1,54 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.config;\n+\n+import org.springframework.util.unit.DataSize;\n+import org.springframework.validation.Errors;\n+import org.springframework.validation.Validator;\n+\n+/**\n+ * {@link SubmissionPayloadSizeFilter} instances validate the values of the SubmissionServiceConfig.\n+ */\n+public class SubmissionServiceConfigValidator implements Validator {\n+\n+ public static final DataSize MIN_MAXIMUM_REQUEST_SIZE = DataSize.ofBytes(280);\n+ public static final DataSize MAX_MAXIMUM_REQUEST_SIZE = DataSize.ofKilobytes(200);\n+\n+ @Override\n+ public boolean supports(Class> type) {\n+ return type == SubmissionServiceConfig.class;\n+ }\n+\n+ /**\n+ * Validate if the MaximumRequestSize of the {@link SubmissionServiceConfig} is in the defined range.\n+ */\n+ @Override\n+ public void validate(Object o, Errors errors) {\n+ SubmissionServiceConfig properties = (SubmissionServiceConfig) o;\n+\n+ if (properties.getMaximumRequestSize().compareTo(MIN_MAXIMUM_REQUEST_SIZE) < 0\n+ || properties.getMaximumRequestSize().compareTo(MAX_MAXIMUM_REQUEST_SIZE) > 0) {\n+ errors.rejectValue(\"maximumRequestSize\",\n+ \"Must be at least \" + MIN_MAXIMUM_REQUEST_SIZE + \" and not more than \" + MAX_MAXIMUM_REQUEST_SIZE + \".\");\n+ }\n+ }\n+\n+}\ndiff --git a/services/submission/src/main/resources/application.yaml b/services/submission/src/main/resources/application.yaml\n--- a/services/submission/src/main/resources/application.yaml\n+++ b/services/submission/src/main/resources/application.yaml\n@@ -23,6 +23,8 @@ services:\n random-key-padding-multiplier: ${RANDOM_KEY_PADDING_MULTIPLIER:1}\n # The ApacheHttpClient's connection pool size.\n connection-pool-size: 200\n+ # The maximum request size accepted by the SubmissionController (e.g. 200B or 100KB).\n+ maximum-request-size: ${MAXIMUM_REQUEST_SIZE:100KB}\n payload:\n # The maximum number of keys accepted for any submission.\n max-number-of-keys: 14\n", "test_patch": "diff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigValidatorTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigValidatorTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfigValidatorTest.java\n@@ -0,0 +1,86 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.config;\n+\n+\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.params.ParameterizedTest;\n+import org.junit.jupiter.params.provider.Arguments;\n+import org.junit.jupiter.params.provider.MethodSource;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.test.context.SpringBootTest;\n+import org.springframework.test.context.ActiveProfiles;\n+import org.springframework.util.unit.DataSize;\n+import org.springframework.validation.BeanPropertyBindingResult;\n+import org.springframework.validation.Errors;\n+import java.util.stream.Stream;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT)\n+@ActiveProfiles({\"disable-ssl-client-verification\", \"disable-ssl-client-verification-verify-hostname\"})\n+class SubmissionServiceConfigValidatorTest {\n+\n+ @Autowired\n+ private SubmissionServiceConfigValidator submissionServiceConfigValidator;\n+\n+ private SubmissionServiceConfig submissionServiceConfig;\n+\n+ @BeforeEach\n+ void setup() {\n+ submissionServiceConfig = new SubmissionServiceConfig();\n+ }\n+\n+ @ParameterizedTest\n+ @MethodSource(\"validRequestDataSizes\")\n+ void ok(DataSize dataSize) {\n+ Errors errors = validateConfig(dataSize);\n+ assertThat(errors.hasErrors()).isFalse();\n+ }\n+\n+ @ParameterizedTest\n+ @MethodSource(\"invalidRequestDataSizes\")\n+ void fail(DataSize dataSize) {\n+ Errors errors = validateConfig(dataSize);\n+ assertThat(errors.hasErrors()).isTrue();\n+ }\n+\n+ private Errors validateConfig(DataSize dataSize) {\n+ Errors errors = new BeanPropertyBindingResult(submissionServiceConfig, \"submissionServiceConfig\");\n+ submissionServiceConfig.setMaximumRequestSize(dataSize);\n+ submissionServiceConfigValidator.validate(submissionServiceConfig, errors);\n+ return errors;\n+ }\n+\n+ private static Stream validRequestDataSizes() {\n+ return Stream.of(\n+ SubmissionServiceConfigValidator.MAX_MAXIMUM_REQUEST_SIZE,\n+ SubmissionServiceConfigValidator.MIN_MAXIMUM_REQUEST_SIZE\n+ ).map(Arguments::of);\n+ }\n+\n+ private static Stream invalidRequestDataSizes() {\n+ return Stream.of(\n+ DataSize.ofBytes(SubmissionServiceConfigValidator.MAX_MAXIMUM_REQUEST_SIZE.toBytes() + 1),\n+ DataSize.ofBytes(SubmissionServiceConfigValidator.MIN_MAXIMUM_REQUEST_SIZE.toBytes() - 1)\n+ ).map(Arguments::of);\n+ }\n+}\ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/RequestExecutor.java\n@@ -62,6 +62,10 @@ public ResponseEntity execute(HttpMethod method, RequestEntity executePost(Collection keys, HttpHeaders headers) {\n SubmissionPayload body = SubmissionPayload.newBuilder().addAllKeys(keys).build();\n+ return executePost(body, headers);\n+ }\n+\n+ public ResponseEntity executePost(SubmissionPayload body, HttpHeaders headers) {\n return execute(HttpMethod.POST, new RequestEntity<>(body, headers, HttpMethod.POST, SUBMISSION_URL));\n }\n \ndiff --git a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n--- a/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n+++ b/services/submission/src/test/java/app/coronawarn/server/services/submission/controller/SubmissionControllerTest.java\n@@ -45,9 +45,12 @@\n import static org.springframework.http.HttpStatus.METHOD_NOT_ALLOWED;\n import static org.springframework.http.HttpStatus.OK;\n \n+\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n+import app.coronawarn.server.common.protocols.internal.SubmissionPayload;\n+import app.coronawarn.server.services.submission.config.SubmissionPayloadSizeFilter;\n import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n import app.coronawarn.server.services.submission.monitoring.SubmissionMonitor;\n import app.coronawarn.server.services.submission.verification.TanVerifier;\n@@ -104,7 +107,13 @@ public void setUpMocks() {\n \n @Test\n void checkResponseStatusForValidParameters() {\n- ResponseEntity actResponse = executor.executePost(buildPayloadWithMultipleKeys(), buildOkHeaders());\n+ ResponseEntity actResponse = executor.executePost(buildPayload(buildMultipleKeys()), buildOkHeaders());\n+ assertThat(actResponse.getStatusCode()).isEqualTo(OK);\n+ }\n+\n+ @Test\n+ void checkResponseStatusForValidParametersWithPadding() {\n+ ResponseEntity actResponse = executor.executePost(buildPayloadWithPadding(), buildOkHeaders());\n assertThat(actResponse.getStatusCode()).isEqualTo(OK);\n }\n \n@@ -116,10 +125,9 @@ void check400ResponseStatusForInvalidParameters() {\n \n @Test\n void singleKeyWithOutdatedRollingStartIntervalNumberDoesNotGetSaved() {\n- Collection keys = buildPayloadWithSingleOutdatedKey();\n ArgumentCaptor> argument = ArgumentCaptor.forClass(Collection.class);\n \n- executor.executePost(keys, buildOkHeaders());\n+ executor.executePost(buildPayload(createOutdatedKey()), buildOkHeaders());\n \n verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(argument.capture());\n assertThat(argument.getValue()).isEmpty();\n@@ -127,12 +135,12 @@ void singleKeyWithOutdatedRollingStartIntervalNumberDoesNotGetSaved() {\n \n @Test\n void keysWithOutdatedRollingStartIntervalNumberDoNotGetSaved() {\n- Collection submittedKeys = buildPayloadWithMultipleKeys();\n+ Collection submittedKeys = buildMultipleKeys();\n TemporaryExposureKey outdatedKey = createOutdatedKey();\n submittedKeys.add(outdatedKey);\n ArgumentCaptor> argument = ArgumentCaptor.forClass(Collection.class);\n \n- executor.executePost(submittedKeys, buildOkHeaders());\n+ executor.executePost(buildPayload(submittedKeys), buildOkHeaders());\n \n verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(argument.capture());\n submittedKeys.remove(outdatedKey);\n@@ -141,10 +149,10 @@ void keysWithOutdatedRollingStartIntervalNumberDoNotGetSaved() {\n \n @Test\n void checkSaveOperationCallAndFakeDelayUpdateForValidParameters() {\n- Collection submittedKeys = buildPayloadWithMultipleKeys();\n+ Collection submittedKeys = buildMultipleKeys();\n ArgumentCaptor> argument = ArgumentCaptor.forClass(Collection.class);\n \n- executor.executePost(submittedKeys, buildOkHeaders());\n+ executor.executePost(buildPayload(submittedKeys), buildOkHeaders());\n \n verify(diagnosisKeyService, atLeastOnce()).saveDiagnosisKeys(argument.capture());\n verify(fakeDelayManager, times(1)).updateFakeRequestDelay(anyLong());\n@@ -200,6 +208,12 @@ void invalidTanHandling() {\n assertThat(actResponse.getStatusCode()).isEqualTo(FORBIDDEN);\n }\n \n+ @Test\n+ void invalidSubmissionPayload() {\n+ ResponseEntity actResponse = executor.executePost(buildPayloadWithTooLargePadding(), buildOkHeaders());\n+ assertThat(actResponse.getStatusCode()).isEqualTo(BAD_REQUEST);\n+ }\n+\n @Test\n void checkRealRequestHandlingIsMonitored() {\n executor.executePost(buildPayloadWithOneKey(), buildOkHeaders());\n@@ -222,7 +236,35 @@ void checkInvalidTanHandlingIsMonitored() {\n verify(submissionMonitor, times(1)).incrementInvalidTanRequestCounter();\n }\n \n- private Collection buildPayloadWithMultipleKeys() {\n+ private SubmissionPayload buildPayload(TemporaryExposureKey key) {\n+ Collection keys = Stream.of(key).collect(Collectors.toCollection(ArrayList::new));\n+ return buildPayload(keys);\n+ }\n+\n+ private SubmissionPayload buildPayload(Collection keys) {\n+ return SubmissionPayload.newBuilder()\n+ .addAllKeys(keys)\n+ .build();\n+ }\n+\n+ private SubmissionPayload buildPayloadWithPadding() {\n+ return SubmissionPayload.newBuilder()\n+ .addAllKeys(buildMultipleKeys())\n+ .setPadding(ByteString.copyFrom(\"PaddingString\".getBytes()))\n+ .build();\n+ }\n+\n+ private SubmissionPayload buildPayloadWithTooLargePadding() {\n+ int exceedingSize = (int) (2 * config.getMaximumRequestSize().toBytes());\n+ byte[] bytes = new byte[exceedingSize];\n+\n+ return SubmissionPayload.newBuilder()\n+ .addAllKeys(buildMultipleKeys())\n+ .setPadding(ByteString.copyFrom(bytes))\n+ .build();\n+ }\n+\n+ private Collection buildMultipleKeys() {\n int rollingStartIntervalNumber1 = createRollingStartIntervalNumber(config.getRetentionDays() - 1);\n int rollingStartIntervalNumber2 = rollingStartIntervalNumber1 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n int rollingStartIntervalNumber3 = rollingStartIntervalNumber2 + DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n@@ -233,11 +275,6 @@ private Collection buildPayloadWithMultipleKeys() {\n .collect(Collectors.toCollection(ArrayList::new));\n }\n \n- private Collection buildPayloadWithSingleOutdatedKey() {\n- TemporaryExposureKey outdatedKey = createOutdatedKey();\n- return Stream.of(outdatedKey).collect(Collectors.toCollection(ArrayList::new));\n- }\n-\n private TemporaryExposureKey createOutdatedKey() {\n return TemporaryExposureKey.newBuilder()\n .setKeyData(ByteString.copyFromUtf8(VALID_KEY_DATA_2))\n@@ -246,14 +283,13 @@ private TemporaryExposureKey createOutdatedKey() {\n .setTransmissionRiskLevel(5).build();\n }\n \n- private static Collection buildPayloadWithInvalidKey() {\n- return Stream.of(\n- buildTemporaryExposureKey(VALID_KEY_DATA_1, createRollingStartIntervalNumber(2), 999))\n- .collect(Collectors.toCollection(ArrayList::new));\n+ private SubmissionPayload buildPayloadWithInvalidKey() {\n+ TemporaryExposureKey invalidKey = buildTemporaryExposureKey(VALID_KEY_DATA_1, createRollingStartIntervalNumber(2), 999);\n+ return buildPayload(invalidKey);\n }\n \n private void assertElementsCorrespondToEachOther(Collection submittedTemporaryExposureKeys,\n- Collection savedDiagnosisKeys) {\n+ Collection savedDiagnosisKeys) {\n \n Set submittedDiagnosisKeys = submittedTemporaryExposureKeys.stream()\n .map(submittedDiagnosisKey -> DiagnosisKey.builder().fromProtoBuf(submittedDiagnosisKey).build())\ndiff --git a/services/submission/src/test/resources/application.yaml b/services/submission/src/test/resources/application.yaml\n--- a/services/submission/src/test/resources/application.yaml\n+++ b/services/submission/src/test/resources/application.yaml\n@@ -23,6 +23,7 @@ services:\n retention-days: 14\n random-key-padding-multiplier: 10\n connection-pool-size: 200\n+ maximum-request-size: 100KB\n payload:\n max-number-of-keys: 14\n verification:\n", "problem_statement": "Plausible Deniability: Add \"Padding\" property to submission payload\nCurrently, mobile apps are collecting keys based on their install date. When a user uploads his keys (after being tested positive), the payload will contain 1-13 keys. Although the traffic between mobile & server is secured, an attacker may still sniff the packages in the network and predict, based on the request size, how many keys are probably part of the submission request. This may then lead to additional information for the attacker in an attempt to deanonymize a user.\r\n\r\nIn order to mitigate this attack, add a new field to the submission payload, called `padding` of type string. The field shall be optional and must not break compatibility to the current/older mobile implementations (which should be given due to the use of protobuf). The server shall not process this field.\n", "hints_text": "", "created_at": "2020-07-10T07:37:14Z"}
{"repo": "corona-warn-app/cwa-server", "pull_number": 661, "instance_id": "corona-warn-app__cwa-server-661", "issue_numbers": ["547", "589"], "base_commit": "659008e984907e315e01f18095d02f70e1648fbb", "patch": "diff --git a/.circleci/config.yml b/.circleci/config.yml\n--- a/.circleci/config.yml\n+++ b/.circleci/config.yml\n@@ -2,10 +2,17 @@ version: 2.1\n jobs:\n build:\n working_directory: ~/cwa-server\n- docker:\n- - image: circleci/openjdk:11-jdk\n+ machine:\n+ image: ubuntu-1604:202004-01\n+ docker_layer_caching: true\n steps:\n - checkout\n+ - run:\n+ name: Update to OpenJDK 11\n+ command: |\n+ sudo apt-get install openjdk-11-jre\n+ sudo update-alternatives --set java /usr/lib/jvm/java-11-openjdk-amd64/bin/java\n+ java -version\n - run:\n name: Generate cumulative pom.xml checksum\n command: |\n@@ -14,15 +21,22 @@ jobs:\n when: always\n - restore_cache:\n key: cwa-server-{{ checksum \"~/pom-checksum\" }}\n- - run: mvn --batch-mode dependency:go-offline\n+ - run: ./mvnw --batch-mode dependency:go-offline\n - run:\n name: Analyze on SonarCloud\n- command: mvn --batch-mode verify sonar:sonar --fail-never\n+ command: |\n+ export JAVA_HOME=/usr/lib/jvm/java-11-openjdk-amd64\n+ ./mvnw --batch-mode verify sonar:sonar --fail-never\n - save_cache:\n paths:\n - ~/.m2\n key: cwa-server-{{ checksum \"~/pom-checksum\" }}\n- - run: mvn --batch-mode package\n+ - run:\n+ name: Run all tests on Docker\n+ command: |\n+ docker-compose -f docker-compose-it.yaml up -d objectstore\n+ docker-compose -f docker-compose-it.yaml up -d create-bucket\n+ docker-compose -f docker-compose-it.yaml run run-tests\n - run:\n name: Save test results\n command: |\ndiff --git a/.env b/.env\n--- a/.env\n+++ b/.env\n@@ -6,6 +6,15 @@ POSTGRES_DB=cwa\n POSTGRES_USER=postgres\n POSTGRES_PASSWORD=postgres\n \n+POSTGRES_DISTRIBUTION_USER=local_setup_distribution\n+POSTGRES_DISTRIBUTION_PASSWORD=local_setup_distribution\n+\n+POSTGRES_SUBMISSION_USER=local_setup_submission\n+POSTGRES_SUBMISSION_PASSWORD=local_setup_submission\n+\n+POSTGRES_FLYWAY_USER=local_setup_flyway\n+POSTGRES_FLYWAY_PASSWORD=local_setup_flyway\n+\n # Docker Compose PgAdmin settings\n PGADMIN_DEFAULT_EMAIL=user@domain.com\n PGADMIN_DEFAULT_PASSWORD=password\ndiff --git a/.gitattributes b/.gitattributes\n--- a/.gitattributes\n+++ b/.gitattributes\n@@ -1 +1,3 @@\n wait-for-it.sh text eol=lf\n+maven-wrapper.properties text eol=lf\n+mvnw text eol=lf\ndiff --git a/.github/pull_request_template.md b/.github/pull_request_template.md\n--- a/.github/pull_request_template.md\n+++ b/.github/pull_request_template.md\n@@ -7,6 +7,7 @@ Before submitting, please take the time to check the points below and provide so\n * [ ] [Link your Pull Request to an issue](https://help.github.com/en/github/managing-your-work-on-github/linking-a-pull-request-to-an-issue) (if applicable)\n * [ ] Create Work In Progress [WIP] pull requests only if you need clarification or an explicit review before you can continue your work item.\n * [ ] Make sure that your PR is not introducing _unncessary_ reformatting (e.g., introduced by on-save hooks in your IDE)\n+* [ ] Make sure each new `.java` source file you add has a correct license header.\n \n -->\n \ndiff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml\n--- a/.github/workflows/codeql-analysis.yml\n+++ b/.github/workflows/codeql-analysis.yml\n@@ -2,7 +2,7 @@ name: \"Code scanning - action\"\n \n on:\n push:\n- branches: \n+ branches:\n - master\n \n jobs:\n@@ -22,14 +22,14 @@ jobs:\n uses: github/codeql-action/init@v1\n with:\n languages: java\n- \n+\n - name: Java Setup\n uses: actions/setup-java@v1\n with:\n java-version: 11\n \n - name: Build\n- run: mvn --batch-mode clean compile\n+ run: ./mvnw --batch-mode clean compile\n \n - name: Perform CodeQL Analysis\n uses: github/codeql-action/analyze@v1\ndiff --git a/CODEOWNERS b/CODEOWNERS\n--- a/CODEOWNERS\n+++ b/CODEOWNERS\n@@ -5,4 +5,4 @@\n # For more details, read the following article on GitHub: https://help.github.com/articles/about-codeowners/.\n \n # These are the default owners for the whole content of this repository. The default owners are automatically added as reviewers when you open a pull request, unless different owners are specified in the file.\n-* @christian-kirschnick @johanneseschrig @michael-burwig @pithumke @ole-lilienthal @MKusber @stevesap @UnchartedBull\n+* @christian-kirschnick @johanneseschrig @michael-burwig @pithumke @ole-lilienthal @MKusber @stevesap @UnchartedBull @hilmarf @sorin-stefan-iovita-sap @KevponSAP @EvgeniiSkrebtcov @ioangut @kilbphilippSAP @emmetsap @EugenM-SAP @fredrb\ndiff --git a/CONTRIBUTING.md b/CONTRIBUTING.md\n--- a/CONTRIBUTING.md\n+++ b/CONTRIBUTING.md\n@@ -50,6 +50,10 @@ The following rule governs documentation contributions:\n \n * Commits should be as small as possible while ensuring that each commit is correct independently (i.e., each commit should compile and pass tests).\n \n+* Make sure each new `.java` source file you add has a correct license header. This is enforced by a blocking Github Action on your pull request. To add the correct license header, either:\n+ * Add it manually by copying it from another file.\n+ * Run `mvn license:update-file-header` in the root directory to quickly generate missing headers everywhere.\n+\n * Test your changes as thoroughly as possible before you commit them. Preferably, automate your test by unit/integration tests. If tested manually, provide information about the test scope in the PR description (e.g. \u201cTest passed: Upgrade version from 0.42 to 0.42.23.\u201d).\n \n * Create _Work In Progress [WIP]_ pull requests only if you need clarification or an explicit review before you can continue your work item.\ndiff --git a/README.md b/README.md\n--- a/README.md\n+++ b/README.md\n@@ -23,13 +23,13 @@\n Licensing\n \n \n-The goal of this project is to develop the official Corona-Warn-App for Germany based on the exposure notification API from [Apple](https://www.apple.com/covid19/contacttracing/) and [Google](https://www.google.com/covid19/exposurenotifications/). The apps (for both iOS and Android) use Bluetooth technology to exchange anonymous encrypted data with other mobile phones (on which the app is also installed) in the vicinity of an app user's phone. The data is stored locally on each user's device, preventing authorities or other parties from accessing or controlling the data. This repository contains the **implementation of the server for encryption keys** for the Corona-Warn-App. This implementation is still a **work in progress**, and the code it contains is currently alpha-quality code.\n+The goal of this project is to develop the official Corona-Warn-App for Germany based on the exposure notification API from [Apple](https://www.apple.com/covid19/contacttracing/) and [Google](https://www.google.com/covid19/exposurenotifications/). The apps (for both iOS and Android) use Bluetooth technology to exchange anonymous encrypted data with other mobile phones (on which the app is also installed) in the vicinity of an app user's phone. The data is stored locally on each user's device, preventing authorities or other parties from accessing or controlling the data. This repository contains the **implementation of the server for encryption keys** for the Corona-Warn-App.\n \n In this documentation, Corona-Warn-App services are also referred to as CWA services.\n \n ## Architecture Overview\n \n-You can find the architecture overview [here](/docs/architecture-overview.md), which will give you\n+You can find the architecture overview [here](/docs/ARCHITECTURE.md), which will give you\n a good starting point in how the backend services interact with other services, and what purpose\n they serve.\n \n@@ -49,7 +49,7 @@ If you want to use Docker-based deployment, you need to install Docker on your l\n \n #### Running the Full CWA Backend Using Docker Compose\n \n-For your convenience, a full setup including the generation of test data has been prepared using [Docker Compose](https://docs.docker.com/compose/reference/overview/). To build the backend services, run ```docker-compose build``` in the repository's root directory. A default configuration file can be found under ```.env```in the root folder of the repository. The default values for the local Postgres and Zenko Cloudserver should be changed in this file before docker-compose is run.\n+For your convenience, a full setup including the generation of test data has been prepared using [Docker Compose](https://docs.docker.com/compose/reference/overview/). To build the backend services, run ```docker-compose build``` in the repository's root directory. A default configuration file can be found under ```.env``` in the root folder of the repository. The default values for the local Postgres and Zenko Cloudserver should be changed in this file before docker-compose is run.\n \n Once the services are built, you can start the whole backend using ```docker-compose up```.\n The distribution service runs once and then finishes. If you want to trigger additional distribution runs, run ```docker-compose run distribution```.\n@@ -60,10 +60,10 @@ Service | Description | Endpoint and Default Credentials\n ------------------|-------------|-----------\n submission | The Corona-Warn-App submission service | `http://localhost:8000` `http://localhost:8006` (for actuator endpoint)\n distribution | The Corona-Warn-App distribution service | NO ENDPOINT\n-postgres | A [postgres] database installation | `postgres:8001` Username: postgres Password: postgres\n+postgres | A [postgres] database installation | `localhost:8001` `postgres:5432` (from containerized pgadmin) Username: postgres Password: postgres\n pgadmin | A [pgadmin](https://www.pgadmin.org/) installation for the postgres database | `http://localhost:8002` Username: user@domain.com Password: password\n cloudserver | [Zenko CloudServer] is a S3-compliant object store | `http://localhost:8003/` Access key: accessKey1 Secret key: verySecretKey1\n-verification-fake | A very simple fake implementation for the tan verification. | `http://localhost:8004/version/v1/tan/verify` The only valid tan is \"edc07f08-a1aa-11ea-bb37-0242ac130002\"\n+verification-fake | A very simple fake implementation for the tan verification. | `http://localhost:8004/version/v1/tan/verify` The only valid tan is `edc07f08-a1aa-11ea-bb37-0242ac130002`.\n \n ##### Known Limitation\n \n@@ -97,6 +97,32 @@ To prepare your machine to run the CWA project locally, we recommend that you fi\n * [Postgres]\n * [Zenko CloudServer]\n \n+If you are already running a local Postgres, you need to create a database `cwa` and run the following setup scripts:\n+\n+* Create the different CWA roles first by executing [create-roles.sql](setup/create-roles.sql).\n+* Create local database users for the specific roles by running [create-users.sql](./local-setup/create-users.sql).\n+* It is recommended to also run [enable-test-data-docker-compose.sql](./local-setup/enable-test-data-docker-compose.sql)\n+, which enables the test data generation profile. If you already had CWA running before and an existing `diagnosis-key`\n+table on your database, you need to run [enable-test-data.sql](./local-setup/enable-test-data.sql) instead.\n+\n+You can also use `docker-compose` to start Postgres and Zenko. If you do that, you have to\n+set the following environment-variables when running the Spring project:\n+\n+For the distribution module:\n+\n+```bash\n+POSTGRESQL_SERVICE_PORT=8001\n+VAULT_FILESIGNING_SECRET=\n+SPRING_PROFILES_ACTIVE=signature-dev,disable-ssl-client-postgres\n+```\n+\n+For the submission module:\n+\n+```bash\n+POSTGRESQL_SERVICE_PORT=8001\n+SPRING_PROFILES_ACTIVE=disable-ssl-server,disable-ssl-client-postgres,disable-ssl-client-verification,disable-ssl-client-verification-verify-hostname\n+```\n+\n #### Configure\n \n After you made sure that the specified dependencies are running, configure them in the respective configuration files.\n@@ -126,7 +152,7 @@ If you want to start the submission service, for example, you start it as follow\n To enable the `DEBUG` log level, you can run the application using the Spring `dev` profile.\n \n ```bash\n-mvn spring-boot:run -Dspring-boot.run.profiles=dev\n+mvn spring-boot:run -Dspring.profiles.active=dev\n ```\n \n To be able to set breakpoints (e.g. in IntelliJ), it may be necessary to use the ```-Dspring-boot.run.fork=false``` parameter.\n@@ -135,8 +161,8 @@ To be able to set breakpoints (e.g. in IntelliJ), it may be necessary to use the\n \n The API that is being exposed by the backend services is documented in an [OpenAPI](https://www.openapis.org/) specification. The specification files are available at the following locations:\n \n-Service | OpenAPI Specification\n--------------|-------------\n+Service | OpenAPI Specification\n+--------------------------|-------------\n Submission Service | [services/submission/api_v1.json](https://github.com/corona-warn-app/cwa-server/raw/master/services/submission/api_v1.json)\n Distribution Service | [services/distribution/api_v1.json](https://github.com/corona-warn-app/cwa-server/raw/master/services/distribution/api_v1.json)\n \n@@ -144,26 +170,20 @@ Distribution Service | [services/distribution/api_v1.json](https://github.c\n \n ### Distribution\n \n-Profile | Effect\n------------------|-------------\n-`dev` | Turns the log level to `DEBUG`.\n-`cloud` | Removes default values for the `datasource` and `objectstore` configurations.\n-`demo` | Includes incomplete days and hours into the distribution run, thus creating aggregates for the current day and the current hour (and including both in the respective indices). When running multiple distributions in one hour with this profile, the date aggregate for today and the hours aggregate for the current hour will be updated and overwritten. This profile also turns off the expiry policy (Keys must be expired for at least 2 hours before distribution) and the shifting policy (there must be at least 140 keys in a distribution).\n-`testdata` | Causes test data to be inserted into the database before each distribution run. By default, around 1000 random diagnosis keys will be generated per hour. If there are no diagnosis keys in the database yet, random keys will be generated for every hour from the beginning of the retention period (14 days ago at 00:00 UTC) until one hour before the present hour. If there are already keys in the database, the random keys will be generated for every hour from the latest diagnosis key in the database (by submission timestamp) until one hour before the present hour (or none at all, if the latest diagnosis key in the database was submitted one hour ago or later).\n-`signature-dev` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp-dev` so that test certificates (instead of production certificates) will be used for client-side validation.\n-`signature-prod` | Provides production app package IDs for the signature info\n+See [Distribution Service - Spring Profiles](/docs/DISTRIBUTION.md#spring-profiles).\n \n ### Submission\n \n-Profile | Effect\n--------------|-------------\n-`dev` | Turns the log level to `DEBUG`.\n-`cloud` | Removes default values for the `datasource` configuration.\n+See [Submission Service - Spring Profiles](/docs/SUBMISSION.md#spring-profiles).\n \n ## Documentation\n \n The full documentation for the Corona-Warn-App can be found in the [cwa-documentation](https://github.com/corona-warn-app/cwa-documentation) repository. The documentation repository contains technical documents, architecture information, and whitepapers related to this implementation.\n \n+The documentation for cwa-server can be found under the [/docs](./docs) folder.\n+\n+The JavaDoc documentation for cwa-server is hosted by Github Pages at [https://corona-warn-app.github.io/cwa-server](https://corona-warn-app.github.io/cwa-server).\n+\n ## Support and Feedback\n \n The following channels are available for discussions, feedback, and support requests:\ndiff --git a/common/persistence/pom.xml b/common/persistence/pom.xml\n--- a/common/persistence/pom.xml\n+++ b/common/persistence/pom.xml\n@@ -5,7 +5,7 @@\n \n org.springframework.boot\n spring-boot-starter-parent\n- 2.3.0.RELEASE\n+ 2.3.1.RELEASE\n \n \n 4.0.0\n@@ -35,7 +35,7 @@\n \n \n org.springframework.boot\n- spring-boot-starter-data-jpa\n+ spring-boot-starter-data-jdbc\n \n \n org.springframework.boot\n@@ -73,10 +73,12 @@\n \n org.flywaydb\n flyway-core\n+ 6.4.3\n \n \n org.postgresql\n postgresql\n+ 42.2.13\n runtime\n \n \n@@ -111,8 +113,40 @@\n \n \n \n+ \n+ \n+ \n+ org.apache.maven.plugins\n+ maven-javadoc-plugin\n+ 3.2.0\n+ \n+ \n+ \n+ if (typeof useModuleDirectories !== 'undefined') {\n+ useModuleDirectories = false;\n+ }\n+ \n+ ]]>\n+ \n+ --allow-script-in-comments\n+ \n+ \n+ \n+ \n+\n \n \n+ \n+ org.apache.maven.plugins\n+ maven-site-plugin\n+ 3.7.1\n+ \n+ \n+ org.apache.maven.plugins\n+ maven-project-info-reports-plugin\n+ 3.0.0\n+ \n \n org.codehaus.mojo\n license-maven-plugin\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKey.java\n@@ -24,26 +24,22 @@\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.Builder;\n import app.coronawarn.server.common.persistence.domain.validation.ValidRollingStartIntervalNumber;\n+import app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestamp;\n import java.time.Instant;\n import java.time.LocalDateTime;\n import java.util.Arrays;\n import java.util.Objects;\n import java.util.Set;\n-import javax.persistence.Column;\n-import javax.persistence.Entity;\n-import javax.persistence.Id;\n-import javax.persistence.Table;\n import javax.validation.ConstraintViolation;\n import javax.validation.Validation;\n import javax.validation.Validator;\n import javax.validation.constraints.Size;\n import org.hibernate.validator.constraints.Range;\n+import org.springframework.data.annotation.Id;\n \n /**\n * A key generated for advertising over a window of time.\n */\n-@Entity\n-@Table(name = \"diagnosis_key\")\n public class DiagnosisKey {\n \n /**\n@@ -57,23 +53,20 @@ public class DiagnosisKey {\n \n @Id\n @Size(min = 16, max = 16, message = \"Key data must be a byte array of length 16.\")\n- @Column(unique = true)\n- private byte[] keyData;\n+ private final byte[] keyData;\n \n @ValidRollingStartIntervalNumber\n- private int rollingStartIntervalNumber;\n+ private final int rollingStartIntervalNumber;\n \n @Range(min = EXPECTED_ROLLING_PERIOD, max = EXPECTED_ROLLING_PERIOD,\n message = \"Rolling period must be \" + EXPECTED_ROLLING_PERIOD + \".\")\n- private int rollingPeriod;\n+ private final int rollingPeriod;\n \n @Range(min = 0, max = 8, message = \"Risk level must be between 0 and 8.\")\n- private int transmissionRiskLevel;\n+ private final int transmissionRiskLevel;\n \n- private long submissionTimestamp;\n-\n- protected DiagnosisKey() {\n- }\n+ @ValidSubmissionTimestamp\n+ private final long submissionTimestamp;\n \n /**\n * Should be called by builders.\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilder.java\n@@ -24,6 +24,7 @@\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.FinalBuilder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.RollingStartIntervalNumberBuilder;\n import static app.coronawarn.server.common.persistence.domain.DiagnosisKeyBuilders.TransmissionRiskLevelBuilder;\n+import static app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestampValidator.SECONDS_PER_HOUR;\n \n import app.coronawarn.server.common.persistence.exception.InvalidDiagnosisKeyException;\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n@@ -47,7 +48,7 @@ public class DiagnosisKeyBuilder implements\n private int rollingStartIntervalNumber;\n private int rollingPeriod = DiagnosisKey.EXPECTED_ROLLING_PERIOD;\n private int transmissionRiskLevel;\n- private long submissionTimestamp = -1L;\n+ private Long submissionTimestamp = null;\n \n DiagnosisKeyBuilder() {\n }\n@@ -93,9 +94,9 @@ public FinalBuilder withRollingPeriod(int rollingPeriod) {\n \n @Override\n public DiagnosisKey build() {\n- if (submissionTimestamp < 0) {\n+ if (submissionTimestamp == null) {\n // hours since epoch\n- submissionTimestamp = Instant.now().getEpochSecond() / 3600L;\n+ submissionTimestamp = Instant.now().getEpochSecond() / SECONDS_PER_HOUR;\n }\n \n var diagnosisKey = new DiagnosisKey(\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestamp.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestamp.java\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestamp.java\n@@ -0,0 +1,58 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.common.persistence.domain.validation;\n+\n+import java.lang.annotation.Documented;\n+import java.lang.annotation.ElementType;\n+import java.lang.annotation.Retention;\n+import java.lang.annotation.RetentionPolicy;\n+import java.lang.annotation.Target;\n+import javax.validation.Constraint;\n+import javax.validation.Payload;\n+\n+@Constraint(validatedBy = ValidSubmissionTimestampValidator.class)\n+@Target({ElementType.FIELD})\n+@Retention(RetentionPolicy.RUNTIME)\n+@Documented\n+public @interface ValidSubmissionTimestamp {\n+\n+ /**\n+ * Error message.\n+ *\n+ * @return the error message\n+ */\n+ String message() default \"Submission timestamp (hours since epoch)\"\n+ + \" must be greater or equal 0 and cannot be in the future.\";\n+\n+ /**\n+ * Groups.\n+ *\n+ * @return\n+ */\n+ Class>[] groups() default {};\n+\n+ /**\n+ * Payload.\n+ *\n+ * @return\n+ */\n+ Class extends Payload>[] payload() default {};\n+}\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestampValidator.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestampValidator.java\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/domain/validation/ValidSubmissionTimestampValidator.java\n@@ -0,0 +1,38 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.common.persistence.domain.validation;\n+\n+import java.time.Instant;\n+import java.util.concurrent.TimeUnit;\n+import javax.validation.ConstraintValidator;\n+import javax.validation.ConstraintValidatorContext;\n+\n+public class ValidSubmissionTimestampValidator\n+ implements ConstraintValidator {\n+\n+ public static final long SECONDS_PER_HOUR = TimeUnit.HOURS.toSeconds(1);\n+\n+ @Override\n+ public boolean isValid(Long submissionTimestamp, ConstraintValidatorContext constraintValidatorContext) {\n+ long currentHoursSinceEpoch = Instant.now().getEpochSecond() / SECONDS_PER_HOUR;\n+ return submissionTimestamp >= 0L && submissionTimestamp <= currentHoursSinceEpoch;\n+ }\n+}\ndiff --git a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n--- a/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n+++ b/common/persistence/src/main/java/app/coronawarn/server/common/persistence/repository/DiagnosisKeyRepository.java\n@@ -21,21 +21,32 @@\n package app.coronawarn.server.common.persistence.repository;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n-import org.springframework.data.jpa.repository.JpaRepository;\n-import org.springframework.data.jpa.repository.Modifying;\n-import org.springframework.data.jpa.repository.Query;\n+import org.springframework.data.jdbc.repository.query.Modifying;\n+import org.springframework.data.jdbc.repository.query.Query;\n+import org.springframework.data.repository.PagingAndSortingRepository;\n+import org.springframework.data.repository.query.Param;\n import org.springframework.stereotype.Repository;\n \n @Repository\n-public interface DiagnosisKeyRepository extends JpaRepository {\n+public interface DiagnosisKeyRepository extends PagingAndSortingRepository {\n \n /**\n- * Deletes all entries that have a submission timestamp lesser or equal to the specified one.\n+ * Counts all entries that have a submission timestamp less or equal than the specified one.\n+ *\n+ * @param submissionTimestamp The submission timestamp up to which entries will be expired.\n+ * @return The number of expired keys.\n+ */\n+ @Query(\"SELECT COUNT(*) FROM diagnosis_key WHERE submission_timestamp<=:threshold\")\n+ int countOlderThanOrEqual(@Param(\"threshold\") long submissionTimestamp);\n+\n+ /**\n+ * Deletes all entries that have a submission timestamp less or equal than the specified one.\n *\n * @param submissionTimestamp The submission timestamp up to which entries will be deleted.\n- * @return The number of rows that were deleted.\n */\n- int deleteBySubmissionTimestampIsLessThanEqual(long submissionTimestamp);\n+ @Modifying\n+ @Query(\"DELETE FROM diagnosis_key WHERE submission_timestamp<=:threshold\")\n+ void deleteOlderThanOrEqual(@Param(\"threshold\") long submissionTimestamp);\n \n /**\n * Attempts to write the specified diagnosis key information into the database. If a row with the specified key data\n@@ -48,10 +59,14 @@ public interface DiagnosisKeyRepository extends JpaRepository diagnosisKeys) {\n * Returns all valid persisted diagnosis keys, sorted by their submission timestamp.\n */\n public List getDiagnosisKeys() {\n- List diagnosisKeys = keyRepository.findAll(Sort.by(Direction.ASC, \"submissionTimestamp\"));\n+ List diagnosisKeys = createStreamFromIterator(\n+ keyRepository.findAll(Sort.by(Direction.ASC, \"submissionTimestamp\")).iterator()).collect(Collectors.toList());\n List validDiagnosisKeys =\n diagnosisKeys.stream().filter(DiagnosisKeyService::isDiagnosisKeyValid).collect(Collectors.toList());\n \n@@ -109,9 +112,10 @@ public void applyRetentionPolicy(int daysToRetain) {\n long threshold = LocalDateTime\n .ofInstant(Instant.now(), UTC)\n .minusDays(daysToRetain)\n- .toEpochSecond(UTC) / 3600L;\n- int numberOfDeletions = keyRepository.deleteBySubmissionTimestampIsLessThanEqual(threshold);\n- logger.info(\"Deleted {} diagnosis key(s) with a submission timestamp older than {} day(s) ago.\",\n+ .toEpochSecond(UTC) / SECONDS_PER_HOUR;\n+ int numberOfDeletions = keyRepository.countOlderThanOrEqual(threshold);\n+ logger.info(\"Deleting {} diagnosis key(s) with a submission timestamp older than {} day(s) ago.\",\n numberOfDeletions, daysToRetain);\n+ keyRepository.deleteOlderThanOrEqual(threshold);\n }\n }\ndiff --git a/common/persistence/src/main/resources/db/migration/postgres/V1__createTables.sql b/common/persistence/src/main/resources/db/migration/V1__createTables.sql\nsimilarity index 100%\nrename from common/persistence/src/main/resources/db/migration/postgres/V1__createTables.sql\nrename to common/persistence/src/main/resources/db/migration/V1__createTables.sql\ndiff --git a/common/persistence/src/main/resources/db/migration/h2/V1__createTables.sql b/common/persistence/src/main/resources/db/migration/h2/V1__createTables.sql\ndeleted file mode 100644\n--- a/common/persistence/src/main/resources/db/migration/h2/V1__createTables.sql\n+++ /dev/null\n@@ -1,7 +0,0 @@\n-CREATE TABLE diagnosis_key (\n- key_data bytea PRIMARY KEY,\n- rolling_period integer NOT NULL,\n- rolling_start_interval_number integer NOT NULL,\n- submission_timestamp bigint NOT NULL,\n- transmission_risk_level integer NOT NULL\n-);\ndiff --git a/common/persistence/src/main/resources/db/specific/h2/V2__createPermissions.sql b/common/persistence/src/main/resources/db/specific/h2/V2__createPermissions.sql\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/resources/db/specific/h2/V2__createPermissions.sql\n@@ -0,0 +1 @@\n+-- no permissions on H2 necessary\ndiff --git a/common/persistence/src/main/resources/db/specific/postgresql/V2__createPermissions.sql b/common/persistence/src/main/resources/db/specific/postgresql/V2__createPermissions.sql\nnew file mode 100644\n--- /dev/null\n+++ b/common/persistence/src/main/resources/db/specific/postgresql/V2__createPermissions.sql\n@@ -0,0 +1,2 @@\n+GRANT SELECT, DELETE ON TABLE diagnosis_key TO \"cwa_distribution\";\n+GRANT INSERT ON TABLE diagnosis_key TO \"cwa_submission\";\ndiff --git a/common/protocols/pom.xml b/common/protocols/pom.xml\n--- a/common/protocols/pom.xml\n+++ b/common/protocols/pom.xml\n@@ -20,7 +20,7 @@\n \n com.google.protobuf\n protobuf-java\n- 3.11.4\n+ 3.12.2\n \n \n \n@@ -46,7 +46,7 @@\n \n \n \n- com.google.protobuf:protoc:3.11.4:exe:${os.detected.classifier}\n+ com.google.protobuf:protoc:3.12.2:exe:${os.detected.classifier}\n \n \n \ndiff --git a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\n--- a/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\n+++ b/common/protocols/src/main/proto/app/coronawarn/server/common/protocols/internal/risk_score_parameters.proto\n@@ -59,6 +59,6 @@ message RiskScoreParameters {\n RiskLevel gt_27_le_33_dbm = 5; // 27 < A <= 33 dBm\n RiskLevel gt_15_le_27_dbm = 6; // 15 < A <= 27 dBm\n RiskLevel gt_10_le_15_dbm = 7; // 10 < A <= 15 dBm\n- RiskLevel lt_10_dbm = 8; // A <= 10 dBm, highest risk\n+ RiskLevel le_10_dbm = 8; // A <= 10 dBm, highest risk\n }\n-}\n\\ No newline at end of file\n+}\ndiff --git a/docker-compose-it.yaml b/docker-compose-it.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/docker-compose-it.yaml\n@@ -0,0 +1,41 @@\n+version: '3'\n+services:\n+ objectstore:\n+ image: \"zenko/cloudserver\"\n+ volumes:\n+ - objectstore_volume:/data\n+ ports:\n+ - \"8003:8000\"\n+ environment:\n+ ENDPOINT: objectstore\n+ REMOTE_MANAGEMENT_DISABLE: 1\n+ SCALITY_ACCESS_KEY_ID: ${OBJECTSTORE_ACCESSKEY}\n+ SCALITY_SECRET_ACCESS_KEY: ${OBJECTSTORE_SECRETKEY}\n+ create-bucket:\n+ image: amazon/aws-cli\n+ environment:\n+ - AWS_ACCESS_KEY_ID=${OBJECTSTORE_ACCESSKEY}\n+ - AWS_SECRET_ACCESS_KEY=${OBJECTSTORE_SECRETKEY}\n+ entrypoint: [\"/root/scripts/wait-for-it/wait-for-it.sh\", \"objectstore:8000\", \"-t\", \"30\", \"--\"]\n+ volumes:\n+ - ./scripts/wait-for-it:/root/scripts/wait-for-it\n+ command: aws s3api create-bucket --bucket cwa --endpoint-url http://objectstore:8000 --acl public-read\n+ depends_on:\n+ - objectstore\n+ run-tests:\n+ stop_signal: SIGKILL\n+ working_dir: $PWD\n+ environment:\n+ - CWA_OBJECTSTORE_ENDPOINT=http://objectstore\n+ - CWA_OBJECTSTORE_PORT=8000\n+ depends_on:\n+ - objectstore\n+ - create-bucket\n+ image: openjdk:11\n+ command: ./mvnw failsafe:integration-test --batch-mode package\n+ volumes:\n+ - $PWD:$PWD\n+ - /var/run/docker.sock:/var/run/docker.sock\n+ - ~/.m2:/root/.m2\n+volumes:\n+ objectstore_volume:\ndiff --git a/docker-compose.yml b/docker-compose.yml\n--- a/docker-compose.yml\n+++ b/docker-compose.yml\n@@ -11,14 +11,14 @@ services:\n - \"8000:8080\"\n - \"8006:8081\"\n environment:\n- SPRING_PROFILES_ACTIVE: dev\n+ SPRING_PROFILES_ACTIVE: dev,disable-ssl-server,disable-ssl-client-postgres,disable-ssl-client-verification,disable-ssl-client-verification-verify-hostname\n POSTGRESQL_SERVICE_PORT: '5432'\n POSTGRESQL_SERVICE_HOST: postgres\n POSTGRESQL_DATABASE: ${POSTGRES_DB}\n- POSTGRESQL_PASSWORD_SUBMISION: ${POSTGRES_PASSWORD}\n- POSTGRESQL_USER_SUBMISION: ${POSTGRES_USER}\n- POSTGRESQL_PASSWORD_FLYWAY: ${POSTGRES_PASSWORD}\n- POSTGRESQL_USER_FLYWAY: ${POSTGRES_USER}\n+ POSTGRESQL_PASSWORD_SUBMISION: ${POSTGRES_SUBMISSION_PASSWORD}\n+ POSTGRESQL_USER_SUBMISION: ${POSTGRES_SUBMISSION_USER}\n+ POSTGRESQL_PASSWORD_FLYWAY: ${POSTGRES_FLYWAY_PASSWORD}\n+ POSTGRESQL_USER_FLYWAY: ${POSTGRES_FLYWAY_USER}\n VERIFICATION_BASE_URL: http://verification-fake:8004\n distribution:\n build:\n@@ -29,14 +29,14 @@ services:\n - objectstore\n - create-bucket\n environment:\n- SPRING_PROFILES_ACTIVE: dev,signature-dev,testdata\n+ SPRING_PROFILES_ACTIVE: dev,signature-dev,testdata,disable-ssl-client-postgres\n POSTGRESQL_SERVICE_PORT: '5432'\n POSTGRESQL_SERVICE_HOST: postgres\n POSTGRESQL_DATABASE: ${POSTGRES_DB}\n- POSTGRESQL_PASSWORD_DISTRIBUTION: ${POSTGRES_PASSWORD}\n- POSTGRESQL_USER_DISTRIBUTION: ${POSTGRES_USER}\n- POSTGRESQL_PASSWORD_FLYWAY: ${POSTGRES_PASSWORD}\n- POSTGRESQL_USER_FLYWAY: ${POSTGRES_USER}\n+ POSTGRESQL_PASSWORD_DISTRIBUTION: ${POSTGRES_DISTRIBUTION_PASSWORD}\n+ POSTGRESQL_USER_DISTRIBUTION: ${POSTGRES_DISTRIBUTION_USER}\n+ POSTGRESQL_PASSWORD_FLYWAY: ${POSTGRES_FLYWAY_PASSWORD}\n+ POSTGRESQL_USER_FLYWAY: ${POSTGRES_FLYWAY_USER}\n # Settings for the S3 compatible objectstore\n CWA_OBJECTSTORE_ACCESSKEY: ${OBJECTSTORE_ACCESSKEY}\n CWA_OBJECTSTORE_SECRETKEY: ${OBJECTSTORE_SECRETKEY}\n@@ -60,6 +60,9 @@ services:\n POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}\n volumes:\n - postgres_volume:/data/postgres\n+ - ./setup/setup-roles.sql:/docker-entrypoint-initdb.d/1-roles.sql\n+ - ./local-setup/create-users.sql:/docker-entrypoint-initdb.d/2-users.sql\n+ - ./local-setup/enable-test-data-docker-compose.sql:/docker-entrypoint-initdb.d/3-enable-testdata.sql\n pgadmin:\n container_name: pgadmin_container\n image: dpage/pgadmin4\ndiff --git a/docs/architecture-overview.md b/docs/ARCHITECTURE.md\nsimilarity index 88%\nrename from docs/architecture-overview.md\nrename to docs/ARCHITECTURE.md\n--- a/docs/architecture-overview.md\n+++ b/docs/ARCHITECTURE.md\n@@ -1,17 +1,22 @@\n-# Architecture CWA Server\n+# CWA-Server Architecture\n \n This document outlines the CWA server architecture on high level. This document\n does not necessarily reflect the current implementation status in this repository, as development\n is still ongoing. Also, details of the exposure notification API by Google/Apple might change\n in the future.\n \n-Please note: This overview document only focuses on the architecture of this component.\n-If you are interested in the full architectural overview, check out the [solution architecture](https://github.com/corona-warn-app/cwa-documentation/blob/master/solution_architecture.md)\n-in the [cwa-documentation](https://github.com/corona-warn-app/cwa-documentation) repository.\n+The high level overview of CWA can be found in the [cwa-documentation](https://github.com/corona-warn-app/cwa-documentation)\n+repository. The [solution architecture](https://github.com/corona-warn-app/cwa-documentation/blob/master/solution_architecture.md)\n+is outlined in detail.\n+![Solution Architecture](https://raw.githubusercontent.com/corona-warn-app/cwa-documentation/master/images/solution_architecture/figure_1.svg)\n+\n+The above illustration shows all components of the CWA project. This repository reflects the `Corona-Warn-App Server`\n+component, which can be found in the left bottom corner. This document explains in more detail how this component\n+functions and interacts with other components.\n \n ## Overview\n \n-The Corona Warn App (\"CWA\") server runs in a Kubernetes cluster on the Open Shift (\u201cOSP\u201d) platform.\n+The Corona Warn App (\"CWA\") server runs in a Kubernetes cluster on the OpenShift (\u201cOCP\u201d) platform.\n Its main objective is to enable users to take part in the exposure notification framework based\n on Apple/Google specifications. Although CWA aims at compliance to the spec on a protocol level, it\n does not mean automatically that all features will be implemented. Main driver for these assessments is data privacy and protection (DPP) concerns.\n@@ -123,17 +128,19 @@ CWA-Fake: <0 or 1>\n There is currently no official specification for publishing diagnosis keys to the server.\n Google currently uses the following in their reference implementation.\n \n-[exposure_model.go](https://github.com/google/exposure-notifications-server/blob/master/internal/database/exposure_model.go)\n+[exposure_types.go](https://github.com/google/exposure-notifications-server/blob/master/pkg/api/v1alpha1/exposure_types.go)\n \n ```golang\n type Publish struct {\n- Keys []ExposureKey `json:\"temporaryExposureKeys\"`\n- Regions []string `json:\"regions\"`\n- AppPackageName string `json:\"appPackageName\"`\n- Platform string `json:\"platform\"`\n- DeviceVerificationPayload string `json:\"deviceVerificationPayload\"`\n- VerificationPayload string `json:\"verificationPayload\"`\n- Padding string `json:\"padding\"`\n+ Keys []ExposureKey `json:\"temporaryExposureKeys\"`\n+ Regions []string `json:\"regions\"`\n+ AppPackageName string `json:\"appPackageName\"`\n+ VerificationPayload string `json:\"verificationPayload\"`\n+ HMACKey string `json:\"hmackey\"`\n+ Padding string `json:\"padding\"`\n+\n+ Platform string `json:\"platform\"` // DEPRECATED\n+ DeviceVerificationPayload string `json:\"deviceVerificationPayload\"` // DEPRECATED\n }\n ```\n \ndiff --git a/docs/DISTRIBUTION.md b/docs/DISTRIBUTION.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/DISTRIBUTION.md\n@@ -0,0 +1,127 @@\n+# CWA-Server Distribution Service\n+\n+## Spring Profiles\n+\n+Spring profiles are used to apply distribution service configuration based on the running environment, determined by the active profile.\n+\n+You will find `.yaml` and `.xml` based profile-specific configuration files at [`/services/distribution/src/main/resources`](/services/distribution/src/main/resources).\n+\n+### Available Profiles\n+\n+Profile | Effect\n+------------------------------|-------------\n+`dev` | Sets the log level to `DEBUG` and changes the `CONSOLE_LOG_PATTERN` used by Log4j 2.\n+`cloud` | Removes default values for the `spring.flyway`, `spring.datasource` and `services.distribution.objectstore` configurations. Changes the distribution output path and turns off `set-public-read-acl-on-put-object`.\n+`demo` | Includes incomplete days and hours into the distribution run, thus creating aggregates for the current day and the current hour (and including both in the respective indices). When running multiple distributions in one hour with this profile, the date aggregate for today and the hours aggregate for the current hour will be updated and overwritten. This profile also turns off the expiry policy (Keys must be expired for at least 2 hours before distribution) and the shifting policy (there must be at least 140 keys in a distribution).\n+`testdata` | Causes test data to be inserted into the database before each distribution run. By default, around 1000 random diagnosis keys will be generated per hour. If there are no diagnosis keys in the database yet, random keys will be generated for every hour from the beginning of the retention period (14 days ago at 00:00 UTC) until one hour before the present hour. If there are already keys in the database, the random keys will be generated for every hour from the latest diagnosis key in the database (by submission timestamp) until one hour before the present hour (or none at all, if the latest diagnosis key in the database was submitted one hour ago or later).\n+`signature-dev` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp-dev` so that the non-productive/test public key will be used for client-side validation.\n+`signature-prod` | Sets the app package ID in the export packages' signature info to `de.rki.coronawarnapp` so that the productive public key will be used for client-side validation.\n+`disable-ssl-client-postgres` | Disables SSL for the connection to the postgres database.\n+\n+Please refer to the section [Configuration Properties](#configuration-properties) and the inline comments in the base `application.yaml` configuration file for further details on the configuration properties impacted by the above profiles.\n+\n+## Configuration Properties\n+\n+All of the configurable parameters, that are used throughout this service can be found in the\n+[`application.yaml`](/services/distribution/src/main/resources/application.yaml) file. This configuration file is\n+divided into different sub-categories:\n+\n+- Some general configuration, which isn't divided into sub-categories\n+- `paths` - Local paths, that are used during the export creation\n+- `tek-export` - Configuration for the exported archive, that is saved on the S3-compatible storage\n+- `api` - API configuration, configures the API, which is used by the mobile app to query diagnosis keys\n+- `signature` - Signature configuration, used for signing the exports\n+- `objectstore` - Configuration for the S3 compatible object storage\n+\n+## Object Store\n+\n+The communication with the S3 compatible object storage, that is hosted by Deutsche Telekom is achieved through AWS SDK\n+v2. The files, that will be uploaded to the S3 compatible storage are created on local storage first (output path\n+defined in application configuration) and are then uploaded to the storage provider.\n+\n+### Headers\n+\n+Up to three headers are set during upload, depending on the configuration properties.\n+\n+#### `Cache-Control`\n+\n+Defines the maximum amount of time a published resource is considered fresh, when held in cache. Will be set for each\n+upload. The default value is 300 seconds.\n+\n+#### `x-amz-acl`\n+\n+Defines the canned ACL for the uploaded file. Is only set if [`set-public-read-acl-on-put-object`] is set to true in the\n+configuration properties. Will be `public-read` in that case, which grants full control to the owners and read-access to\n+AllUsers. This setting should only be used when running with the application with the local Zenko Cloudserver.\n+\n+#### `cwa-hash`\n+\n+Custom header, which adds the MD5 hash of the archive contents (export.bin). If the file isn't an archive, the contents\n+of the file will be used to build the hash (index files). This header is used to determine, whether a file should be\n+uploaded or not. If the hash for the file is the same as the hash available on the S3 compatible storage it will not be\n+uploaded, since the contents of that specific file did not change, so there is no need to re-upload the file. If the\n+hash differs, or the file is not available on the S3 compatible storage the file will be uploaded.\n+\n+This header is needed, since it is not possible to create byte-identical archives when using ECDSA due to its\n+non-deterministic nature.\n+\n+### Threading\n+\n+The upload operations are being run in multiple threads in order to increase performance. The number of threads is\n+defined in the application configuration. Each upload operation is passed to Spring Boot's `ThreadPoolTaskExecutor`,\n+which then distributes them across the available threads. Once all tasks are submitted, the logic checks, whether all\n+threads have terminated before shutting down the thread pool. If errors are thrown, they are handled as explained in the\n+following section.\n+\n+### Error Handling\n+\n+In order to increase resilience of the distribution service two error handling measures were introduced.\n+\n+The first one being Spring Boot's Retry logic, which is applied to all S3 operations with the number of retries being\n+specified in the application configuration. This results in Spring Boot retrying the operation up to three times, with a\n+two second pause in between.\n+\n+The second part will catch operations, that have failed even after retrying them through SpringBoot's Retry logic. If\n+more than five uploads fail (can be configured in the application configuration) the program will terminate with an\n+error, if less than five operations have failed so far the error will just be logged to console, but the upload will\n+continue.\n+\n+The error handling is designed to handle intermediate errors, like short connection problems. If too many operations\n+fail it is safe to assume, that a bigger problem is occurring and that subsequent operations will also fail. In this\n+case the program is terminated to prevent unnecessary load.\n+\n+### Retention\n+\n+The same 14 days retention period (like the database) is also enforced on the S3 compatible storage. Each distribution\n+run will execute the retention policy.\n+\n+When data deletion is executed on the object store, the object store is instructed to delete all files with the following\n+prefix:\n+\n+`version/v1/diagnosis-keys/country/DE/`\n+\n+In which `` stands for the ISO formatted date (e.g. `2012-06-05`), and is before the retention cutoff date\n+(today - 14 days).\n+\n+## Assembly Process\n+\n+The exported diagnosis-keys are being organized in hourly and daily archives. The folder structure is as follows:\n+`/version//diagnosis-keys/country//date//hour//index`. The version, country,\n+date and hour directory also contain an index file each, listing all the subdirectories. All generated files are named\n+`index`, which acts as a workaround to also support files & folders with the same name - e.g.\n+`version/v1/diagnosis-keys/country` is both a file and the folder `version/v1/diagnosis-keys/country/`. S3 supports this\n+concept, but writing this structure to the local disk is not supported. Therefore, this country file will be assembled as\n+`version/v1/diagnosis-keys/country/index`. The `/index` part will then be removed upon S3 upload.\n+\n+For each assembly run the diagnosis keys for the last 14 days are queried. Based on the result, hour and their parent\n+directories are created and the keys are added to their respective archives. To which archive the key should be added is\n+determined by the distribution timestamp.\n+\n+The diagnosis keys need to be expired for at least two hours, before they can be distributed. This means that if the key\n+has been submitted within two hours after the expiry date, it cannot be published immediately. Therefore a distribution\n+timestamp is calculated, which is either the submission timestamp, or, if the submission timestamp is within two hours\n+after the expiry date, the expiry date plus two hours. This ensures compliance with the specification from Google and\n+Apple.\n+\n+Each run creates all hourly and daily archives for the last 14 days. To prevent unnecessary uploads the\n+[`cwa-hash`](#cwa-hash) header has been introduced.\ndiff --git a/docs/INFRASTRUCTURE.md b/docs/INFRASTRUCTURE.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/INFRASTRUCTURE.md\n@@ -0,0 +1 @@\n+# CWA-Server Infrastructure\ndiff --git a/docs/PERSISTENCE.md b/docs/PERSISTENCE.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/PERSISTENCE.md\n@@ -0,0 +1 @@\n+# CWA-Server Persistence\ndiff --git a/docs/QUALITY_ASSURANCE.md b/docs/QUALITY_ASSURANCE.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/QUALITY_ASSURANCE.md\n@@ -0,0 +1 @@\n+# CWA-Server Quality Assurance\ndiff --git a/docs/README.md b/docs/README.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/README.md\n@@ -0,0 +1,11 @@\n+# CWA-Server Documentation\n+\n+| Documentation | Description |\n+| --- | --- |\n+| [Architecture](./ARCHITECTURE.md) | Architectural overview |\n+| [Submission Service](./SUBMISSION.md) | Documentation of the submission service |\n+| [Distribution Service](./DISTRIBUTION.md) | Documentation of the distribution service |\n+| [Persistence](./PERSISTENCE.md) | Documentation of the persistence module |\n+| [Infrastructure](./INFRASTRUCTURE.md) | Documentation of infrastructure related topics |\n+| [Quality Assurance](./QUALITY_ASSURANCE.md) | Documentation of testing and quality assurance |\n+| [Security](./SECURITY.md) | Documentation of security related topics |\ndiff --git a/docs/SECURITY.md b/docs/SECURITY.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/SECURITY.md\n@@ -0,0 +1,21 @@\n+# CWA-Server Security\n+\n+## TLS Configuration\n+\n+The cwa-server uses encrypted connections for external and internal communication. The main configuration for the external communication channel can be found [here](../services/submission/src/main/resources/application.yaml) (see section `server`). The current settings will only allow TLS version 1.2 and 1.3. The offered ciphers are chosen in accordance to the recommendations in [BSI-TR-02102-2](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR02102/BSI-TR-02102-2.pdf).\n+Internal communication is configured for instance [in the feign client](../services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java).\n+Database connections are established via TLS and are enabled for mutual authentication, see [here](../services/submission/src/main/resources/application.yaml#L38).\n+\n+## Security-Related Spring Profiles\n+\n+The TLS configuration previously described can be changed to enable certain test scenarios. It is important to realize that this degradation of security is only possible by setting a Spring profile, while the default behavior will always use the most secure configuration. To prevent misconfiguration in production, multiple controls are implemented. This includes among others configuration-as-code deployments, explicit log messages for unsafe configurations and monitoring of deployed configurations.\n+The relevant profiles are:\n+\n+|Profile|Description|\n+|-------|-----------|\n+|`disable-ssl-server`|Disables SSL for the submission endpoint.|\n+|`disable-ssl-client-postgres`|Disables SSL with a trusted certificate for the connection to the postgres database.|\n+|`disable-ssl-client-verification`|Disables SSL with a trusted certificate for the connection to the verification server.|\n+|`disable-ssl-client-verification-verify-hostname`|Disables the verification of the SSL hostname for the connection to the verification server.|\n+\n+Apart from those configuration options, the `dev` profile will never be used in production to prevent leakage of data for security and privacy concerns reasons.\ndiff --git a/docs/SUBMISSION.md b/docs/SUBMISSION.md\nnew file mode 100644\n--- /dev/null\n+++ b/docs/SUBMISSION.md\n@@ -0,0 +1,20 @@\n+# CWA-Server Submission Service\n+\n+## Spring Profiles\n+\n+Spring profiles are used to apply submission service configuration based on the running environment, determined by the active profile.\n+\n+You will find `.yaml` and `.xml` based profile-specific configuration files at [`/services/submission/src/main/resources`](/services/submission/src/main/resources).\n+\n+### Available Profiles\n+\n+Profile | Effect\n+--------------------------------------------------|-------------\n+`dev` | Sets the log level to `DEBUG` and changes the `CONSOLE_LOG_PATTERN` used by Log4j 2.\n+`cloud` | Removes default values for the `spring.flyway`, `spring.datasource` and `services.submission.verification.base-url` configurations.\n+`disable-ssl-server` | Disables SSL for the submission endpoint.\n+`disable-ssl-client-postgres` | Disables SSL with a pinned certificate for the connection to the postgres.\n+`disable-ssl-client-verification` | Disables SSL with a pinned certificate for the connection to the verification server.\n+`disable-ssl-client-verification-verify-hostname` | Disables the verification of the SSL hostname for the connection to the verification server.\n+\n+Please refer to the inline comments in the base `application.yaml` configuration file for further details on the configuration properties impacted by the above profiles.\ndiff --git a/local-setup/create-users.sql b/local-setup/create-users.sql\nnew file mode 100644\n--- /dev/null\n+++ b/local-setup/create-users.sql\n@@ -0,0 +1,5 @@\n+/* Creates default users for local development */\n+\n+CREATE USER \"local_setup_flyway\" WITH INHERIT IN ROLE cwa_flyway ENCRYPTED PASSWORD 'local_setup_flyway';\n+CREATE USER \"local_setup_submission\" WITH INHERIT IN ROLE cwa_submission ENCRYPTED PASSWORD 'local_setup_submission';\n+CREATE USER \"local_setup_distribution\" WITH INHERIT IN ROLE cwa_distribution ENCRYPTED PASSWORD 'local_setup_distribution';\ndiff --git a/local-setup/enable-test-data-docker-compose.sql b/local-setup/enable-test-data-docker-compose.sql\nnew file mode 100644\n--- /dev/null\n+++ b/local-setup/enable-test-data-docker-compose.sql\n@@ -0,0 +1,3 @@\n+/* Testdata creation requires INSERT permission - this is only active on local deployments */\n+/* Since the Diagnosis Key Table does not yet exist, this is a workaround to still allow inserts */\n+ALTER DEFAULT PRIVILEGES FOR USER local_setup_flyway IN SCHEMA public GRANT INSERT ON TABLES TO cwa_distribution;\ndiff --git a/local-setup/enable-test-data.sql b/local-setup/enable-test-data.sql\nnew file mode 100644\n--- /dev/null\n+++ b/local-setup/enable-test-data.sql\n@@ -0,0 +1,2 @@\n+/* Test Data profile requires insert permissions on diagnois key table */\n+GRANT INSERT ON diagnosis_key TO cwa_distribution;\ndiff --git a/pom.xml b/pom.xml\n--- a/pom.xml\n+++ b/pom.xml\n@@ -40,8 +40,40 @@\n https://sonarcloud.io\n \n \n+ \n+ \n+ \n+ org.apache.maven.plugins\n+ maven-javadoc-plugin\n+ 3.2.0\n+ \n+ \n+ \n+ if (typeof useModuleDirectories !== 'undefined') {\n+ useModuleDirectories = false;\n+ }\n+ \n+ ]]>\n+ \n+ --allow-script-in-comments\n+ \n+ \n+ \n+ \n+\n \n \n+ \n+ org.apache.maven.plugins\n+ maven-site-plugin\n+ 3.7.1\n+ \n+ \n+ org.apache.maven.plugins\n+ maven-project-info-reports-plugin\n+ 3.0.0\n+ \n \n org.codehaus.mojo\n license-maven-plugin\ndiff --git a/scripts/wait-for-it/wait-for-it.sh b/scripts/wait-for-it/wait-for-it.sh\n--- a/scripts/wait-for-it/wait-for-it.sh\n+++ b/scripts/wait-for-it/wait-for-it.sh\n@@ -150,7 +150,7 @@ if [[ $WAITFORIT_TIMEOUT_PATH =~ \"busybox\" ]]; then\n WAITFORIT_ISBUSY=1\n # Check if busybox timeout uses -t flag\n # (recent Alpine versions don't support -t anymore)\n- if timeout &>/dev/stdout | grep -q -e '-t '; then\n+ if timeout &>/dev/stdout | grep -q -e -- '-t '; then\n WAITFORIT_BUSYTIMEFLAG=\"-t\"\n fi\n else\ndiff --git a/services/distribution/Dockerfile b/services/distribution/Dockerfile\n--- a/services/distribution/Dockerfile\n+++ b/services/distribution/Dockerfile\n@@ -1,12 +1,29 @@\n-FROM maven:3.6.3-jdk-11 as build\n+FROM openjdk:11 as build\n \n ARG WORK_DIR=/build\n \n+# copy the pom and config files first (which do not change very often)\n+COPY ./.mvn ${WORK_DIR}/.mvn\n+COPY ./mvnw ${WORK_DIR}/mvnw\n+COPY ./pom.xml ${WORK_DIR}/pom.xml\n+COPY ./common/pom.xml ${WORK_DIR}/common/pom.xml\n+COPY ./common/protocols/pom.xml ${WORK_DIR}/common/protocols/pom.xml\n+COPY ./common/persistence/pom.xml ${WORK_DIR}/common/persistence/pom.xml\n+COPY ./services/pom.xml ${WORK_DIR}/services/pom.xml\n+COPY ./services/distribution/pom.xml ${WORK_DIR}/services/distribution/pom.xml\n+COPY ./services/submission/pom.xml ${WORK_DIR}/services/submission/pom.xml\n+\n+WORKDIR ${WORK_DIR}\n+\n+# build all dependencies for offline use\n+RUN ${WORK_DIR}/mvnw dependency:go-offline --file ${WORK_DIR}/pom.xml -B\n+\n+# copy rest of files\n COPY . ${WORK_DIR}/\n \n-RUN mkdir -p /root/.m2 /usr/sap/distribution-service\n+RUN mkdir -p /usr/sap/distribution-service\n # hadolint ignore=SC2086\n-RUN mvn --batch-mode -DskipTests=true --file ${WORK_DIR}/pom.xml ${MAVEN_ARGS} clean install\n+RUN ${WORK_DIR}/mvnw --batch-mode -DskipTests=true --file ${WORK_DIR}/pom.xml ${MAVEN_ARGS} clean install\n RUN cp ${WORK_DIR}/services/distribution/target/distribution-*.jar /usr/sap/distribution-service/distribution.jar\n RUN cp ${WORK_DIR}/scripts/DpkgHelper.java /DpkgHelper.java\n \n@@ -14,4 +31,6 @@ FROM gcr.io/distroless/java:11\n COPY --from=build /DpkgHelper.java .\n COPY --from=build /usr/sap/distribution-service/distribution.jar .\n RUN [\"java\", \"DpkgHelper.java\"]\n+USER 65534:65534\n+ENTRYPOINT [\"/usr/bin/java\", \"-Djdk.tls.namedGroups=\\\"secp256r1,secp384r1,brainpoolP256r1,brainpoolP384r1,brainpoolP512r1,ffdhe2048,ffdhe3072,ffdhe4096\\\"\", \"-jar\"]\n CMD [\"distribution.jar\"]\ndiff --git a/services/distribution/api_v1.json b/services/distribution/api_v1.json\n--- a/services/distribution/api_v1.json\n+++ b/services/distribution/api_v1.json\n@@ -348,13 +348,10 @@\n },\r\n \"/version/{version}/configuration/country/{country}/app_config\": {\r\n \"get\": {\r\n- \"summary\": \"Get Application configuration for a country.\",\r\n+ \"summary\": \"Get application configuration for a country.\",\r\n+ \"description\": \"Gives application configuration for a specific country, which includes:\\n- Minimum risk score\\n- Risk score classification\\n- Risk score parameters\\n- Attenuation duration\\n- Application version configuration\",\r\n \"tags\": [\r\n- \"Minimum risk score\",\r\n- \"Risk score classification\",\r\n- \"Risk score parameters\",\r\n- \"Attenuation duration\",\r\n- \"Application version configuration\"\r\n+ \"Application configuration\"\r\n ],\r\n \"parameters\": [\r\n {\r\ndiff --git a/services/distribution/pom.xml b/services/distribution/pom.xml\n--- a/services/distribution/pom.xml\n+++ b/services/distribution/pom.xml\n@@ -17,6 +17,18 @@\n \n \n \n+ \n+ maven-failsafe-plugin\n+ 3.0.0-M4\n+ \n+ \n+ \n+ integration-test\n+ verify\n+ \n+ \n+ \n+ \n \n org.apache.maven.plugins\n maven-surefire-plugin\n@@ -56,7 +68,7 @@\n \n software.amazon.awssdk\n s3\n- 2.13.25\n+ 2.13.26\n \n \n bcpkix-jdk15on\n@@ -76,13 +88,17 @@\n \n commons-math3\n org.apache.commons\n- 3.2\n+ 3.6.1\n \n \n spring-retry\n org.springframework.retry\n 1.3.0\n \n+ \n+ org.springframework.boot\n+ spring-boot-starter-aop\n+ \n \n \n-\n\\ No newline at end of file\n+\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/Application.java\n@@ -21,15 +21,21 @@\n package app.coronawarn.server.services.distribution;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.util.Arrays;\n+import java.util.List;\n+import org.apache.logging.log4j.LogManager;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.DisposableBean;\n import org.springframework.boot.SpringApplication;\n import org.springframework.boot.autoconfigure.SpringBootApplication;\n import org.springframework.boot.autoconfigure.domain.EntityScan;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.context.ApplicationContext;\n+import org.springframework.context.EnvironmentAware;\n import org.springframework.context.annotation.ComponentScan;\n-import org.springframework.data.jpa.repository.config.EnableJpaRepositories;\n+import org.springframework.core.env.Environment;\n+import org.springframework.data.jdbc.repository.config.EnableJdbcRepositories;\n \n /**\n * The retrieval, assembly and distribution of configuration and diagnosis key data is handled by a chain of {@link\n@@ -37,12 +43,11 @@\n * the chain execution.\n */\n @SpringBootApplication\n-@EnableJpaRepositories(basePackages = \"app.coronawarn.server.common.persistence\")\n+@EnableJdbcRepositories(basePackages = \"app.coronawarn.server.common.persistence\")\n @EntityScan(basePackages = \"app.coronawarn.server.common.persistence\")\n-@ComponentScan({\"app.coronawarn.server.common.persistence\",\n- \"app.coronawarn.server.services.distribution\"})\n+@ComponentScan({\"app.coronawarn.server.common.persistence\", \"app.coronawarn.server.services.distribution\"})\n @EnableConfigurationProperties({DistributionServiceConfig.class})\n-public class Application {\n+public class Application implements EnvironmentAware, DisposableBean {\n \n private static final Logger logger = LoggerFactory.getLogger(Application.class);\n \n@@ -50,6 +55,15 @@ public static void main(String[] args) {\n SpringApplication.run(Application.class);\n }\n \n+ /**\n+ * Manual shutdown hook needed to avoid Log4j shutdown issues (see cwa-server/#589).\n+ */\n+ @Override\n+ public void destroy() {\n+ logger.info(\"Shutting down log4j2.\");\n+ LogManager.shutdown();\n+ }\n+\n /**\n * Terminates this application with exit code 1 (general error).\n */\n@@ -58,4 +72,13 @@ public static void killApplication(ApplicationContext appContext) {\n logger.error(\"Application terminated abnormally.\");\n System.exit(1);\n }\n+\n+ @Override\n+ public void setEnvironment(Environment environment) {\n+ List profiles = Arrays.asList(environment.getActiveProfiles());\n+ if (profiles.contains(\"disable-ssl-client-postgres\")) {\n+ logger.warn(\"The distribution runner is started with postgres connection TLS disabled. \"\n+ + \"This should never be used in PRODUCTION!\");\n+ }\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationPublicationConfig.java\nsimilarity index 65%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationProvider.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationPublicationConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationPublicationConfig.java\n@@ -21,10 +21,11 @@\n package app.coronawarn.server.services.distribution.assembly.appconfig;\n \n import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n+import org.springframework.context.annotation.Bean;\n+import org.springframework.context.annotation.Configuration;\n \n /**\n- * Provides the application configuration needed for the mobile client. Contains all necessary\n- * sub-configs, including:\n+ * Provides the application configuration needed for the mobile client. Contains all necessary sub-configs, including:\n *
\n *
Exposure Configuration
\n *
Risk Score Classification
\n@@ -33,35 +34,22 @@\n *\n *
The application config is fetched from the master-config folder.
\n */\n-public class ApplicationConfigurationProvider {\n+@Configuration\n+public class ApplicationConfigurationPublicationConfig {\n \n /**\n * The location of the exposure configuration master file.\n */\n public static final String MASTER_FILE = \"master-config/app-config.yaml\";\n \n- private ApplicationConfigurationProvider() {\n-\n- }\n-\n /**\n * Fetches the master configuration as a ApplicationConfiguration instance.\n *\n * @return the exposure configuration as ApplicationConfiguration\n * @throws UnableToLoadFileException when the file/transformation did not succeed\n */\n- public static ApplicationConfiguration readMasterFile() throws UnableToLoadFileException {\n- return readFile(MASTER_FILE);\n- }\n-\n- /**\n- * Fetches an exposure configuration file based on the given path. The path must be available in the classloader.\n- *\n- * @param path the path, e.g. folder/my-exposure-configuration.yaml\n- * @return the ApplicationConfiguration\n- * @throws UnableToLoadFileException when the file/transformation did not succeed\n- */\n- public static ApplicationConfiguration readFile(String path) throws UnableToLoadFileException {\n- return YamlLoader.loadYamlIntoProtobufBuilder(path, ApplicationConfiguration.Builder.class).build();\n+ @Bean\n+ public ApplicationConfiguration createMasterConfiguration() throws UnableToLoadFileException {\n+ return YamlLoader.loadYamlIntoProtobufBuilder(MASTER_FILE, ApplicationConfiguration.Builder.class).build();\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/directory/AppConfigurationDirectory.java\n@@ -21,12 +21,6 @@\n package app.coronawarn.server.services.distribution.assembly.appconfig.structure.directory;\n \n import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n-import app.coronawarn.server.common.protocols.internal.ApplicationVersionConfiguration;\n-import app.coronawarn.server.common.protocols.internal.AttenuationDuration;\n-import app.coronawarn.server.common.protocols.internal.RiskScoreClassification;\n-import app.coronawarn.server.common.protocols.internal.RiskScoreParameters;\n-import app.coronawarn.server.services.distribution.assembly.appconfig.ApplicationConfigurationProvider;\n-import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n import app.coronawarn.server.services.distribution.assembly.appconfig.structure.archive.decorator.signing.AppConfigurationSigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ApplicationConfigurationValidator;\n import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ConfigurationValidator;\n@@ -38,26 +32,21 @@\n import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing.IndexingDecoratorOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.file.FileOnDisk;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import com.google.protobuf.Message;\n+import java.util.Optional;\n import java.util.Set;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n \n /**\n- * Creates the directory structure {@code /configuration/country/:country} and writes the following five files,\n- * wrapped in a signed zip archive:\n- * 1. File containing minimum risk score\n- * 2. File containing {@link RiskScoreParameters}\n- * 3. File containing {@link RiskScoreClassification}\n- * 4. File containing {@link AttenuationDuration}\n- * 5. File containing {@link ApplicationVersionConfiguration}\n+ * Creates the directory structure {@code /configuration/country/:country} and writes the app configuration parameters\n+ * into a zip file.\n */\n public class AppConfigurationDirectory extends DirectoryOnDisk {\n \n private static final Logger logger = LoggerFactory.getLogger(AppConfigurationDirectory.class);\n \n private final IndexDirectoryOnDisk countryDirectory;\n-\n+ private final ApplicationConfiguration applicationConfiguration;\n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n \n@@ -66,45 +55,39 @@ public class AppConfigurationDirectory extends DirectoryOnDisk {\n *\n * @param cryptoProvider The {@link CryptoProvider} whose artifacts to use for creating the signature.\n */\n- public AppConfigurationDirectory(CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig) {\n+ public AppConfigurationDirectory(ApplicationConfiguration applicationConfiguration, CryptoProvider cryptoProvider,\n+ DistributionServiceConfig distributionServiceConfig) {\n super(distributionServiceConfig.getApi().getParametersPath());\n+ this.applicationConfiguration = applicationConfiguration;\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n \n countryDirectory = new IndexDirectoryOnDisk<>(distributionServiceConfig.getApi().getCountryPath(),\n- __ -> Set.of(distributionServiceConfig.getApi().getCountryGermany()), Object::toString);\n+ ignoredValue -> Set.of(distributionServiceConfig.getApi().getCountryGermany()), Object::toString);\n \n- addApplicationConfigurationIfValid();\n+ addConfigurationArchiveIfValid(distributionServiceConfig.getApi().getAppConfigFileName());\n \n this.addWritable(new IndexingDecoratorOnDisk<>(countryDirectory, distributionServiceConfig.getOutputFileName()));\n }\n \n- private void addApplicationConfigurationIfValid() {\n- try {\n- ApplicationConfiguration appConfig = ApplicationConfigurationProvider.readMasterFile();\n- ConfigurationValidator validator = new ApplicationConfigurationValidator(appConfig);\n- addArchiveIfMessageValid(distributionServiceConfig.getApi().getAppConfigFileName(),\n- appConfig, validator);\n- } catch (UnableToLoadFileException e) {\n- logger.error(\"Exposure configuration will not be published! Unable to read configuration file from disk.\", e);\n- }\n- }\n-\n /**\n- * If validation of the {@link Message} succeeds, it is written into a file, put into an archive with the specified\n- * name and added to the specified parent directory.\n+ * If validation of the {@link ApplicationConfiguration} succeeds, it is written into a file, put into an archive with\n+ * the specified name and added to the specified parent directory.\n */\n- private void addArchiveIfMessageValid(String archiveName, Message message, ConfigurationValidator validator) {\n+ private void addConfigurationArchiveIfValid(String archiveName) {\n+ ConfigurationValidator validator = new ApplicationConfigurationValidator(applicationConfiguration);\n ValidationResult validationResult = validator.validate();\n \n if (validationResult.hasErrors()) {\n- logger.error(\"App configuration file creation failed. Validation failed for {}./n{}\",\n+ logger.error(\"App configuration file creation failed. Validation failed for {}, {}\",\n archiveName, validationResult);\n+ return;\n }\n \n ArchiveOnDisk appConfigurationFile = new ArchiveOnDisk(archiveName);\n- appConfigurationFile.addWritable(new FileOnDisk(\"export.bin\", message.toByteArray()));\n- countryDirectory.addWritableToAll(__ -> new AppConfigurationSigningDecorator(appConfigurationFile, cryptoProvider,\n- distributionServiceConfig));\n+ appConfigurationFile.addWritable(new FileOnDisk(\"export.bin\", applicationConfiguration.toByteArray()));\n+ countryDirectory.addWritableToAll(ignoredValue ->\n+ Optional\n+ .of(new AppConfigurationSigningDecorator(appConfigurationFile, cryptoProvider, distributionServiceConfig)));\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidator.java\n@@ -60,7 +60,7 @@ public ValidationResult validate() {\n private void validateMinRisk() {\n int minLevel = this.config.getMinRiskScore();\n \n- if (!RiskScoreValidator.isInBounds(minLevel)) {\n+ if (!RiskScoreValidator.isWithinBounds(minLevel)) {\n this.errors.add(new ValidationError(\"min-risk-score\", minLevel, VALUE_OUT_OF_BOUNDS));\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreClassificationValidator.java\n@@ -85,7 +85,7 @@ private void validateLabel(String label) {\n }\n \n private void validateRiskScoreValueBounds(int value) {\n- if (!RiskScoreValidator.isInBounds(value)) {\n+ if (!RiskScoreValidator.isWithinBounds(value)) {\n errors.add(\n new ValidationError(CONFIG_PREFIX + \"risk-classes.[minRiskLevel|maxRiskLevel]\", value, VALUE_OUT_OF_BOUNDS));\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreValidator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreValidator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreValidator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/RiskScoreValidator.java\n@@ -33,9 +33,9 @@ private RiskScoreValidator() {\n * Validates the bounds of a risk score value.\n *\n * @param value the risk score value\n- * @return true if is in bounds, false otherwise\n+ * @return true if value is within bounds, false otherwise\n */\n- public static boolean isInBounds(int value) {\n+ public static boolean isWithinBounds(int value) {\n return ParameterSpec.RISK_SCORE_MIN <= value && value <= ParameterSpec.RISK_SCORE_MAX;\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationError.java\n@@ -79,7 +79,6 @@ public enum ErrorType {\n VALUE_OUT_OF_BOUNDS,\n INVALID_URL,\n INVALID_PARTITIONING,\n- TOO_MANY_DECIMAL_PLACES,\n- MISSING_ENTRY\n+ TOO_MANY_DECIMAL_PLACES\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/AppConfigurationStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/AppConfigurationStructureProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/AppConfigurationStructureProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/AppConfigurationStructureProvider.java\n@@ -20,6 +20,7 @@\n \n package app.coronawarn.server.services.distribution.assembly.component;\n \n+import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n import app.coronawarn.server.services.distribution.assembly.appconfig.structure.directory.AppConfigurationDirectory;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n@@ -35,14 +36,16 @@ public class AppConfigurationStructureProvider {\n \n private final CryptoProvider cryptoProvider;\n private final DistributionServiceConfig distributionServiceConfig;\n+ private final ApplicationConfiguration applicationConfiguration;\n \n- AppConfigurationStructureProvider(CryptoProvider cryptoProvider,\n- DistributionServiceConfig distributionServiceConfig) {\n+ AppConfigurationStructureProvider(CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig,\n+ ApplicationConfiguration applicationConfiguration) {\n this.cryptoProvider = cryptoProvider;\n this.distributionServiceConfig = distributionServiceConfig;\n+ this.applicationConfiguration = applicationConfiguration;\n }\n \n public Directory getAppConfiguration() {\n- return new AppConfigurationDirectory(cryptoProvider, distributionServiceConfig);\n+ return new AppConfigurationDirectory(applicationConfiguration, cryptoProvider, distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/component/CwaApiStructureProvider.java\n@@ -25,6 +25,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing.IndexingDecoratorOnDisk;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.util.Optional;\n import java.util.Set;\n import org.springframework.stereotype.Component;\n \n@@ -34,13 +35,8 @@\n @Component\n public class CwaApiStructureProvider {\n \n- public static final String VERSION_DIRECTORY = \"version\";\n- public static final String VERSION_V1 = \"v1\";\n-\n private final AppConfigurationStructureProvider appConfigurationStructureProvider;\n-\n private final DiagnosisKeysStructureProvider diagnosisKeysStructureProvider;\n-\n private final DistributionServiceConfig distributionServiceConfig;\n \n /**\n@@ -59,12 +55,15 @@ public class CwaApiStructureProvider {\n * Returns the base directory.\n */\n public Directory getDirectory() {\n- IndexDirectoryOnDisk versionDirectory =\n- new IndexDirectoryOnDisk<>(VERSION_DIRECTORY, __ -> Set.of(VERSION_V1), Object::toString);\n+ IndexDirectoryOnDisk versionDirectory = new IndexDirectoryOnDisk<>(\n+ distributionServiceConfig.getApi().getVersionPath(),\n+ ignoredValue -> Set.of(distributionServiceConfig.getApi().getVersionV1()),\n+ Object::toString);\n \n- versionDirectory\n- .addWritableToAll(__ -> appConfigurationStructureProvider.getAppConfiguration());\n- versionDirectory.addWritableToAll(__ -> diagnosisKeysStructureProvider.getDiagnosisKeys());\n+ versionDirectory.addWritableToAll(ignoredValue ->\n+ Optional.of(appConfigurationStructureProvider.getAppConfiguration()));\n+ versionDirectory.addWritableToAll(ignoredValue ->\n+ Optional.of(diagnosisKeysStructureProvider.getDiagnosisKeys()));\n \n return new IndexingDecoratorOnDisk<>(versionDirectory, distributionServiceConfig.getOutputFileName());\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/DiagnosisKeyBundler.java\n@@ -95,6 +95,13 @@ public void setDiagnosisKeys(Collection diagnosisKeys, LocalDateTi\n this.createDiagnosisKeyDistributionMap(diagnosisKeys);\n }\n \n+ /**\n+ * Returns the {@link LocalDateTime} at which the distribution runs.\n+ */\n+ public LocalDateTime getDistributionTime() {\n+ return this.distributionTime;\n+ }\n+\n /**\n * Returns all {@link DiagnosisKey DiagnosisKeys} contained by this {@link DiagnosisKeyBundler}.\n */\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/archive/decorator/singing/DiagnosisKeySigningDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/archive/decorator/signing/DiagnosisKeySigningDecorator.java\nsimilarity index 97%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/archive/decorator/singing/DiagnosisKeySigningDecorator.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/archive/decorator/signing/DiagnosisKeySigningDecorator.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/archive/decorator/singing/DiagnosisKeySigningDecorator.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/archive/decorator/signing/DiagnosisKeySigningDecorator.java\n@@ -18,7 +18,7 @@\n * ---license-end\n */\n \n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.singing;\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.signing;\n \n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.structure.Writable;\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysCountryDirectory.java\n@@ -23,7 +23,6 @@\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateAggregatingDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.DateIndexingDecorator;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n@@ -31,6 +30,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n+import java.util.Optional;\n import java.util.Set;\n \n public class DiagnosisKeysCountryDirectory extends IndexDirectoryOnDisk {\n@@ -48,7 +48,7 @@ public class DiagnosisKeysCountryDirectory extends IndexDirectoryOnDisk\n */\n public DiagnosisKeysCountryDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig) {\n- super(distributionServiceConfig.getApi().getCountryPath(), __ ->\n+ super(distributionServiceConfig.getApi().getCountryPath(), ignoredValue ->\n Set.of(distributionServiceConfig.getApi().getCountryGermany()), Object::toString);\n this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.cryptoProvider = cryptoProvider;\n@@ -57,16 +57,12 @@ public DiagnosisKeysCountryDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n \n @Override\n public void prepare(ImmutableStack indices) {\n- this.addWritableToAll(__ -> {\n- DiagnosisKeysDateDirectory dateDirectory = new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider,\n- distributionServiceConfig);\n- return decorateDateDirectory(dateDirectory);\n- });\n+ this.addWritableToAll(ignoredValue -> Optional.of(decorateDateDirectory(\n+ new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig))));\n super.prepare(indices);\n }\n \n private IndexDirectory decorateDateDirectory(DiagnosisKeysDateDirectory dateDirectory) {\n- return new DateAggregatingDecorator(new DateIndexingDecorator(dateDirectory, distributionServiceConfig),\n- cryptoProvider, distributionServiceConfig, diagnosisKeyBundler);\n+ return new DateIndexingDecorator(dateDirectory, distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectory.java\n@@ -20,17 +20,28 @@\n \n package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n+import static java.lang.Boolean.FALSE;\n+\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.signing.DiagnosisKeySigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator.HourIndexingDecorator;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n+import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n+import app.coronawarn.server.services.distribution.assembly.structure.archive.ArchiveOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import java.time.LocalDate;\n+import java.time.ZoneOffset;\n import java.time.format.DateTimeFormatter;\n+import java.util.List;\n+import java.util.Optional;\n \n public class DiagnosisKeysDateDirectory extends IndexDirectoryOnDisk {\n \n@@ -50,7 +61,7 @@ public class DiagnosisKeysDateDirectory extends IndexDirectoryOnDisk\n public DiagnosisKeysDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n CryptoProvider cryptoProvider, DistributionServiceConfig distributionServiceConfig) {\n super(distributionServiceConfig.getApi().getDatePath(),\n- __ -> diagnosisKeyBundler.getDatesWithDistributableDiagnosisKeys(), ISO8601::format);\n+ ignoredValue -> diagnosisKeyBundler.getDatesWithDistributableDiagnosisKeys(), ISO8601::format);\n this.cryptoProvider = cryptoProvider;\n this.diagnosisKeyBundler = diagnosisKeyBundler;\n this.distributionServiceConfig = distributionServiceConfig;\n@@ -58,15 +69,47 @@ public DiagnosisKeysDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler,\n \n @Override\n public void prepare(ImmutableStack indices) {\n- this.addWritableToAll(__ -> {\n+ this.addWritableToAll(ignoredValue -> {\n DiagnosisKeysHourDirectory hourDirectory =\n new DiagnosisKeysHourDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig);\n- return decorateHourDirectory(hourDirectory);\n+ return Optional.of(decorateHourDirectory(hourDirectory));\n });\n+ this.addWritableToAll(this::indicesToDateDirectoryArchive);\n super.prepare(indices);\n }\n \n+ private Optional> indicesToDateDirectoryArchive(ImmutableStack currentIndices) {\n+ LocalDate currentDate = (LocalDate) currentIndices.peek();\n+ if (shouldNotInclude(currentDate)) {\n+ return Optional.empty();\n+ }\n+ String region = (String) currentIndices.pop().peek();\n+\n+ List diagnosisKeysForCurrentHour =\n+ this.diagnosisKeyBundler.getDiagnosisKeysForDate(currentDate);\n+\n+ long startTimestamp = currentDate.atStartOfDay().toEpochSecond(ZoneOffset.UTC);\n+ long endTimestamp = currentDate.plusDays(1).atStartOfDay().toEpochSecond(ZoneOffset.UTC);\n+\n+ File temporaryExposureKeyExportFile = TemporaryExposureKeyExportFile.fromDiagnosisKeys(\n+ diagnosisKeysForCurrentHour, region, startTimestamp, endTimestamp, distributionServiceConfig);\n+\n+ Archive dateArchive = new ArchiveOnDisk(distributionServiceConfig.getOutputFileName());\n+ dateArchive.addWritable(temporaryExposureKeyExportFile);\n+\n+ return Optional.of(decorateDiagnosisKeyArchive(dateArchive));\n+ }\n+\n+ private boolean shouldNotInclude(LocalDate currentDate) {\n+ return FALSE.equals(distributionServiceConfig.getIncludeIncompleteDays())\n+ && currentDate.equals(diagnosisKeyBundler.getDistributionTime().toLocalDate());\n+ }\n+\n private Directory decorateHourDirectory(DiagnosisKeysHourDirectory hourDirectory) {\n return new HourIndexingDecorator(hourDirectory, distributionServiceConfig);\n }\n+\n+ private Directory decorateDiagnosisKeyArchive(Archive archive) {\n+ return new DiagnosisKeySigningDecorator(archive, cryptoProvider, distributionServiceConfig);\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectory.java\n@@ -23,7 +23,7 @@\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.singing.DiagnosisKeySigningDecorator;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.signing.DiagnosisKeySigningDecorator;\n import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n@@ -37,6 +37,7 @@\n import java.time.LocalDateTime;\n import java.time.ZoneOffset;\n import java.util.List;\n+import java.util.Optional;\n \n public class DiagnosisKeysHourDirectory extends IndexDirectoryOnDisk {\n \n@@ -80,7 +81,7 @@ public void prepare(ImmutableStack indices) {\n Archive hourArchive = new ArchiveOnDisk(distributionServiceConfig.getOutputFileName());\n hourArchive.addWritable(temporaryExposureKeyExportFile);\n \n- return decorateDiagnosisKeyArchive(hourArchive);\n+ return Optional.of(decorateDiagnosisKeyArchive(hourArchive));\n });\n super.prepare(indices);\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\ndeleted file mode 100644\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateAggregatingDecorator.java\n+++ /dev/null\n@@ -1,202 +0,0 @@\n-/*-\n- * ---license-start\n- * Corona-Warn-App\n- * ---\n- * Copyright (C) 2020 SAP SE and all other contributors\n- * ---\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- * ---license-end\n- */\n-\n-package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory.decorator;\n-\n-import static app.coronawarn.server.services.distribution.assembly.structure.util.functional.CheckedFunction.uncheckedFunction;\n-\n-import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n-import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKeyExport;\n-import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.archive.decorator.singing.DiagnosisKeySigningDecorator;\n-import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file.TemporaryExposureKeyExportFile;\n-import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n-import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.archive.Archive;\n-import app.coronawarn.server.services.distribution.assembly.structure.archive.ArchiveOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.DirectoryDecorator;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.IndexDirectoryDecorator;\n-import app.coronawarn.server.services.distribution.assembly.structure.file.File;\n-import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n-import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import java.time.LocalDate;\n-import java.util.List;\n-import java.util.NoSuchElementException;\n-import java.util.Optional;\n-import java.util.Set;\n-import java.util.stream.Collectors;\n-import java.util.stream.Stream;\n-\n-/**\n- * A {@link DirectoryDecorator} that will bundle hour aggregates into date aggregates and sign them.\n- */\n-public class DateAggregatingDecorator extends IndexDirectoryDecorator {\n-\n- private final CryptoProvider cryptoProvider;\n- private final DistributionServiceConfig distributionServiceConfig;\n- private final DiagnosisKeyBundler diagnosisKeyBundler;\n-\n- /**\n- * Creates a new DateAggregatingDecorator.\n- */\n- public DateAggregatingDecorator(IndexDirectory directory, CryptoProvider cryptoProvider,\n- DistributionServiceConfig distributionServiceConfig, DiagnosisKeyBundler diagnosisKeyBundler) {\n- super(directory);\n- this.cryptoProvider = cryptoProvider;\n- this.distributionServiceConfig = distributionServiceConfig;\n- this.diagnosisKeyBundler = diagnosisKeyBundler;\n- }\n-\n- @Override\n- public void prepare(ImmutableStack indices) {\n- super.prepare(indices);\n- Set> dayDirectories = this.getWritables().stream()\n- .filter(writable -> writable instanceof DirectoryOnDisk)\n- .map(directory -> (DirectoryOnDisk) directory)\n- .collect(Collectors.toSet());\n- if (dayDirectories.isEmpty()) {\n- return;\n- }\n-\n- Set dates = this.getIndex(indices).stream()\n- .filter(diagnosisKeyBundler::numberOfKeysForDateBelowMaximum)\n- .map(this.getIndexFormatter())\n- .map(Object::toString)\n- .collect(Collectors.toSet());\n-\n- dayDirectories.stream()\n- .filter(dayDirectory -> dates.contains(dayDirectory.getName()))\n- .forEach(currentDirectory -> Stream.of(currentDirectory)\n- .map(this::getSubSubDirectoryArchives)\n- .map(this::getTemporaryExposureKeyExportFilesFromArchives)\n- .map(this::parseTemporaryExposureKeyExportsFromFiles)\n- .map(this::reduceTemporaryExposureKeyExportsToNewFile)\n- .map(temporaryExposureKeyExportFile -> {\n- Archive aggregate = new ArchiveOnDisk(distributionServiceConfig.getOutputFileName());\n- aggregate.addWritable(temporaryExposureKeyExportFile);\n- return aggregate;\n- })\n- .map(file -> new DiagnosisKeySigningDecorator(file, cryptoProvider, distributionServiceConfig))\n- .forEach(aggregate -> {\n- currentDirectory.addWritable(aggregate);\n- aggregate.prepare(indices);\n- })\n- );\n- }\n-\n- /**\n- * Returns all archives that are 3 levels down from the root directory.\n- */\n- private Set> getSubSubDirectoryArchives(Directory rootDirectory) {\n- return getWritablesInDirectory(rootDirectory, 3).stream()\n- .filter(Writable::isArchive)\n- .map(archive -> (Archive) archive)\n- .collect(Collectors.toSet());\n- }\n-\n- /**\n- * Traverses a directory {@code depth} levels deep and returns a flattened list of all writables at that depth. A\n- * {@code depth} of 0 or less returns a set only containing the root directory. A depth of 1 returns a set of\n- * writables in the root directory. A depth of 2 returns a set of all writables in all directories in the root\n- * directory, and so on.\n- *\n- * @param rootDirectory The directory in which to start traversal.\n- * @param depth The depth to traverse.\n- * @return All writables that are {@code depth} levels down.\n- */\n- private Set> getWritablesInDirectory(Directory rootDirectory, int depth) {\n- if (depth <= 0) {\n- return Set.of(rootDirectory);\n- } else if (depth == 1) {\n- return rootDirectory.getWritables();\n- } else {\n- return rootDirectory.getWritables().stream()\n- .filter(Writable::isDirectory)\n- .flatMap(directory -> getWritablesInDirectory((Directory) directory, depth - 1).stream())\n- .collect(Collectors.toSet());\n- }\n- }\n-\n- private Set getTemporaryExposureKeyExportFilesFromArchives(\n- Set> hourArchives) {\n- return hourArchives.stream()\n- .map(Directory::getWritables)\n- .map(writables -> writables.stream()\n- .filter(writable -> writable.getName().equals(\"export.bin\")))\n- .map(Stream::findFirst)\n- .map(Optional::orElseThrow)\n- .filter(writable -> writable instanceof File)\n- .map(file -> (TemporaryExposureKeyExportFile) file)\n- .collect(Collectors.toSet());\n- }\n-\n- private Set parseTemporaryExposureKeyExportsFromFiles(\n- Set temporaryExposureKeyExportFiles) {\n- return temporaryExposureKeyExportFiles.stream()\n- .map(TemporaryExposureKeyExportFile::getBytesWithoutHeader)\n- .map(uncheckedFunction(TemporaryExposureKeyExport::parseFrom))\n- .collect(Collectors.toSet());\n- }\n-\n- private TemporaryExposureKeyExportFile reduceTemporaryExposureKeyExportsToNewFile(\n- Set temporaryExposureKeyExports) {\n- return TemporaryExposureKeyExportFile.fromTemporaryExposureKeys(\n- getTemporaryExposureKeys(temporaryExposureKeyExports),\n- getRegion(temporaryExposureKeyExports),\n- getStartTimestamp(temporaryExposureKeyExports),\n- getEndTimestamp(temporaryExposureKeyExports),\n- distributionServiceConfig\n- );\n- }\n-\n- private static Set getTemporaryExposureKeys(\n- Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .map(TemporaryExposureKeyExport::getKeysList)\n- .flatMap(List::stream)\n- .collect(Collectors.toSet());\n- }\n-\n- private static String getRegion(Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .map(TemporaryExposureKeyExport::getRegion)\n- .findAny()\n- .orElseThrow(NoSuchElementException::new);\n- }\n-\n- private static long getStartTimestamp(\n- Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .mapToLong(TemporaryExposureKeyExport::getStartTimestamp)\n- .min()\n- .orElseThrow(NoSuchElementException::new);\n- }\n-\n- private static long getEndTimestamp(Set temporaryExposureKeyExports) {\n- return temporaryExposureKeyExports.stream()\n- .mapToLong(TemporaryExposureKeyExport::getEndTimestamp)\n- .max()\n- .orElseThrow(NoSuchElementException::new);\n- }\n-}\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectory.java\n@@ -49,8 +49,8 @@ public interface IndexDirectory> extends Directory {\n * Calls the {@link app.coronawarn.server.services.distribution.assembly.structure.util.functional.IndexFunction} with\n * the {@code indices} to calculate and return the elements of the index of this {@link IndexDirectory}.\n *\n- * @param indices A {@link Stack} of parameters from all {@link IndexDirectory IndexDirectories} further up in the\n- * hierarchy. The Stack may contain different types, depending on the types {@code T} of {@link\n+ * @param indices A {@link ImmutableStack} of parameters from all {@link IndexDirectory IndexDirectories} further up\n+ * in the hierarchy. The Stack may contain different types, depending on the types {@code T} of {@link\n * IndexDirectory IndexDirectories} further up in the hierarchy.\n */\n Set getIndex(ImmutableStack indices);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryOnDisk.java\n@@ -27,6 +27,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.IndexFunction;\n import app.coronawarn.server.services.distribution.assembly.structure.util.functional.WritableFunction;\n import java.util.HashSet;\n+import java.util.Optional;\n import java.util.Set;\n \n /**\n@@ -74,9 +75,9 @@ public void addWritableToAll(WritableFunction writableFunction)\n }\n \n /**\n- * Creates a new subdirectory for every element of the {@link IndexDirectory#getIndex index} and writes all its\n- * {@link IndexDirectory#addWritableToAll writables} to those. The respective element of the index will be pushed\n- * onto the Stack for subsequent {@link Writable#prepare} calls.\n+ * Creates a new subdirectory for every element of the {@link IndexDirectory#getIndex index} and writes all its {@link\n+ * IndexDirectory#addWritableToAll writables} to those. The respective element of the index will be pushed onto the\n+ * Stack for subsequent {@link Writable#prepare} calls.\n *\n * @param indices A {@link ImmutableStack} of parameters from all {@link IndexDirectory IndexDirectories} further up\n * in the hierarchy. The Stack may contain different types, depending on the types {@code T} of {@link\n@@ -104,9 +105,11 @@ private DirectoryOnDisk makeSubDirectory(T index) {\n \n private void prepareMetaWritables(ImmutableStack indices, DirectoryOnDisk target) {\n this.metaWritables.forEach(metaWritableFunction -> {\n- Writable newWritable = metaWritableFunction.apply(indices);\n- target.addWritable(newWritable);\n- newWritable.prepare(indices);\n+ Optional> maybeNewWritable = metaWritableFunction.apply(indices);\n+ maybeNewWritable.ifPresent(newWritable -> {\n+ target.addWritable(newWritable);\n+ newWritable.prepare(indices);\n+ });\n });\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorOnDisk.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorOnDisk.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorOnDisk.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorOnDisk.java\n@@ -25,6 +25,7 @@\n import app.coronawarn.server.services.distribution.assembly.structure.file.FileOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.file.FileOnDiskWithChecksum;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import java.nio.charset.StandardCharsets;\n import java.util.List;\n import java.util.Set;\n import java.util.stream.Collectors;\n@@ -46,6 +47,6 @@ public FileOnDisk getIndexFile(String indexFileName, ImmutableStack indi\n .sorted()\n .collect(Collectors.toList());\n array.addAll(elements);\n- return new FileOnDiskWithChecksum(indexFileName, array.toJSONString().getBytes());\n+ return new FileOnDiskWithChecksum(indexFileName, array.toJSONString().getBytes(StandardCharsets.UTF_8));\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/assembly/structure/util/functional/WritableFunction.java\n@@ -22,6 +22,7 @@\n \n import app.coronawarn.server.services.distribution.assembly.structure.Writable;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import java.util.Optional;\n import java.util.function.Function;\n \n /**\n@@ -30,7 +31,8 @@\n * @param The specific type of {@link Writable} that this {@link WritableFunction} can create.\n */\n @FunctionalInterface\n-public interface WritableFunction> extends Function, Writable> {\n+public interface WritableFunction> extends\n+ Function, Optional>> {\n \n- Writable apply(ImmutableStack t);\n+ Optional> apply(ImmutableStack t);\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/config/DistributionServiceConfig.java\n@@ -404,6 +404,7 @@ public static class ObjectStore {\n private String bucket;\n private Boolean setPublicReadAclOnPutObject;\n private Integer maxNumberOfFailedOperations;\n+ private Integer maxNumberOfS3Threads;\n \n public String getAccessKey() {\n return accessKey;\n@@ -460,5 +461,13 @@ public Integer getMaxNumberOfFailedOperations() {\n public void setMaxNumberOfFailedOperations(Integer maxNumberOfFailedOperations) {\n this.maxNumberOfFailedOperations = maxNumberOfFailedOperations;\n }\n+\n+ public Integer getMaxNumberOfS3Threads() {\n+ return maxNumberOfS3Threads;\n+ }\n+\n+ public void setMaxNumberOfS3Threads(Integer maxNumberOfS3Threads) {\n+ this.maxNumberOfS3Threads = maxNumberOfS3Threads;\n+ }\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccess.java\n@@ -140,6 +140,8 @@ private Map createHeaders(int maxAge, LocalFile file) {\n headers.put(HeaderKey.CWA_HASH, file.getChecksum());\n }\n \n+ headers.put(HeaderKey.CONTENT_TYPE, file.getContentType());\n+\n return headers;\n }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3Publisher.java\n@@ -20,7 +20,7 @@\n \n package app.coronawarn.server.services.distribution.objectstore;\n \n-import app.coronawarn.server.services.distribution.assembly.component.CwaApiStructureProvider;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import app.coronawarn.server.services.distribution.objectstore.publish.PublishFileSet;\n@@ -28,13 +28,16 @@\n import java.io.IOException;\n import java.nio.file.Path;\n import java.util.List;\n+import java.util.concurrent.ExecutionException;\n+import java.util.concurrent.Future;\n import java.util.stream.Collectors;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;\n+import org.springframework.stereotype.Component;\n \n /**\n- * Publishes a folder on the disk to S3 while keeping the folder and file structure. \n- * Moreover, does the following:\n+ * Publishes a folder on the disk to S3 while keeping the folder and file structure. Moreover, does the following:\n * \n *
\n *
Publishes index files on a different route, removing the trailing \"/index\" part.
\n@@ -46,47 +49,49 @@\n *
Currently not implemented: Supports multi threaded upload of files.
\n *
\n */\n+@Component\n public class S3Publisher {\n \n private static final Logger logger = LoggerFactory.getLogger(S3Publisher.class);\n \n- /**\n- * The default CWA root folder, which contains all CWA related files.\n- */\n- private static final String CWA_S3_ROOT = CwaApiStructureProvider.VERSION_DIRECTORY;\n-\n- private final Path root;\n private final ObjectStoreAccess objectStoreAccess;\n private final FailedObjectStoreOperationsCounter failedOperationsCounter;\n+ private final ThreadPoolTaskExecutor executor;\n+ private final DistributionServiceConfig distributionServiceConfig;\n \n /**\n * Creates an {@link S3Publisher} instance that attempts to publish the files at the specified location to an object\n * store. Object store operations are performed through the specified {@link ObjectStoreAccess} instance.\n *\n- * @param root The path of the directory that shall be published.\n- * @param objectStoreAccess The {@link ObjectStoreAccess} used to communicate with the object store.\n- * @param failedOperationsCounter The {@link FailedObjectStoreOperationsCounter} that is used to monitor the number of\n- * failed operations.\n+ * @param objectStoreAccess The {@link ObjectStoreAccess} used to communicate with the object store.\n+ * @param failedOperationsCounter The {@link FailedObjectStoreOperationsCounter} that is used to monitor the number\n+ * of failed operations.\n+ * @param executor The executor that manages the upload task submission.\n+ * @param distributionServiceConfig The {@link DistributionServiceConfig} used for distribution service\n+ * configuration.\n */\n- public S3Publisher(Path root, ObjectStoreAccess objectStoreAccess,\n- FailedObjectStoreOperationsCounter failedOperationsCounter) {\n- this.root = root;\n+ public S3Publisher(ObjectStoreAccess objectStoreAccess, FailedObjectStoreOperationsCounter failedOperationsCounter,\n+ ThreadPoolTaskExecutor executor, DistributionServiceConfig distributionServiceConfig) {\n this.objectStoreAccess = objectStoreAccess;\n this.failedOperationsCounter = failedOperationsCounter;\n+ this.executor = executor;\n+ this.distributionServiceConfig = distributionServiceConfig;\n }\n \n /**\n * Synchronizes the files to S3.\n *\n+ * @param root The path of the directory that shall be published.\n * @throws IOException in case there were problems reading files from the disk.\n */\n- public void publish() throws IOException {\n+ public void publish(Path root) throws IOException {\n PublishedFileSet published;\n List toPublish = new PublishFileSet(root).getFiles();\n List diff;\n \n try {\n- published = new PublishedFileSet(objectStoreAccess.getObjectsWithPrefix(CWA_S3_ROOT));\n+ published = new PublishedFileSet(\n+ objectStoreAccess.getObjectsWithPrefix(distributionServiceConfig.getApi().getVersionPath()));\n diff = toPublish\n .stream()\n .filter(published::isNotYetPublished)\n@@ -97,14 +102,25 @@ public void publish() throws IOException {\n diff = toPublish;\n }\n \n- logger.info(\"Beginning upload... \");\n- for (LocalFile file : diff) {\n- try {\n- this.objectStoreAccess.putObject(file);\n- } catch (ObjectStoreOperationFailedException e) {\n- failedOperationsCounter.incrementAndCheckThreshold(e);\n- }\n+ logger.info(\"Beginning upload of {} files... \", diff.size());\n+ try {\n+ diff.stream()\n+ .map(file -> executor.submit(() -> objectStoreAccess.putObject(file)))\n+ .forEach(this::awaitThread);\n+ } finally {\n+ executor.shutdown();\n }\n logger.info(\"Upload completed.\");\n }\n+\n+ private void awaitThread(Future> result) {\n+ try {\n+ result.get();\n+ } catch (ExecutionException e) {\n+ failedOperationsCounter.incrementAndCheckThreshold(new ObjectStoreOperationFailedException(e.getMessage(), e));\n+ } catch (InterruptedException e) {\n+ Thread.currentThread().interrupt();\n+ throw new ObjectStoreOperationFailedException(e.getMessage(), e);\n+ }\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/S3RetentionPolicy.java\n@@ -58,7 +58,8 @@ public S3RetentionPolicy(ObjectStoreAccess objectStoreAccess, DistributionServic\n * @param retentionDays the number of days, that files should be retained on S3.\n */\n public void applyRetentionPolicy(int retentionDays) {\n- List diagnosisKeysObjects = objectStoreAccess.getObjectsWithPrefix(\"version/v1/\"\n+ List diagnosisKeysObjects = objectStoreAccess.getObjectsWithPrefix(api.getVersionPath() + \"/\"\n+ + api.getVersionV1() + \"/\"\n + api.getDiagnosisKeysPath() + \"/\"\n + api.getCountryPath() + \"/\"\n + api.getCountryGermany() + \"/\"\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClient.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClient.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClient.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClient.java\n@@ -74,7 +74,11 @@ public interface ObjectStoreClient {\n enum HeaderKey {\n CACHE_CONTROL(\"Cache-Control\"),\n AMZ_ACL(\"x-amz-acl\"),\n- CWA_HASH(\"cwa-hash\");\n+ CWA_HASH(\"cwa-hash\"),\n+ /**\n+ * To control which content type is sent, when objects are retrieved from the object store.\n+ */\n+ CONTENT_TYPE(\"Content-Type\");\n \n public final String keyValue;\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStorePublishingConfig.java\nsimilarity index 77%\nrename from services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\nrename to services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStorePublishingConfig.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStoreClientConfig.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/ObjectStorePublishingConfig.java\n@@ -26,6 +26,7 @@\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.Configuration;\n import org.springframework.retry.annotation.EnableRetry;\n+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;\n import software.amazon.awssdk.auth.credentials.AwsBasicCredentials;\n import software.amazon.awssdk.auth.credentials.AwsCredentialsProvider;\n import software.amazon.awssdk.auth.credentials.StaticCredentialsProvider;\n@@ -37,7 +38,7 @@\n */\n @Configuration\n @EnableRetry\n-public class ObjectStoreClientConfig {\n+public class ObjectStorePublishingConfig {\n \n private static final Region DEFAULT_REGION = Region.EU_CENTRAL_1;\n \n@@ -61,4 +62,17 @@ private ObjectStoreClient createClient(ObjectStore objectStore) {\n private String removeTrailingSlash(String string) {\n return string.endsWith(\"/\") ? string.substring(0, string.length() - 1) : string;\n }\n+\n+ /**\n+ * Creates a {@link ThreadPoolTaskExecutor}, which is used to submit object store upload tasks.\n+ */\n+ @Bean\n+ public ThreadPoolTaskExecutor createExecutor(DistributionServiceConfig distributionServiceConfig) {\n+ ThreadPoolTaskExecutor executor = new ThreadPoolTaskExecutor();\n+ executor.setCorePoolSize(distributionServiceConfig.getObjectStore().getMaxNumberOfS3Threads());\n+ executor.setMaxPoolSize(distributionServiceConfig.getObjectStore().getMaxNumberOfS3Threads());\n+ executor.setThreadNamePrefix(\"object-store-operation-worker-\");\n+ executor.initialize();\n+ return executor;\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/client/S3ClientWrapper.java\n@@ -20,9 +20,11 @@\n \n package app.coronawarn.server.services.distribution.objectstore.client;\n \n+import static java.lang.Boolean.TRUE;\n import static java.util.stream.Collectors.toList;\n \n import java.nio.file.Path;\n+import java.util.ArrayList;\n import java.util.Collection;\n import java.util.List;\n import java.util.Map;\n@@ -78,13 +80,20 @@ public boolean bucketExists(String bucketName) {\n backoff = @Backoff(delayExpression = \"${services.distribution.objectstore.retry-backoff}\"))\n public List getObjects(String bucket, String prefix) {\n logRetryStatus(\"object download\");\n-\n- ListObjectsV2Response response =\n- s3Client.listObjectsV2(ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).build());\n-\n- return response.contents().stream()\n- .map(s3Object -> buildS3Object(s3Object, bucket))\n- .collect(toList());\n+ List allS3Objects = new ArrayList<>();\n+ String continuationToken = null;\n+\n+ do {\n+ ListObjectsV2Request request =\n+ ListObjectsV2Request.builder().prefix(prefix).bucket(bucket).continuationToken(continuationToken).build();\n+ ListObjectsV2Response response = s3Client.listObjectsV2(request);\n+ response.contents().stream()\n+ .map(s3Object -> buildS3Object(s3Object, bucket))\n+ .forEach(allS3Objects::add);\n+ continuationToken = TRUE.equals(response.isTruncated()) ? response.continuationToken() : null;\n+ } while (continuationToken != null);\n+\n+ return allS3Objects;\n }\n \n @Recover\n@@ -109,6 +118,9 @@ public void putObject(String bucket, String objectName, Path filePath, Mapcontent-type header.\n+ * \n+ * @return Either zip or\n+ * json.\n+ */\n+ public String getContentType() {\n+ if (s3Key.endsWith(\"app_config\")) {\n+ return \"application/zip\";\n+ }\n+ if (s3Key.matches(\".*\\\\d\")) {\n+ // date and hourly diagnosis key files\n+ return \"application/zip\";\n+ }\n+ // list of versions, dates, hours\n+ return \"application/json\";\n+ }\n }\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/LocalIndexFile.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/LocalIndexFile.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/LocalIndexFile.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/LocalIndexFile.java\n@@ -29,7 +29,7 @@\n * those files easier for the consumers. Index files are assembled with the name \"index\", but should\n * be published on S3 w/o the index part, to make e.g.:\n * \n- * /diagnosis-keys/date/2020-12-12/index -> /diagnosis-keys/date/2020-12-12\n+ * /diagnosis-keys/date/2020-12-12/index is published to /diagnosis-keys/date/2020-12-12\n */\n public class LocalIndexFile extends LocalFile {\n \ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/PublishedFileSet.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/PublishedFileSet.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/PublishedFileSet.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/objectstore/publish/PublishedFileSet.java\n@@ -54,7 +54,7 @@ public PublishedFileSet(List s3Objects) {\n *
\n *\n * @param file the to-be-published file which should be checked\n- * @return true, if it exists & is identical\n+ * @return true, if it exists and is identical\n */\n public boolean isNotYetPublished(LocalFile file) {\n S3Object published = s3Objects.get(file.getS3Key());\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/S3Distribution.java\n@@ -21,8 +21,6 @@\n package app.coronawarn.server.services.distribution.runner;\n \n import app.coronawarn.server.services.distribution.assembly.component.OutputDirectoryProvider;\n-import app.coronawarn.server.services.distribution.objectstore.FailedObjectStoreOperationsCounter;\n-import app.coronawarn.server.services.distribution.objectstore.ObjectStoreAccess;\n import app.coronawarn.server.services.distribution.objectstore.S3Publisher;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreOperationFailedException;\n import java.io.IOException;\n@@ -44,23 +42,19 @@ public class S3Distribution implements ApplicationRunner {\n private static final Logger logger = LoggerFactory.getLogger(S3Distribution.class);\n \n private final OutputDirectoryProvider outputDirectoryProvider;\n- private final ObjectStoreAccess objectStoreAccess;\n- private final FailedObjectStoreOperationsCounter failedOperationsCounter;\n+ private final S3Publisher s3Publisher;\n \n- S3Distribution(OutputDirectoryProvider outputDirectoryProvider, ObjectStoreAccess objectStoreAccess,\n- FailedObjectStoreOperationsCounter failedOperationsCounter) {\n+ S3Distribution(OutputDirectoryProvider outputDirectoryProvider, S3Publisher s3Publisher) {\n this.outputDirectoryProvider = outputDirectoryProvider;\n- this.objectStoreAccess = objectStoreAccess;\n- this.failedOperationsCounter = failedOperationsCounter;\n+ this.s3Publisher = s3Publisher;\n }\n \n @Override\n public void run(ApplicationArguments args) {\n try {\n Path pathToDistribute = outputDirectoryProvider.getFileOnDisk().toPath().toAbsolutePath();\n- S3Publisher s3Publisher = new S3Publisher(pathToDistribute, objectStoreAccess, failedOperationsCounter);\n \n- s3Publisher.publish();\n+ s3Publisher.publish(pathToDistribute);\n logger.info(\"Data pushed to Object Store successfully.\");\n } catch (UnsupportedOperationException | ObjectStoreOperationFailedException | IOException e) {\n logger.error(\"Distribution failed.\", e);\ndiff --git a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n--- a/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n+++ b/services/distribution/src/main/java/app/coronawarn/server/services/distribution/runner/TestDataGeneration.java\n@@ -114,7 +114,7 @@ private void writeTestData() {\n logger.debug(\"Generating diagnosis keys between {} and {}...\", startTimestamp, endTimestamp);\n List newDiagnosisKeys = LongStream.range(startTimestamp, endTimestamp)\n .mapToObj(submissionTimestamp -> IntStream.range(0, poisson.sample())\n- .mapToObj(__ -> generateDiagnosisKey(submissionTimestamp))\n+ .mapToObj(ignoredValue -> generateDiagnosisKey(submissionTimestamp))\n .collect(Collectors.toList()))\n .flatMap(List::stream)\n .collect(Collectors.toList());\ndiff --git a/services/distribution/src/main/resources/application-cloud.yaml b/services/distribution/src/main/resources/application-cloud.yaml\n--- a/services/distribution/src/main/resources/application-cloud.yaml\n+++ b/services/distribution/src/main/resources/application-cloud.yaml\n@@ -1,13 +1,10 @@\n ---\n spring:\n flyway:\n- enabled: true\n- locations: classpath:db/migration/postgres\n password: ${POSTGRESQL_PASSWORD_FLYWAY}\n user: ${POSTGRESQL_USER_FLYWAY}\n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n username: ${POSTGRESQL_USER_DISTRIBUTION}\n password: ${POSTGRESQL_PASSWORD_DISTRIBUTION}\n \ndiff --git a/services/distribution/src/main/resources/application-disable-ssl-client-postgres.yaml b/services/distribution/src/main/resources/application-disable-ssl-client-postgres.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/application-disable-ssl-client-postgres.yaml\n@@ -0,0 +1,4 @@\n+---\n+spring:\n+ datasource:\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\ndiff --git a/services/distribution/src/main/resources/application-ssl-client-postgres.yaml b/services/distribution/src/main/resources/application-ssl-client-postgres.yaml\ndeleted file mode 100644\n--- a/services/distribution/src/main/resources/application-ssl-client-postgres.yaml\n+++ /dev/null\n@@ -1,4 +0,0 @@\n----\n-spring:\n- datasource:\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_SUBMISSION_CERTIFICATE_PATH}&sslkey=${SSL_SUBMISSION_PRIVATE_KEY_PATH}\ndiff --git a/services/distribution/src/main/resources/application.yaml b/services/distribution/src/main/resources/application.yaml\n--- a/services/distribution/src/main/resources/application.yaml\n+++ b/services/distribution/src/main/resources/application.yaml\n@@ -9,20 +9,35 @@ logging:\n \n services:\n distribution:\n+ # The name of the distribution output file.\n output-file-name: index\n+ # The number of days to retain diagnosis keys for both database persistency layer and files stored on the object store.\n retention-days: 14\n+ # The number of minutes that diagnosis keys must have been expired for (since the end of the rolling interval window) before they can be distributed.\n expiry-policy-minutes: 120\n+ # The minimum number of diagnosis keys per bundle.\n shifting-policy-threshold: 140\n+ # The maximum number of keys per bundle.\n maximum-number-of-keys-per-bundle: 600000\n+ # Indicates whether the current incomplete day will be included in the distribution (used for testing purposes).\n include-incomplete-days: false\n+ # Indicates whether the current incomplete hour will be included in the distribution (used for testing purposes).\n include-incomplete-hours: false\n+ # Local paths, that are used during the export creation.\n paths:\n+ # The output path.\n output: out\n+ # The location of the private key.\n privatekey: ${VAULT_FILESIGNING_SECRET}\n+ # Configuration for the exported archive, that is saved on the S3-compatible storage.\n tek-export:\n+ # The TEK file name included in the zip archive, containing the list of diagnosis keys.\n file-name: export.bin\n+ # The TEK file header.\n file-header: EK Export v1\n+ # The fixed (ensured by right whitespace padding) TEK file header width.\n file-header-width: 16\n+ # Configuration for the API which is used by the mobile app to query diagnosis keys.\n api:\n version-path: version\n version-v1: v1\n@@ -33,40 +48,50 @@ services:\n diagnosis-keys-path: diagnosis-keys\n parameters-path: configuration\n app-config-file-name: app_config\n+ # Signature configuration, used for signing the exports.\n signature:\n+ # The alias with which to identify public key to be used for verification.\n verification-key-id: 262\n+ # The key version for rollovers.\n verification-key-version: v1\n+ # The ASN.1 OID for algorithm identifier.\n algorithm-oid: 1.2.840.10045.4.3.2\n+ # The algorithm name.\n algorithm-name: SHA256withECDSA\n+ # The signature file name included in the zip archive.\n file-name: export.sig\n+ # The security provider.\n security-provider: BC\n- # Configuration for the S3 compatible object storage hosted by Telekom in Germany\n+ # Configuration for the S3 compatible object storage hosted by Telekom in Germany.\n objectstore:\n access-key: ${CWA_OBJECTSTORE_ACCESSKEY:accessKey1}\n secret-key: ${CWA_OBJECTSTORE_SECRETKEY:verySecretKey1}\n endpoint: ${CWA_OBJECTSTORE_ENDPOINT:http://localhost}\n bucket: ${CWA_OBJECTSTORE_BUCKET:cwa}\n port: ${CWA_OBJECTSTORE_PORT:8003}\n+ # Indicates whether the S3 Access Control List (ACL) header should be set to 'public-read' on put object.\n set-public-read-acl-on-put-object: true\n+ # The number of maximum retry attempts used for configuring Spring @Retryable annotation.\n retry-attempts: 3\n+ # The backoff period in milliseconds used for configuring Spring @Retryable annotation.\n retry-backoff: 2000\n+ # The maximum number of failed operations before giving up.\n max-number-of-failed-operations: 5\n+ # The ThreadPoolTaskExecutor's maximum thread pool size.\n+ max-number-of-s3-threads: 4\n \n spring:\n main:\n web-application-type: NONE\n-# Postgres configuration\n- jpa:\n- hibernate:\n- ddl-auto: validate\n+ # Postgres configuration\n flyway:\n enabled: true\n- locations: classpath:db/migration/postgres\n- password: ${POSTGRESQL_PASSWORD_FLYWAY:postgres}\n- user: ${POSTGRESQL_USER_FLYWAY:postgres}\n+ locations: classpath:/db/migration, classpath:/db/specific/{vendor}\n+ password: ${POSTGRESQL_PASSWORD_FLYWAY:local_setup_flyway}\n+ user: ${POSTGRESQL_USER_FLYWAY:local_setup_flyway}\n \n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n- username: ${POSTGRESQL_USER_DISTRIBUTION:postgres}\n- password: ${POSTGRESQL_PASSWORD_DISTRIBUTION:postgres}\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_DISTRIBUTION_CERTIFICATE_PATH}&sslkey=${SSL_DISTRIBUTION_PRIVATE_KEY_PATH}\n+ username: ${POSTGRESQL_USER_DISTRIBUTION:local_setup_distribution}\n+ password: ${POSTGRESQL_PASSWORD_DISTRIBUTION:local_setup_distribution}\ndiff --git a/services/distribution/src/main/resources/bootstrap-cloud.yaml b/services/distribution/src/main/resources/bootstrap-cloud.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/bootstrap-cloud.yaml\n@@ -0,0 +1,27 @@\n+---\n+spring:\n+ application:\n+ name: cwa-server\n+ cloud:\n+ vault:\n+ enabled: true\n+ generic:\n+ enabled: false\n+ kv:\n+ enabled: true\n+ backend: ${VAULT_BACKEND}\n+ profile-separator: '/'\n+ application-name: 'distribution'\n+ default-context: ''\n+ profiles: cloud\n+ fail-fast: true\n+ authentication: KUBERNETES\n+ kubernetes:\n+ role: ${VAULT_ROLE}\n+ kubernetes-path: kubernetes\n+ service-account-token-file: /var/run/secrets/kubernetes.io/serviceaccount/token\n+ uri: ${VAULT_URI}\n+ connection-timeout: 5000\n+ read-timeout: 15000\n+ config:\n+ order: -10\ndiff --git a/services/distribution/src/main/resources/bootstrap.yaml b/services/distribution/src/main/resources/bootstrap.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/main/resources/bootstrap.yaml\n@@ -0,0 +1,5 @@\n+---\n+spring:\n+ cloud:\n+ vault:\n+ enabled: false\ndiff --git a/services/distribution/src/main/resources/log4j2-dev.xml b/services/distribution/src/main/resources/log4j2-dev.xml\n--- a/services/distribution/src/main/resources/log4j2-dev.xml\n+++ b/services/distribution/src/main/resources/log4j2-dev.xml\n@@ -1,8 +1,8 @@\n \n-\n+\n \n %xwEx\n- yyyy-MM-dd'T'HH:mm:ssXXX\n+ yyyy-MM-dd'T'HH:mm:ssZ\n %d{${LOG_DATEFORMAT_PATTERN}} %-5level %t %c{1.}[%pid]: %m%n${sys:LOG_EXCEPTION_CONVERSION_WORD}\n \n \ndiff --git a/services/distribution/src/main/resources/log4j2.xml b/services/distribution/src/main/resources/log4j2.xml\n--- a/services/distribution/src/main/resources/log4j2.xml\n+++ b/services/distribution/src/main/resources/log4j2.xml\n@@ -1,8 +1,8 @@\n \n-\n+\n \n- yyyy-MM-dd'T'HH:mm:ssXXX\n- %d{${LOG_DATEFORMAT_PATTERN}} %-5level %t %c{1.}[%pid]: %m %replace{%rException}{\\n}{\\u2028}%n\n+ yyyy-MM-dd'T'HH:mm:ssZ\n+ %d{${LOG_DATEFORMAT_PATTERN}} %-5level %t %c{1.}[%pid]: %m %replace{%rException}{[\\r\\n]+}{\\u2028}%n\n \n \n \ndiff --git a/services/distribution/src/main/resources/master-config/app-config.yaml b/services/distribution/src/main/resources/master-config/app-config.yaml\n--- a/services/distribution/src/main/resources/master-config/app-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/app-config.yaml\n@@ -4,7 +4,9 @@\n #\n # This configuration file will be fetched by the mobile app in order to function.\n #\n-# It currently provides settings for minimum risk score, score classes and exposure configuration.\n+# min-risk-score: exposure incidents with scores lower than the value of this property will be excluded by the ExposureNotification framework.\n+#\n+# For details regarding other properties - please see their respective configuration files.\n #\n # Change this file with caution!\n \ndiff --git a/services/distribution/src/main/resources/master-config/app-version-config.yaml b/services/distribution/src/main/resources/master-config/app-version-config.yaml\n--- a/services/distribution/src/main/resources/master-config/app-version-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/app-version-config.yaml\n@@ -12,14 +12,14 @@ ios:\n patch: 2\n min:\n major: 0\n- minor: 8\n+ minor: 5\n patch: 0\n android:\n latest:\n- major: 0\n- minor: 8\n- patch: 3\n+ major: 1\n+ minor: 0\n+ patch: 4\n min:\n- major: 0\n- minor: 8\n- patch: 0\n+ major: 1\n+ minor: 0\n+ patch: 4\ndiff --git a/services/distribution/src/main/resources/master-config/attenuation-duration.yaml b/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n--- a/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n+++ b/services/distribution/src/main/resources/master-config/attenuation-duration.yaml\n@@ -10,8 +10,8 @@\n # Change this file with caution!\n \n thresholds:\n- lower: 44\n- upper: 48\n+ lower: 55\n+ upper: 63\n weights:\n low: 1.0\n mid: 0.5\ndiff --git a/services/distribution/src/main/resources/master-config/exposure-config.yaml b/services/distribution/src/main/resources/master-config/exposure-config.yaml\n--- a/services/distribution/src/main/resources/master-config/exposure-config.yaml\n+++ b/services/distribution/src/main/resources/master-config/exposure-config.yaml\n@@ -41,18 +41,18 @@ days_since_last_exposure:\n ge_14_days: 5\n ge_12_lt_14_days: 5\n ge_10_lt_12_days: 5\n- ge_8_lt_10_days: 4\n- ge_6_lt_8_days: 4\n- ge_4_lt_6_days: 4\n- ge_2_lt_4_days: 4\n- ge_0_lt_2_days: 4\n+ ge_8_lt_10_days: 5\n+ ge_6_lt_8_days: 5\n+ ge_4_lt_6_days: 5\n+ ge_2_lt_4_days: 5\n+ ge_0_lt_2_days: 5\n \n attenuation:\n gt_73_dbm: 0\n- gt_63_le_73_dbm: 0\n- gt_51_le_63_dbm: 0\n+ gt_63_le_73_dbm: 1\n+ gt_51_le_63_dbm: 1\n gt_33_le_51_dbm: 1\n gt_27_le_33_dbm: 1\n gt_15_le_27_dbm: 1\n gt_10_le_15_dbm: 1\n- lt_10_dbm: 1\n+ le_10_dbm: 1\ndiff --git a/services/distribution/src/main/resources/master-config/risk-score-classification.yaml b/services/distribution/src/main/resources/master-config/risk-score-classification.yaml\n--- a/services/distribution/src/main/resources/master-config/risk-score-classification.yaml\n+++ b/services/distribution/src/main/resources/master-config/risk-score-classification.yaml\n@@ -1,10 +1,10 @@\n # This is the Risk Score Classification master file which partitions the risk\n-# score value range (0-255) into distinct risk classes that will be used to by\n+# score value range (0-72) into distinct risk classes that will be used to by\n # the app in order to present the correct risk classification in a user\n # friendly manner, based on the underlying total risk score, to the user.\n #\n # The risk classes must not overlap and\n-# cover the full risk score value range (0-255).\n+# cover the full risk score value range (0-72).\n #\n # Change this file with caution!\n \ndiff --git a/services/pom.xml b/services/pom.xml\n--- a/services/pom.xml\n+++ b/services/pom.xml\n@@ -8,7 +8,7 @@\n \n org.springframework.boot\n spring-boot-starter-parent\n- 2.3.0.RELEASE\n+ 2.3.1.RELEASE\n \n \n \n@@ -36,6 +36,11 @@\n \n \n \n+ \n+ org.springframework.cloud\n+ spring-cloud-starter-vault-config\n+ 2.2.3.RELEASE\n+ \n \n org.opencwa\n persistence\n@@ -89,10 +94,49 @@\n snakeyaml\n 1.26\n \n+ \n+ \n+ org.postgresql\n+ postgresql\n+ 42.2.13\n+ runtime\n+ \n \n \n+ \n+ \n+ \n+ org.apache.maven.plugins\n+ maven-javadoc-plugin\n+ 3.2.0\n+ \n+ \n+ \n+ if (typeof useModuleDirectories !== 'undefined') {\n+ useModuleDirectories = false;\n+ }\n+ \n+ ]]>\n+ \n+ --allow-script-in-comments\n+ \n+ \n+ \n+ \n+\n \n \n+ \n+ org.apache.maven.plugins\n+ maven-site-plugin\n+ 3.7.1\n+ \n+ \n+ org.apache.maven.plugins\n+ maven-project-info-reports-plugin\n+ 3.0.0\n+ \n \n org.codehaus.mojo\n license-maven-plugin\ndiff --git a/services/submission/Dockerfile b/services/submission/Dockerfile\n--- a/services/submission/Dockerfile\n+++ b/services/submission/Dockerfile\n@@ -1,12 +1,28 @@\n-FROM maven:3.6.3-jdk-11 as build\n-\n+FROM openjdk:11 as build\n ARG WORK_DIR=/build\n \n+# copy the pom and config files first (which do not change very often)\n+COPY ./.mvn ${WORK_DIR}/.mvn\n+COPY ./mvnw ${WORK_DIR}/mvnw\n+COPY ./pom.xml ${WORK_DIR}/pom.xml\n+COPY ./common/pom.xml ${WORK_DIR}/common/pom.xml\n+COPY ./common/protocols/pom.xml ${WORK_DIR}/common/protocols/pom.xml\n+COPY ./common/persistence/pom.xml ${WORK_DIR}/common/persistence/pom.xml\n+COPY ./services/pom.xml ${WORK_DIR}/services/pom.xml\n+COPY ./services/distribution/pom.xml ${WORK_DIR}/services/distribution/pom.xml\n+COPY ./services/submission/pom.xml ${WORK_DIR}/services/submission/pom.xml\n+\n+WORKDIR ${WORK_DIR}\n+\n+# build all dependencies for offline use\n+RUN ${WORK_DIR}/mvnw dependency:go-offline --file ${WORK_DIR}/pom.xml -B\n+\n+# copy rest of files\n COPY . ${WORK_DIR}/\n \n-RUN mkdir -p /root/.m2 /usr/sap/submission-service\n+RUN mkdir -p /usr/sap/submission-service\n # hadolint ignore=SC2086\n-RUN mvn --batch-mode -DskipTests=true --file ${WORK_DIR}/pom.xml ${MAVEN_ARGS} clean install\n+RUN ${WORK_DIR}/mvnw --batch-mode -DskipTests=true --file ${WORK_DIR}/pom.xml ${MAVEN_ARGS} clean install\n RUN cp ${WORK_DIR}/services/submission/target/submission-*.jar /usr/sap/submission-service/submission.jar\n RUN cp ${WORK_DIR}/scripts/DpkgHelper.java /DpkgHelper.java\n \n@@ -14,4 +30,6 @@ FROM gcr.io/distroless/java:11\n COPY --from=build /DpkgHelper.java .\n COPY --from=build /usr/sap/submission-service/submission.jar .\n RUN [\"java\", \"DpkgHelper.java\"]\n+USER 65534:65534\n+ENTRYPOINT [\"/usr/bin/java\", \"-Djdk.tls.namedGroups=\\\"secp256r1,secp384r1,brainpoolP256r1,brainpoolP384r1,brainpoolP512r1,ffdhe2048,ffdhe3072,ffdhe4096\\\"\", \"-jar\"]\n CMD [\"submission.jar\"]\ndiff --git a/services/submission/pom.xml b/services/submission/pom.xml\n--- a/services/submission/pom.xml\n+++ b/services/submission/pom.xml\n@@ -38,7 +38,7 @@\n \n org.apache.commons\n commons-math3\n- 3.2\n+ 3.6.1\n compile\n \n \n@@ -68,7 +68,6 @@\n 2.26.3\n test\n \n-\n \n \n \ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/ServerApplication.java\n@@ -22,36 +22,81 @@\n \n import io.micrometer.core.aop.TimedAspect;\n import io.micrometer.core.instrument.MeterRegistry;\n+import java.util.Arrays;\n+import java.util.List;\n+import org.apache.logging.log4j.LogManager;\n+import org.slf4j.Logger;\n+import org.slf4j.LoggerFactory;\n+import org.springframework.beans.factory.DisposableBean;\n import org.springframework.boot.SpringApplication;\n import org.springframework.boot.autoconfigure.SpringBootApplication;\n import org.springframework.boot.autoconfigure.domain.EntityScan;\n+import org.springframework.boot.autoconfigure.security.servlet.UserDetailsServiceAutoConfiguration;\n import org.springframework.boot.context.properties.EnableConfigurationProperties;\n import org.springframework.cloud.openfeign.EnableFeignClients;\n+import org.springframework.context.EnvironmentAware;\n import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.ComponentScan;\n-import org.springframework.data.jpa.repository.config.EnableJpaRepositories;\n+import org.springframework.core.env.Environment;\n+import org.springframework.data.jdbc.repository.config.EnableJdbcRepositories;\n import org.springframework.http.converter.protobuf.ProtobufHttpMessageConverter;\n \n-@SpringBootApplication\n-@EnableJpaRepositories(basePackages = \"app.coronawarn.server.common.persistence\")\n+@SpringBootApplication(exclude = {UserDetailsServiceAutoConfiguration.class})\n+@EnableJdbcRepositories(basePackages = \"app.coronawarn.server.common.persistence\")\n @EntityScan(basePackages = \"app.coronawarn.server.common.persistence\")\n @ComponentScan({\"app.coronawarn.server.common.persistence\",\n \"app.coronawarn.server.services.submission\"})\n @EnableConfigurationProperties\n @EnableFeignClients\n-public class ServerApplication {\n+public class ServerApplication implements EnvironmentAware, DisposableBean {\n+\n+ private static final Logger logger = LoggerFactory.getLogger(ServerApplication.class);\n+\n+ public static void main(String[] args) {\n+ SpringApplication.run(ServerApplication.class);\n+ }\n \n @Bean\n TimedAspect timedAspect(MeterRegistry registry) {\n return new TimedAspect(registry);\n }\n \n+ /**\n+ * Manual shutdown hook needed to avoid Log4j shutdown issues (see cwa-server/#589).\n+ */\n+ @Override\n+ public void destroy() {\n+ LogManager.shutdown();\n+ }\n+\n @Bean\n ProtobufHttpMessageConverter protobufHttpMessageConverter() {\n return new ProtobufHttpMessageConverter();\n }\n \n- public static void main(String[] args) {\n- SpringApplication.run(ServerApplication.class);\n+ @Override\n+ public void setEnvironment(Environment environment) {\n+ List profiles = Arrays.asList(environment.getActiveProfiles());\n+\n+ logger.info(\"Enabled named groups: {}\", System.getProperty(\"jdk.tls.namedGroups\"));\n+ if (profiles.contains(\"disable-ssl-server\")) {\n+ logger.warn(\n+ \"The submission service is started with endpoint TLS disabled. This should never be used in PRODUCTION!\");\n+ }\n+ if (profiles.contains(\"disable-ssl-client-postgres\")) {\n+ logger.warn(\n+ \"The submission service is started with postgres connection TLS disabled. \"\n+ + \"This should never be used in PRODUCTION!\");\n+ }\n+ if (profiles.contains(\"disable-ssl-client-verification\")) {\n+ logger.warn(\n+ \"The submission service is started with verification service connection TLS disabled. \"\n+ + \"This should never be used in PRODUCTION!\");\n+ }\n+ if (profiles.contains(\"disable-ssl-client-verification-verify-hostname\")) {\n+ logger.warn(\n+ \"The submission service is started with verification service TLS hostname validation disabled. \"\n+ + \"This should never be used in PRODUCTION!\");\n+ }\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SecurityConfig.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SecurityConfig.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SecurityConfig.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SecurityConfig.java\n@@ -35,7 +35,11 @@\n @EnableWebSecurity\n public class SecurityConfig extends WebSecurityConfigurerAdapter {\n \n- private static final String ACTUATOR_ROUTE = \"/actuator/**\";\n+ private static final String ACTUATOR_ROUTE = \"/actuator/\";\n+ private static final String HEALTH_ROUTE = ACTUATOR_ROUTE + \"health\";\n+ private static final String PROMETHEUS_ROUTE = ACTUATOR_ROUTE + \"prometheus\";\n+ private static final String READINESS_ROUTE = ACTUATOR_ROUTE + \"readiness\";\n+ private static final String LIVENESS_ROUTE = ACTUATOR_ROUTE + \"liveness\";\n private static final String SUBMISSION_ROUTE =\n \"/version/v1\" + SubmissionController.SUBMISSION_ROUTE;\n \n@@ -51,10 +55,11 @@ protected HttpFirewall strictFirewall() {\n @Override\n protected void configure(HttpSecurity http) throws Exception {\n http.authorizeRequests()\n- .mvcMatchers(HttpMethod.GET, ACTUATOR_ROUTE).permitAll()\n+ .mvcMatchers(HttpMethod.GET, HEALTH_ROUTE, PROMETHEUS_ROUTE, READINESS_ROUTE, LIVENESS_ROUTE).permitAll()\n .mvcMatchers(HttpMethod.POST, SUBMISSION_ROUTE).permitAll()\n .anyRequest().denyAll()\n .and().csrf().disable();\n+ http.headers().contentSecurityPolicy(\"default-src 'self'\");\n }\n \n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/config/SubmissionServiceConfig.java\n@@ -20,35 +20,45 @@\n \n package app.coronawarn.server.services.submission.config;\n \n+import java.io.File;\n+import javax.validation.constraints.Max;\n+import javax.validation.constraints.Min;\n import org.springframework.boot.context.properties.ConfigurationProperties;\n import org.springframework.stereotype.Component;\n+import org.springframework.validation.annotation.Validated;\n \n @Component\n @ConfigurationProperties(prefix = \"services.submission\")\n+@Validated\n public class SubmissionServiceConfig {\n \n // Exponential moving average of the last N real request durations (in ms), where\n // N = fakeDelayMovingAverageSamples.\n- private Double initialFakeDelayMilliseconds;\n- private Double fakeDelayMovingAverageSamples;\n+ private Long initialFakeDelayMilliseconds;\n+ private Long fakeDelayMovingAverageSamples;\n private Integer retentionDays;\n+ @Min(1)\n+ @Max(25)\n+ private Integer randomKeyPaddingMultiplier;\n+ private Integer connectionPoolSize;\n private Payload payload;\n private Verification verification;\n private Monitoring monitoring;\n+ private Client client;\n \n- public Double getInitialFakeDelayMilliseconds() {\n+ public Long getInitialFakeDelayMilliseconds() {\n return initialFakeDelayMilliseconds;\n }\n \n- public void setInitialFakeDelayMilliseconds(Double initialFakeDelayMilliseconds) {\n+ public void setInitialFakeDelayMilliseconds(Long initialFakeDelayMilliseconds) {\n this.initialFakeDelayMilliseconds = initialFakeDelayMilliseconds;\n }\n \n- public Double getFakeDelayMovingAverageSamples() {\n+ public Long getFakeDelayMovingAverageSamples() {\n return fakeDelayMovingAverageSamples;\n }\n \n- public void setFakeDelayMovingAverageSamples(Double fakeDelayMovingAverageSamples) {\n+ public void setFakeDelayMovingAverageSamples(Long fakeDelayMovingAverageSamples) {\n this.fakeDelayMovingAverageSamples = fakeDelayMovingAverageSamples;\n }\n \n@@ -60,6 +70,22 @@ public void setRetentionDays(Integer retentionDays) {\n this.retentionDays = retentionDays;\n }\n \n+ public Integer getRandomKeyPaddingMultiplier() {\n+ return randomKeyPaddingMultiplier;\n+ }\n+\n+ public void setRandomKeyPaddingMultiplier(Integer randomKeyPaddingMultiplier) {\n+ this.randomKeyPaddingMultiplier = randomKeyPaddingMultiplier;\n+ }\n+\n+ public Integer getConnectionPoolSize() {\n+ return connectionPoolSize;\n+ }\n+\n+ public void setConnectionPoolSize(Integer connectionPoolSize) {\n+ this.connectionPoolSize = connectionPoolSize;\n+ }\n+\n public Integer getMaxNumberOfKeys() {\n return payload.getMaxNumberOfKeys();\n }\n@@ -116,13 +142,13 @@ public void setPath(String path) {\n }\n \n private static class Monitoring {\n- private Integer batchSize;\n+ private Long batchSize;\n \n- public Integer getBatchSize() {\n+ public Long getBatchSize() {\n return batchSize;\n }\n \n- public void setBatchSize(Integer batchSize) {\n+ public void setBatchSize(Long batchSize) {\n this.batchSize = batchSize;\n }\n }\n@@ -135,11 +161,81 @@ public void setMonitoring(Monitoring monitoring) {\n this.monitoring = monitoring;\n }\n \n- public Integer getMonitoringBatchSize() {\n+ public Long getMonitoringBatchSize() {\n return this.monitoring.getBatchSize();\n }\n \n- public void setMonitoringBatchSize(Integer batchSize) {\n+ public void setMonitoringBatchSize(Long batchSize) {\n this.monitoring.setBatchSize(batchSize);\n }\n+\n+ public Client getClient() {\n+ return client;\n+ }\n+\n+ public void setClient(Client client) {\n+ this.client = client;\n+ }\n+\n+ public static class Client {\n+\n+ private Ssl ssl;\n+\n+ public Ssl getSsl() {\n+ return ssl;\n+ }\n+\n+ public void setSsl(Ssl ssl) {\n+ this.ssl = ssl;\n+ }\n+\n+ public static class Ssl {\n+\n+ private File keyStore;\n+ private String keyStorePassword;\n+ private String keyPassword;\n+ private File trustStore;\n+ private String trustStorePassword;\n+\n+ public File getKeyStore() {\n+ return keyStore;\n+ }\n+\n+ public void setKeyStore(File keyStore) {\n+ this.keyStore = keyStore;\n+ }\n+\n+ public String getKeyStorePassword() {\n+ return keyStorePassword;\n+ }\n+\n+ public void setKeyStorePassword(String keyStorePassword) {\n+ this.keyStorePassword = keyStorePassword;\n+ }\n+\n+ public String getKeyPassword() {\n+ return keyPassword;\n+ }\n+\n+ public void setKeyPassword(String keyPassword) {\n+ this.keyPassword = keyPassword;\n+ }\n+\n+ public File getTrustStore() {\n+ return trustStore;\n+ }\n+\n+ public void setTrustStore(File trustStore) {\n+ this.trustStore = trustStore;\n+ }\n+\n+ public String getTrustStorePassword() {\n+ return trustStorePassword;\n+ }\n+\n+ public void setTrustStorePassword(String trustStorePassword) {\n+ this.trustStorePassword = trustStorePassword;\n+ }\n+ }\n+ }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/FakeDelayManager.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/FakeDelayManager.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/FakeDelayManager.java\n@@ -0,0 +1,62 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.controller;\n+\n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n+import org.apache.commons.math3.distribution.PoissonDistribution;\n+import org.springframework.stereotype.Component;\n+\n+/**\n+ * {@link FakeDelayManager} instances manage the response delay in the processing of fake (or \"dummy\") requests.\n+ */\n+@Component\n+public class FakeDelayManager {\n+\n+ private final long movingAverageSampleSize;\n+ private long fakeDelay;\n+\n+ public FakeDelayManager(SubmissionServiceConfig submissionServiceConfig) {\n+ this.fakeDelay = submissionServiceConfig.getInitialFakeDelayMilliseconds();\n+ this.movingAverageSampleSize = submissionServiceConfig.getFakeDelayMovingAverageSamples();\n+ }\n+\n+ /**\n+ * Returns the current fake delay after applying random jitter.\n+ */\n+ public long getJitteredFakeDelay() {\n+ return new PoissonDistribution(fakeDelay).sample();\n+ }\n+\n+ /**\n+ * Updates the moving average for the request duration with the specified value.\n+ */\n+ public void updateFakeRequestDelay(long realRequestDuration) {\n+ final long currentDelay = fakeDelay;\n+ fakeDelay = currentDelay + (realRequestDuration - currentDelay) / movingAverageSampleSize;\n+ }\n+\n+ /**\n+ * Returns the current fake delay in seconds. Used for monitoring.\n+ */\n+ public Double getFakeDelayInSeconds() {\n+ return fakeDelay / 1000.;\n+ }\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/FakeRequestController.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/FakeRequestController.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/FakeRequestController.java\n@@ -0,0 +1,69 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.controller;\n+\n+import static app.coronawarn.server.services.submission.controller.SubmissionController.SUBMISSION_ROUTE;\n+import static java.util.concurrent.TimeUnit.MILLISECONDS;\n+\n+import app.coronawarn.server.services.submission.monitoring.SubmissionMonitor;\n+import io.micrometer.core.annotation.Timed;\n+import java.util.concurrent.Executors;\n+import java.util.concurrent.ScheduledExecutorService;\n+import org.springframework.http.ResponseEntity;\n+import org.springframework.web.bind.annotation.PostMapping;\n+import org.springframework.web.bind.annotation.RequestHeader;\n+import org.springframework.web.bind.annotation.RequestMapping;\n+import org.springframework.web.bind.annotation.RestController;\n+import org.springframework.web.context.request.async.DeferredResult;\n+\n+@RestController\n+@RequestMapping(\"/version/v1\")\n+public class FakeRequestController {\n+\n+ private final ScheduledExecutorService scheduledExecutor = Executors.newScheduledThreadPool(4);\n+ private final SubmissionMonitor submissionMonitor;\n+ private final FakeDelayManager fakeDelayManager;\n+\n+ FakeRequestController(SubmissionMonitor submissionMonitor, FakeDelayManager fakeDelayManager) {\n+ this.submissionMonitor = submissionMonitor;\n+ this.fakeDelayManager = fakeDelayManager;\n+ }\n+\n+ /**\n+ * Handles \"fake\" requests. The concept of fake (or \"dummy\") requests is a privacy preserving measure which is\n+ * characterized by having corona warn app send \"dummy\" requests in randomized intervals. These requests are not\n+ * triggering any diagnosis key processing/storage on the server but simply result in an HTTP response with status\n+ * code 200 (OK) after a dynamically calculated delay.\n+ *\n+ * @param fake The header flag, marking fake requests.\n+ * @return An empty response body and HTTP status code 200 (OK).\n+ */\n+ @PostMapping(value = SUBMISSION_ROUTE, headers = {\"cwa-fake!=0\"})\n+ @Timed(description = \"Time spent handling fake submission.\")\n+ public DeferredResult> fakeRequest(@RequestHeader(\"cwa-fake\") Integer fake) {\n+ submissionMonitor.incrementRequestCounter();\n+ submissionMonitor.incrementFakeRequestCounter();\n+ long delay = fakeDelayManager.getJitteredFakeDelay();\n+ DeferredResult> deferredResult = new DeferredResult<>();\n+ scheduledExecutor.schedule(() -> deferredResult.setResult(ResponseEntity.ok().build()), delay, MILLISECONDS);\n+ return deferredResult;\n+ }\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/controller/SubmissionController.java\n@@ -25,17 +25,14 @@\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n import app.coronawarn.server.common.protocols.internal.SubmissionPayload;\n import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n-import app.coronawarn.server.services.submission.monitoring.SubmissionControllerMonitor;\n+import app.coronawarn.server.services.submission.monitoring.SubmissionMonitor;\n import app.coronawarn.server.services.submission.validation.ValidSubmissionPayload;\n import app.coronawarn.server.services.submission.verification.TanVerifier;\n import io.micrometer.core.annotation.Timed;\n+import java.security.SecureRandom;\n import java.util.ArrayList;\n import java.util.List;\n-import java.util.concurrent.Executors;\n-import java.util.concurrent.ForkJoinPool;\n-import java.util.concurrent.ScheduledExecutorService;\n-import java.util.concurrent.TimeUnit;\n-import org.apache.commons.math3.distribution.PoissonDistribution;\n+import java.util.stream.IntStream;\n import org.slf4j.Logger;\n import org.slf4j.LoggerFactory;\n import org.springframework.http.HttpStatus;\n@@ -60,96 +57,64 @@ public class SubmissionController {\n */\n public static final String SUBMISSION_ROUTE = \"/diagnosis-keys\";\n \n- private final SubmissionControllerMonitor submissionControllerMonitor;\n- private final ScheduledExecutorService scheduledExecutor = Executors.newSingleThreadScheduledExecutor();\n- private final ForkJoinPool forkJoinPool = ForkJoinPool.commonPool();\n+ private final SubmissionMonitor submissionMonitor;\n private final DiagnosisKeyService diagnosisKeyService;\n private final TanVerifier tanVerifier;\n- private final Double fakeDelayMovingAverageSamples;\n private final Integer retentionDays;\n- private Double fakeDelay;\n+ private final Integer randomKeyPaddingMultiplier;\n+ private final FakeDelayManager fakeDelayManager;\n \n- SubmissionController(DiagnosisKeyService diagnosisKeyService, TanVerifier tanVerifier,\n- SubmissionServiceConfig submissionServiceConfig, SubmissionControllerMonitor submissionControllerMonitor) {\n+ SubmissionController(\n+ DiagnosisKeyService diagnosisKeyService, TanVerifier tanVerifier, FakeDelayManager fakeDelayManager,\n+ SubmissionServiceConfig submissionServiceConfig, SubmissionMonitor submissionMonitor) {\n this.diagnosisKeyService = diagnosisKeyService;\n this.tanVerifier = tanVerifier;\n- this.submissionControllerMonitor = submissionControllerMonitor;\n- fakeDelay = submissionServiceConfig.getInitialFakeDelayMilliseconds();\n- fakeDelayMovingAverageSamples = submissionServiceConfig.getFakeDelayMovingAverageSamples();\n+ this.submissionMonitor = submissionMonitor;\n+ this.fakeDelayManager = fakeDelayManager;\n retentionDays = submissionServiceConfig.getRetentionDays();\n- submissionControllerMonitor.initializeGauges(this);\n+ randomKeyPaddingMultiplier = submissionServiceConfig.getRandomKeyPaddingMultiplier();\n }\n \n /**\n * Handles diagnosis key submission requests.\n *\n * @param exposureKeys The unmarshalled protocol buffers submission payload.\n- * @param fake A header flag, marking fake requests.\n * @param tan A tan for diagnosis verification.\n * @return An empty response body.\n */\n- @PostMapping(SUBMISSION_ROUTE)\n+ @PostMapping(value = SUBMISSION_ROUTE, headers = {\"cwa-fake=0\"})\n @Timed(description = \"Time spent handling submission.\")\n public DeferredResult> submitDiagnosisKey(\n @ValidSubmissionPayload @RequestBody SubmissionPayload exposureKeys,\n- @RequestHeader(\"cwa-fake\") Integer fake,\n @RequestHeader(\"cwa-authorization\") String tan) {\n- submissionControllerMonitor.incrementRequestCounter();\n- if (fake != 0) {\n- submissionControllerMonitor.incrementFakeRequestCounter();\n- return buildFakeDeferredResult();\n- } else {\n- submissionControllerMonitor.incrementRealRequestCounter();\n- return buildRealDeferredResult(exposureKeys, tan);\n- }\n- }\n-\n- private DeferredResult> buildFakeDeferredResult() {\n- DeferredResult> deferredResult = new DeferredResult<>();\n- long delay = new PoissonDistribution(fakeDelay).sample();\n- scheduledExecutor.schedule(() -> deferredResult.setResult(buildSuccessResponseEntity()),\n- delay, TimeUnit.MILLISECONDS);\n- return deferredResult;\n+ submissionMonitor.incrementRequestCounter();\n+ submissionMonitor.incrementRealRequestCounter();\n+ return buildRealDeferredResult(exposureKeys, tan);\n }\n \n private DeferredResult> buildRealDeferredResult(SubmissionPayload exposureKeys, String tan) {\n DeferredResult> deferredResult = new DeferredResult<>();\n \n- forkJoinPool.submit(() -> {\n- try {\n- StopWatch stopWatch = new StopWatch();\n- stopWatch.start();\n- if (!this.tanVerifier.verifyTan(tan)) {\n- submissionControllerMonitor.incrementInvalidTanRequestCounter();\n- deferredResult.setResult(buildTanInvalidResponseEntity());\n- } else {\n- persistDiagnosisKeysPayload(exposureKeys);\n- deferredResult.setResult(buildSuccessResponseEntity());\n- stopWatch.stop();\n- updateFakeDelay(stopWatch.getTotalTimeMillis());\n- }\n- } catch (Exception e) {\n- deferredResult.setErrorResult(e);\n+ StopWatch stopWatch = new StopWatch();\n+ stopWatch.start();\n+ try {\n+ if (!this.tanVerifier.verifyTan(tan)) {\n+ submissionMonitor.incrementInvalidTanRequestCounter();\n+ deferredResult.setResult(ResponseEntity.status(HttpStatus.FORBIDDEN).build());\n+ } else {\n+ persistDiagnosisKeysPayload(exposureKeys);\n+ deferredResult.setResult(ResponseEntity.ok().build());\n }\n- });\n+ } catch (Exception e) {\n+ deferredResult.setErrorResult(e);\n+ } finally {\n+ stopWatch.stop();\n+ fakeDelayManager.updateFakeRequestDelay(stopWatch.getTotalTimeMillis());\n+ }\n \n return deferredResult;\n }\n \n- /**\n- * Returns a response that indicates successful request processing.\n- */\n- private ResponseEntity buildSuccessResponseEntity() {\n- return ResponseEntity.ok().build();\n- }\n-\n- /**\n- * Returns a response that indicates that an invalid TAN was specified in the request.\n- */\n- private ResponseEntity buildTanInvalidResponseEntity() {\n- return ResponseEntity.status(HttpStatus.FORBIDDEN).build();\n- }\n-\n /**\n * Persists the diagnosis keys contained in the specified request payload.\n *\n@@ -169,19 +134,28 @@ public void persistDiagnosisKeysPayload(SubmissionPayload protoBufDiagnosisKeys)\n }\n }\n \n- diagnosisKeyService.saveDiagnosisKeys(diagnosisKeys);\n+ diagnosisKeyService.saveDiagnosisKeys(padDiagnosisKeys(diagnosisKeys));\n }\n \n- private void updateFakeDelay(long realRequestDuration) {\n- final Double currentDelay = fakeDelay;\n- fakeDelay = currentDelay + (1 / fakeDelayMovingAverageSamples) * (realRequestDuration - currentDelay);\n+ private List padDiagnosisKeys(List diagnosisKeys) {\n+ List paddedDiagnosisKeys = new ArrayList<>();\n+ diagnosisKeys.forEach(diagnosisKey -> {\n+ paddedDiagnosisKeys.add(diagnosisKey);\n+ IntStream.range(1, randomKeyPaddingMultiplier)\n+ .mapToObj(index -> DiagnosisKey.builder()\n+ .withKeyData(generateRandomKeyData())\n+ .withRollingStartIntervalNumber(diagnosisKey.getRollingStartIntervalNumber())\n+ .withTransmissionRiskLevel(diagnosisKey.getTransmissionRiskLevel())\n+ .withRollingPeriod(diagnosisKey.getRollingPeriod())\n+ .build())\n+ .forEach(paddedDiagnosisKeys::add);\n+ });\n+ return paddedDiagnosisKeys;\n }\n \n- /**\n- * Gets the current fake delay. Used for monitoring.\n- * @return the current fake delay\n- */\n- public Double getFakeDelay() {\n- return fakeDelay;\n+ private static byte[] generateRandomKeyData() {\n+ byte[] randomKeyData = new byte[16];\n+ new SecureRandom().nextBytes(randomKeyData);\n+ return randomKeyData;\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/BatchCounter.java\n@@ -22,6 +22,7 @@\n \n import io.micrometer.core.instrument.Counter;\n import io.micrometer.core.instrument.MeterRegistry;\n+import java.util.concurrent.atomic.AtomicLong;\n \n /**\n * Batch counter for counting requests for monitoring. Counts up in batches, given batch size. This way, single requests\n@@ -29,15 +30,15 @@\n */\n public class BatchCounter {\n \n- private static final String SUBMISSION_CONTROLLER_REQUESTS_COUNTER_NAME = \"submissionController.requests\";\n+ private static final String SUBMISSION_CONTROLLER_REQUESTS_COUNTER_NAME = \"submission_controller.requests\";\n private static final String SUBMISSION_CONTROLLER_REQUESTS_COUNTER_DESCRIPTION\n = \"Counts requests to the Submission Controller.\";\n \n- private final int batchSize;\n+ private final long batchSize;\n private final Counter counter;\n- private Double batch = 0.;\n+ private final AtomicLong count = new AtomicLong(0L);\n \n- BatchCounter(MeterRegistry meterRegistry, int batchSize, String type) {\n+ BatchCounter(MeterRegistry meterRegistry, long batchSize, String type) {\n this.batchSize = batchSize;\n counter = Counter.builder(SUBMISSION_CONTROLLER_REQUESTS_COUNTER_NAME)\n .tag(\"type\", type)\n@@ -50,11 +51,8 @@ public class BatchCounter {\n * counter is incremented.\n */\n public void increment() {\n- if (batch < batchSize) {\n- batch++;\n- } else {\n- counter.increment(batch);\n- batch = 1.;\n+ if (0 == count.incrementAndGet() % batchSize) {\n+ counter.increment(batchSize);\n }\n }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionMonitor.java\nsimilarity index 70%\nrename from services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java\nrename to services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionMonitor.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionControllerMonitor.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/monitoring/SubmissionMonitor.java\n@@ -21,44 +21,46 @@\n package app.coronawarn.server.services.submission.monitoring;\n \n import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n-import app.coronawarn.server.services.submission.controller.SubmissionController;\n+import app.coronawarn.server.services.submission.controller.FakeDelayManager;\n import io.micrometer.core.instrument.Gauge;\n import io.micrometer.core.instrument.MeterRegistry;\n import org.springframework.boot.context.properties.ConfigurationProperties;\n import org.springframework.stereotype.Component;\n \n /**\n- * Provides functionality for monitoring the application logic of the\n- * {@link app.coronawarn.server.services.submission.controller.SubmissionController}.\n+ * Provides functionality for monitoring the diagnosis key submission handling logic.\n */\n @Component\n @ConfigurationProperties(prefix = \"services.submission.monitoring\")\n-public class SubmissionControllerMonitor {\n- private static final String SUBMISSION_CONTROLLER_CURRENT_FAKE_DELAY = \"submissionController.fakeDelay\";\n+public class SubmissionMonitor {\n \n- private final MeterRegistry meterRegistry;\n+ private static final String SUBMISSION_CONTROLLER_CURRENT_FAKE_DELAY = \"submission_controller.fake_delay_seconds\";\n \n- private final Integer batchSize;\n+ private final MeterRegistry meterRegistry;\n+ private final long batchSize;\n private BatchCounter requests;\n private BatchCounter realRequests;\n private BatchCounter fakeRequests;\n private BatchCounter invalidTanRequests;\n \n /**\n- * Constructor for {@link SubmissionControllerMonitor}. Initializes all counters to 0 upon being called.\n+ * Constructor for {@link SubmissionMonitor}. Initializes all counters to 0 upon being called.\n *\n * @param meterRegistry the meterRegistry\n+ * @param fakeDelayManager the fake delay manager whose fake delay will be monitored\n */\n- protected SubmissionControllerMonitor(MeterRegistry meterRegistry, SubmissionServiceConfig submissionServiceConfig) {\n+ protected SubmissionMonitor(\n+ MeterRegistry meterRegistry, SubmissionServiceConfig submissionServiceConfig, FakeDelayManager fakeDelayManager) {\n this.meterRegistry = meterRegistry;\n this.batchSize = submissionServiceConfig.getMonitoringBatchSize();\n initializeCounters();\n+ initializeGauges(fakeDelayManager);\n }\n \n /**\n * We count the following values.\n *
\n- *
All requests that come in to the {@link SubmissionController}.\n+ *
All requests that reach the controllers.\n *
As part of all, the number of requests that are not fake.\n *
As part of all, the number of requests that are fake.\n *
As part of all, the number of requests for that the TAN-validation failed.\n@@ -72,14 +74,14 @@ private void initializeCounters() {\n }\n \n /**\n- * Initializes the gauges for the {@link SubmissionController} that is being monitored. Currently, only the delay time\n- * of fake requests is measured.\n+ * Initializes the gauges for the {@link FakeDelayManager} that is being monitored. Currently, only the delay time of\n+ * fake requests is measured.\n *\n- * @param submissionController the submission controller for which the gauges shall be initialized\n+ * @param fakeDelayManager the fake request handler for which the gauges shall be initialized\n */\n- public void initializeGauges(SubmissionController submissionController) {\n- Gauge.builder(SUBMISSION_CONTROLLER_CURRENT_FAKE_DELAY, submissionController,\n- __ -> submissionController.getFakeDelay())\n+ private void initializeGauges(FakeDelayManager fakeDelayManager) {\n+ Gauge.builder(SUBMISSION_CONTROLLER_CURRENT_FAKE_DELAY, fakeDelayManager,\n+ ignoredValue -> fakeDelayManager.getFakeDelayInSeconds())\n .description(\"The time that fake requests are delayed to make them indistinguishable from real requests.\")\n .register(meterRegistry);\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/validation/ValidSubmissionPayload.java\n@@ -32,7 +32,6 @@\n import java.lang.annotation.Target;\n import java.util.Arrays;\n import java.util.List;\n-import java.util.Objects;\n import javax.validation.Constraint;\n import javax.validation.ConstraintValidator;\n import javax.validation.ConstraintValidatorContext;\n@@ -88,11 +87,6 @@ public boolean isValid(SubmissionPayload submissionPayload, ConstraintValidatorC\n List exposureKeys = submissionPayload.getKeysList();\n validatorContext.disableDefaultConstraintViolation();\n \n- if (Objects.isNull(exposureKeys)) {\n- addViolation(validatorContext, \"Field 'keys' points to Null.\");\n- return false;\n- }\n-\n boolean isValid = checkKeyCollectionSize(exposureKeys, validatorContext);\n isValid &= checkUniqueStartIntervalNumbers(exposureKeys, validatorContext);\n isValid &= checkNoOverlapsInTimeWindow(exposureKeys, validatorContext);\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/CloudFeignClientProvider.java\n@@ -20,51 +20,81 @@\n \n package app.coronawarn.server.services.submission.verification;\n \n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig.Client.Ssl;\n import feign.Client;\n+import feign.httpclient.ApacheHttpClient;\n+import java.io.File;\n import java.io.IOException;\n import java.security.GeneralSecurityException;\n import javax.net.ssl.SSLContext;\n-import javax.net.ssl.SSLSocketFactory;\n-import org.apache.http.conn.ssl.NoopHostnameVerifier;\n+import org.apache.http.impl.client.HttpClientBuilder;\n import org.apache.http.ssl.SSLContextBuilder;\n+import org.springframework.cloud.commons.httpclient.ApacheHttpClientConnectionManagerFactory;\n+import org.springframework.cloud.commons.httpclient.ApacheHttpClientFactory;\n+import org.springframework.cloud.commons.httpclient.DefaultApacheHttpClientConnectionManagerFactory;\n+import org.springframework.cloud.commons.httpclient.DefaultApacheHttpClientFactory;\n+import org.springframework.context.annotation.Bean;\n import org.springframework.context.annotation.Profile;\n-import org.springframework.core.env.Environment;\n import org.springframework.stereotype.Component;\n-import org.springframework.util.ResourceUtils;\n \n @Component\n-@Profile(\"ssl-client-verification\")\n+@Profile(\"!disable-ssl-client-verification\")\n public class CloudFeignClientProvider implements FeignClientProvider {\n \n- Environment environment;\n+ private final HostnameVerifierProvider hostnameVerifierProvider;\n+ private final Integer connectionPoolSize;\n+ private final File keyStore;\n+ private final String keyStorePassword;\n+ private final String keyPassword;\n+ private final File trustStore;\n+ private final String trustStorePassword;\n \n- public CloudFeignClientProvider(Environment environment) {\n- this.environment = environment;\n+ /**\n+ * Creates a {@link CloudFeignClientProvider} that provides feign clients with fixed key and trust material.\n+ */\n+ public CloudFeignClientProvider(SubmissionServiceConfig config, HostnameVerifierProvider hostnameVerifierProvider) {\n+ Ssl sslConfig = config.getClient().getSsl();\n+ this.keyStore = sslConfig.getKeyStore();\n+ this.keyStorePassword = sslConfig.getKeyStorePassword();\n+ this.keyPassword = sslConfig.getKeyPassword();\n+ this.trustStore = sslConfig.getTrustStore();\n+ this.trustStorePassword = sslConfig.getTrustStorePassword();\n+ this.connectionPoolSize = config.getConnectionPoolSize();\n+ this.hostnameVerifierProvider = hostnameVerifierProvider;\n }\n \n @Override\n public Client createFeignClient() {\n- return new Client.Default(getSslSocketFactory(), new NoopHostnameVerifier());\n+ return new ApacheHttpClient(createHttpClientFactory().createBuilder().build());\n }\n \n- private SSLSocketFactory getSslSocketFactory() {\n+ private SSLContext getSslContext() {\n try {\n- String keyStorePath = environment.getProperty(\"client.ssl.key-store\");\n- String keyStorePassword = environment.getProperty(\"client.ssl.key-store-password\");\n- String keyPassword = environment.getProperty(\"client.ssl.key-password\");\n-\n- String trustStorePath = environment.getProperty(\"client.ssl.verification.trust-store\");\n- String trustStorePassword = environment.getProperty(\"client.ssl.verification.trust-store-password\");\n-\n- SSLContext sslContext = SSLContextBuilder\n+ return SSLContextBuilder\n .create()\n- .loadKeyMaterial(ResourceUtils.getFile(keyStorePath), keyStorePassword.toCharArray(),\n- keyPassword.toCharArray())\n- .loadTrustMaterial(ResourceUtils.getFile(trustStorePath), trustStorePassword.toCharArray())\n+ .loadKeyMaterial(this.keyStore, this.keyStorePassword.toCharArray(), this.keyPassword.toCharArray())\n+ .loadTrustMaterial(this.trustStore, this.trustStorePassword.toCharArray())\n .build();\n- return sslContext.getSocketFactory();\n } catch (IOException | GeneralSecurityException e) {\n throw new RuntimeException(e);\n }\n }\n+\n+ /**\n+ * Creates an {@link ApacheHttpClientFactory} that validates SSL certificates and host names.\n+ */\n+ @Bean\n+ public ApacheHttpClientFactory createHttpClientFactory() {\n+ return new DefaultApacheHttpClientFactory(HttpClientBuilder.create()\n+ .setMaxConnPerRoute(this.connectionPoolSize)\n+ .setMaxConnTotal(this.connectionPoolSize)\n+ .setSSLContext(getSslContext())\n+ .setSSLHostnameVerifier(this.hostnameVerifierProvider.createHostnameVerifier()));\n+ }\n+\n+ @Bean\n+ public ApacheHttpClientConnectionManagerFactory createConnectionManager() {\n+ return new DefaultApacheHttpClientConnectionManagerFactory();\n+ }\n }\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DefaultHostnameVerifierProvider.java\n@@ -0,0 +1,36 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import javax.net.ssl.HostnameVerifier;\n+import org.apache.http.conn.ssl.DefaultHostnameVerifier;\n+import org.springframework.context.annotation.Profile;\n+import org.springframework.stereotype.Component;\n+\n+@Component\n+@Profile(\"!disable-ssl-client-verification-verify-hostname\")\n+public class DefaultHostnameVerifierProvider implements HostnameVerifierProvider {\n+\n+ @Override\n+ public HostnameVerifier createHostnameVerifier() {\n+ return new DefaultHostnameVerifier();\n+ }\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/DevelopmentFeignClientProvider.java\n@@ -20,6 +20,7 @@\n \n package app.coronawarn.server.services.submission.verification;\n \n+import app.coronawarn.server.services.submission.config.SubmissionServiceConfig;\n import feign.Client;\n import feign.httpclient.ApacheHttpClient;\n import org.apache.http.impl.client.HttpClientBuilder;\n@@ -32,17 +33,32 @@\n import org.springframework.stereotype.Component;\n \n @Component\n-@Profile(\"!ssl-client-verification\")\n+@Profile(\"disable-ssl-client-verification\")\n public class DevelopmentFeignClientProvider implements FeignClientProvider {\n \n+ private final HostnameVerifierProvider hostnameVerifierProvider;\n+ private final Integer connectionPoolSize;\n+\n+ public DevelopmentFeignClientProvider(SubmissionServiceConfig config,\n+ HostnameVerifierProvider hostnameVerifierProvider) {\n+ this.connectionPoolSize = config.getConnectionPoolSize();\n+ this.hostnameVerifierProvider = hostnameVerifierProvider;\n+ }\n+\n @Override\n public Client createFeignClient() {\n- return new ApacheHttpClient();\n+ return new ApacheHttpClient(createHttpClientFactory().createBuilder().build());\n }\n \n+ /**\n+ * Creates an {@link ApacheHttpClientFactory} that neither validates SSL certificates nor host names.\n+ */\n @Bean\n public ApacheHttpClientFactory createHttpClientFactory() {\n- return new DefaultApacheHttpClientFactory(HttpClientBuilder.create());\n+ return new DefaultApacheHttpClientFactory(HttpClientBuilder.create()\n+ .setMaxConnPerRoute(this.connectionPoolSize)\n+ .setMaxConnTotal(this.connectionPoolSize)\n+ .setSSLHostnameVerifier(this.hostnameVerifierProvider.createHostnameVerifier()));\n }\n \n @Bean\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/HostnameVerifierProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/HostnameVerifierProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/HostnameVerifierProvider.java\n@@ -0,0 +1,28 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import javax.net.ssl.HostnameVerifier;\n+\n+public interface HostnameVerifierProvider {\n+\n+ HostnameVerifier createHostnameVerifier();\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/NoopHostnameVerifierProvider.java\n@@ -0,0 +1,36 @@\n+/*\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.submission.verification;\n+\n+import javax.net.ssl.HostnameVerifier;\n+import org.apache.http.conn.ssl.NoopHostnameVerifier;\n+import org.springframework.context.annotation.Profile;\n+import org.springframework.stereotype.Component;\n+\n+@Component\n+@Profile(\"disable-ssl-client-verification-verify-hostname\")\n+public class NoopHostnameVerifierProvider implements HostnameVerifierProvider {\n+\n+ @Override\n+ public HostnameVerifier createHostnameVerifier() {\n+ return new NoopHostnameVerifier();\n+ }\n+}\ndiff --git a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n--- a/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n+++ b/services/submission/src/main/java/app/coronawarn/server/services/submission/verification/TanVerifier.java\n@@ -57,7 +57,8 @@ public boolean verifyTan(String tanString) {\n \n return verifyWithVerificationService(tan);\n } catch (IllegalArgumentException e) {\n- logger.debug(\"TAN Syntax check failed for TAN: {}\", tanString.trim());\n+ logger.error(\"TAN Syntax check failed for TAN: {}, length: {}\",\n+ tanString.substring(0, Math.min(36, tanString.length())), tanString.length());\n return false;\n }\n }\ndiff --git a/services/submission/src/main/resources/application-cloud.yaml b/services/submission/src/main/resources/application-cloud.yaml\n--- a/services/submission/src/main/resources/application-cloud.yaml\n+++ b/services/submission/src/main/resources/application-cloud.yaml\n@@ -1,13 +1,10 @@\n ---\n spring:\n flyway:\n- enabled: true\n- locations: classpath:db/migration/postgres\n password: ${POSTGRESQL_PASSWORD_FLYWAY}\n user: ${POSTGRESQL_USER_FLYWAY}\n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}\n username: ${POSTGRESQL_USER_SUBMISSION}\n password: ${POSTGRESQL_PASSWORD_SUBMISSION}\n \ndiff --git a/services/submission/src/main/resources/application-dev.yaml b/services/submission/src/main/resources/application-dev.yaml\n--- a/services/submission/src/main/resources/application-dev.yaml\n+++ b/services/submission/src/main/resources/application-dev.yaml\n@@ -4,3 +4,5 @@ logging:\n org:\n springframework:\n web: DEBUG\n+ app:\n+ coronawarn: DEBUG\ndiff --git a/services/submission/src/main/resources/application-disable-ssl-client-postgres.yaml b/services/submission/src/main/resources/application-disable-ssl-client-postgres.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application-disable-ssl-client-postgres.yaml\n@@ -0,0 +1,4 @@\n+---\n+spring:\n+ datasource:\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\ndiff --git a/services/submission/src/main/resources/application-disable-ssl-server.yaml b/services/submission/src/main/resources/application-disable-ssl-server.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/application-disable-ssl-server.yaml\n@@ -0,0 +1,4 @@\n+---\n+server:\n+ ssl:\n+ enabled: false\ndiff --git a/services/submission/src/main/resources/application-ssl-client-postgres.yaml b/services/submission/src/main/resources/application-ssl-client-postgres.yaml\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-ssl-client-postgres.yaml\n+++ /dev/null\n@@ -1,4 +0,0 @@\n----\n-spring:\n- datasource:\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_SUBMISSION_CERTIFICATE_PATH}&sslkey=${SSL_SUBMISSION_PRIVATE_KEY_PATH}\ndiff --git a/services/submission/src/main/resources/application-ssl-client-verification.yaml b/services/submission/src/main/resources/application-ssl-client-verification.yaml\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-ssl-client-verification.yaml\n+++ /dev/null\n@@ -1,9 +0,0 @@\n----\n-client:\n- ssl:\n- key-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- key-store: ${SSL_SUBMISSION_KEYSTORE_PATH}\n- key-store-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- verification:\n- trust-store: ${SSL_VERIFICATION_TRUSTSTORE_PATH}\n- trust-store-password: ${SSL_VERIFICATION_TRUSTSTORE_PASSWORD}\ndiff --git a/services/submission/src/main/resources/application-ssl-server.yaml b/services/submission/src/main/resources/application-ssl-server.yaml\ndeleted file mode 100644\n--- a/services/submission/src/main/resources/application-ssl-server.yaml\n+++ /dev/null\n@@ -1,9 +0,0 @@\n----\n-server:\n- ssl:\n- enabled: true\n- key-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- key-store: ${SSL_SUBMISSION_KEYSTORE_PATH}\n- key-store-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n- key-store-provider: SUN\n- key-store-type: JKS\ndiff --git a/services/submission/src/main/resources/application.yaml b/services/submission/src/main/resources/application.yaml\n--- a/services/submission/src/main/resources/application.yaml\n+++ b/services/submission/src/main/resources/application.yaml\n@@ -4,6 +4,8 @@ logging:\n org:\n springframework:\n web: INFO\n+ app:\n+ coronawarn: INFO\n \n services:\n submission:\n@@ -11,31 +13,53 @@ services:\n initial-fake-delay-milliseconds: 10\n # The number of samples for the calculation of the moving average for fake request delays.\n fake-delay-moving-average-samples: 10\n+ # The retention threshold for acceptable diagnosis keys during submission.\n retention-days: 14\n+ # The number of keys to save to the DB for every real submitted key.\n+ # Example: If the 'random-key-padding-multiplier' is set to 10, and 5 keys are being submitted,\n+ # then the 5 real submitted keys will be saved to the DB, plus an additional 45 keys with\n+ # random 'key_data'. All properties, besides the 'key_data', of the additional keys will be\n+ # identical to the real key.\n+ random-key-padding-multiplier: ${RANDOM_KEY_PADDING_MULTIPLIER:1}\n+ # The ApacheHttpClient's connection pool size.\n+ connection-pool-size: 200\n payload:\n+ # The maximum number of keys accepted for any submission.\n max-number-of-keys: 14\n verification:\n base-url: ${VERIFICATION_BASE_URL:http://localhost:8004}\n path: /version/v1/tan/verify\n monitoring:\n+ # The batch size (number of requests) to use for monitoring request count.\n batch-size: 5\n+ client:\n+ ssl:\n+ key-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n+ key-store: ${SSL_SUBMISSION_KEYSTORE_PATH}\n+ key-store-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n+ trust-store: ${SSL_VERIFICATION_TRUSTSTORE_PATH}\n+ trust-store-password: ${SSL_VERIFICATION_TRUSTSTORE_PASSWORD}\n \n spring:\n- jpa:\n- hibernate:\n- ddl-auto: validate\n+ lifecycle:\n+ # keep in sync or lower than the kubernetes setting 'terminationGracePeriodSeconds'\n+ # 5s +5s Feign client + 20s DB timeout\n+ timeout-per-shutdown-phase: 30s\n+ transaction:\n+ default-timeout: 20\n flyway:\n enabled: true\n- locations: classpath:db/migration/postgres\n- password: ${POSTGRESQL_PASSWORD_FLYWAY:postgres}\n- user: ${POSTGRESQL_USER_FLYWAY:postgres}\n-# Postgres configuration\n+ locations: classpath:/db/migration, classpath:/db/specific/{vendor}\n+ password: ${POSTGRESQL_PASSWORD_FLYWAY:local_setup_flyway}\n+ user: ${POSTGRESQL_USER_FLYWAY:local_setup_flyway}\n+ # Postgres configuration\n datasource:\n driver-class-name: org.postgresql.Driver\n- url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST:localhost}:${POSTGRESQL_SERVICE_PORT:5432}/${POSTGRESQL_DATABASE:cwa}\n- username: ${POSTGRESQL_USER_SUBMISSION:postgres}\n- password: ${POSTGRESQL_PASSWORD_SUBMISSION:postgres}\n+ url: jdbc:postgresql://${POSTGRESQL_SERVICE_HOST}:${POSTGRESQL_SERVICE_PORT}/${POSTGRESQL_DATABASE}?ssl=true&sslmode=verify-full&sslrootcert=${SSL_POSTGRES_CERTIFICATE_PATH}&sslcert=${SSL_SUBMISSION_CERTIFICATE_PATH}&sslkey=${SSL_SUBMISSION_PRIVATE_KEY_PATH}\n+ username: ${POSTGRESQL_USER_SUBMISSION:local_setup_submission}\n+ password: ${POSTGRESQL_PASSWORD_SUBMISSION:local_setup_submission}\n \n+# Actuator configuration\n management:\n server:\n port: 8081\n@@ -60,3 +84,34 @@ management:\n health:\n probes:\n enabled: true\n+\n+server:\n+ shutdown: graceful\n+ ssl:\n+ enabled: true\n+ enabled-protocols: TLSv1.2,TLSv1.3\n+ protocol: TLS\n+ ciphers: >-\n+ TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n+ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n+ TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n+ TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n+ TLS_DHE_DSS_WITH_AES_128_GCM_SHA256\n+ TLS_DHE_DSS_WITH_AES_256_GCM_SHA384\n+ TLS_DHE_RSA_WITH_AES_128_GCM_SHA256\n+ TLS_DHE_RSA_WITH_AES_256_GCM_SHA384\n+ TLS_AES_128_GCM_SHA256\n+ TLS_AES_256_GCM_SHA384\n+ TLS_AES_128_CCM_SHA256\n+ key-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n+ key-store: ${SSL_SUBMISSION_KEYSTORE_PATH}\n+ key-store-password: ${SSL_SUBMISSION_KEYSTORE_PASSWORD}\n+ key-store-provider: SUN\n+ key-store-type: JKS\n+\n+feign:\n+ client:\n+ config:\n+ default:\n+ connect-timeout: 5000\n+ read-timeout: 5000\n\\ No newline at end of file\ndiff --git a/services/submission/src/main/resources/bootstrap-cloud.yaml b/services/submission/src/main/resources/bootstrap-cloud.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/bootstrap-cloud.yaml\n@@ -0,0 +1,27 @@\n+---\n+spring:\n+ application:\n+ name: cwa-server\n+ cloud:\n+ vault:\n+ enabled: true\n+ generic:\n+ enabled: false\n+ kv:\n+ enabled: true\n+ backend: ${VAULT_BACKEND}\n+ profile-separator: '/'\n+ application-name: 'submission'\n+ default-context: ''\n+ profiles: cloud\n+ fail-fast: true\n+ authentication: KUBERNETES\n+ kubernetes:\n+ role: ${VAULT_ROLE}\n+ kubernetes-path: kubernetes\n+ service-account-token-file: /var/run/secrets/kubernetes.io/serviceaccount/token\n+ uri: ${VAULT_URI}\n+ connection-timeout: 5000\n+ read-timeout: 15000\n+ config:\n+ order: -10\ndiff --git a/services/submission/src/main/resources/bootstrap.yaml b/services/submission/src/main/resources/bootstrap.yaml\nnew file mode 100644\n--- /dev/null\n+++ b/services/submission/src/main/resources/bootstrap.yaml\n@@ -0,0 +1,5 @@\n+---\n+spring:\n+ cloud:\n+ vault:\n+ enabled: false\ndiff --git a/services/submission/src/main/resources/log4j2-dev.xml b/services/submission/src/main/resources/log4j2-dev.xml\n--- a/services/submission/src/main/resources/log4j2-dev.xml\n+++ b/services/submission/src/main/resources/log4j2-dev.xml\n@@ -2,7 +2,7 @@\n \n \n %xwEx\n- yyyy-MM-dd'T'HH:mm:ssXXX\n+ yyyy-MM-dd'T'HH:mm:ssZ\n %d{${LOG_DATEFORMAT_PATTERN}} %-5level %t %c{1.}[%pid]: %m%n${sys:LOG_EXCEPTION_CONVERSION_WORD}\n \n \ndiff --git a/services/submission/src/main/resources/log4j2.xml b/services/submission/src/main/resources/log4j2.xml\n--- a/services/submission/src/main/resources/log4j2.xml\n+++ b/services/submission/src/main/resources/log4j2.xml\n@@ -1,8 +1,8 @@\n \n \n \n- yyyy-MM-dd'T'HH:mm:ssXXX\n- %d{${LOG_DATEFORMAT_PATTERN}} %-5level %t %c{1.}[%pid]: %m %replace{%rException}{\\n}{\\u2028}%n\n+ yyyy-MM-dd'T'HH:mm:ssZ\n+ %d{${LOG_DATEFORMAT_PATTERN}} %-5level %t %c{1.}[%pid]: %m %replace{%rException}{[\\r\\n]+}{\\u2028}%n\n \n \n \ndiff --git a/setup/create-users.sql b/setup/create-users.sql\nnew file mode 100644\n--- /dev/null\n+++ b/setup/create-users.sql\n@@ -0,0 +1,5 @@\n+/* Creates CWA users */\n+\n+CREATE USER \"\" WITH INHERIT IN ROLE cwa_flyway ENCRYPTED PASSWORD '';\n+CREATE USER \"\" WITH INHERIT IN ROLE cwa_submission ENCRYPTED PASSWORD '';\n+CREATE USER \"\" WITH INHERIT IN ROLE cwa_distribution ENCRYPTED PASSWORD '';\ndiff --git a/setup/setup-roles.sql b/setup/setup-roles.sql\nnew file mode 100644\n--- /dev/null\n+++ b/setup/setup-roles.sql\n@@ -0,0 +1,50 @@\n+/*\n+ * This SQL file needs to be executed when a new CWA database is set up.\n+ * It will create the necessary roles & restrict permissions to the CWA scope.\n+ */\n+\n+/* Revoke all default access to the database */\n+REVOKE ALL ON DATABASE cwa FROM PUBLIC;\n+REVOKE USAGE ON SCHEMA public FROM PUBLIC;\n+\n+/* Create roles */\n+CREATE ROLE cwa_user\n+ NOLOGIN\n+ NOSUPERUSER\n+ NOINHERIT\n+ NOCREATEDB\n+ NOCREATEROLE\n+ NOREPLICATION;\n+\n+GRANT CONNECT ON DATABASE cwa TO cwa_user;\n+GRANT USAGE ON SCHEMA public TO cwa_user;\n+\n+CREATE ROLE cwa_flyway\n+ NOLOGIN\n+ NOSUPERUSER\n+ INHERIT\n+ NOCREATEDB\n+ NOCREATEROLE\n+ NOREPLICATION\n+ IN ROLE cwa_user;\n+\n+/* Flyway user needs to have full access to schema */\n+GRANT CREATE ON SCHEMA public TO cwa_flyway;\n+\n+CREATE ROLE cwa_submission\n+ NOLOGIN\n+ NOSUPERUSER\n+ INHERIT\n+ NOCREATEDB\n+ NOCREATEROLE\n+ NOREPLICATION\n+ IN ROLE cwa_user;\n+\n+CREATE ROLE cwa_distribution\n+ NOLOGIN\n+ NOSUPERUSER\n+ INHERIT\n+ NOCREATEDB\n+ NOCREATEROLE\n+ NOREPLICATION\n+ IN ROLE cwa_user;\n", "test_patch": "diff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyBuilderTest.java\n@@ -20,6 +20,8 @@\n \n package app.coronawarn.server.common.persistence.domain;\n \n+import static app.coronawarn.server.common.persistence.domain.validation.ValidSubmissionTimestampValidator.SECONDS_PER_HOUR;\n+import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.buildDiagnosisKeyForSubmissionTimestamp;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatCode;\n import static org.assertj.core.api.Assertions.catchThrowable;\n@@ -27,7 +29,8 @@\n import app.coronawarn.server.common.persistence.exception.InvalidDiagnosisKeyException;\n import app.coronawarn.server.common.protocols.external.exposurenotification.TemporaryExposureKey;\n import com.google.protobuf.ByteString;\n-import java.nio.charset.Charset;\n+import java.nio.charset.StandardCharsets;\n+import java.time.Duration;\n import java.time.Instant;\n import java.time.LocalDate;\n import java.time.ZoneOffset;\n@@ -37,7 +40,7 @@\n \n class DiagnosisKeyBuilderTest {\n \n- private final byte[] expKeyData = \"16-bytelongarray\".getBytes(Charset.defaultCharset());\n+ private final byte[] expKeyData = \"16-bytelongarray\".getBytes(StandardCharsets.US_ASCII);\n private final int expRollingStartIntervalNumber = 73800;\n private final int expTransmissionRiskLevel = 1;\n private final long expSubmissionTimestamp = 2L;\n@@ -179,16 +182,43 @@ void rollingPeriodDoesNotThrowForValid() {\n @ValueSource(strings = {\"17--bytelongarray\", \"\", \"1\"})\n void keyDataMustHaveValidLength(String invalidKeyString) {\n assertThat(\n- catchThrowable(() -> keyWithKeyData(invalidKeyString.getBytes(Charset.defaultCharset()))))\n+ catchThrowable(() -> keyWithKeyData(invalidKeyString.getBytes(StandardCharsets.US_ASCII))))\n .isInstanceOf(InvalidDiagnosisKeyException.class);\n }\n \n @Test\n void keyDataDoesNotThrowOnValid() {\n- assertThatCode(() -> keyWithKeyData(\"16-bytelongarray\".getBytes(Charset.defaultCharset())))\n+ assertThatCode(() -> keyWithKeyData(\"16-bytelongarray\".getBytes(StandardCharsets.US_ASCII)))\n .doesNotThrowAnyException();\n }\n \n+ @ParameterizedTest\n+ @ValueSource(longs = {-1L, Long.MAX_VALUE})\n+ void submissionTimestampMustBeValid(long submissionTimestamp) {\n+ assertThat(\n+ catchThrowable(() -> buildDiagnosisKeyForSubmissionTimestamp(submissionTimestamp)))\n+ .isInstanceOf(InvalidDiagnosisKeyException.class);\n+ }\n+\n+ @Test\n+ void submissionTimestampMustNotBeInTheFuture() {\n+ assertThat(catchThrowable(\n+ () -> buildDiagnosisKeyForSubmissionTimestamp(getCurrentHoursSinceEpoch() + 1)))\n+ .isInstanceOf(InvalidDiagnosisKeyException.class);\n+ assertThat(catchThrowable(() -> buildDiagnosisKeyForSubmissionTimestamp(\n+ Instant.now().getEpochSecond() /* accidentally forgot to divide by SECONDS_PER_HOUR */)))\n+ .isInstanceOf(InvalidDiagnosisKeyException.class);\n+ }\n+\n+ @Test\n+ void submissionTimestampDoesNotThrowOnValid() {\n+ assertThatCode(() -> buildDiagnosisKeyForSubmissionTimestamp(0L)).doesNotThrowAnyException();\n+ assertThatCode(() -> buildDiagnosisKeyForSubmissionTimestamp(getCurrentHoursSinceEpoch())).doesNotThrowAnyException();\n+ assertThatCode(\n+ () -> buildDiagnosisKeyForSubmissionTimestamp(Instant.now().minus(Duration.ofHours(2)).getEpochSecond() / SECONDS_PER_HOUR))\n+ .doesNotThrowAnyException();\n+ }\n+ \n private DiagnosisKey keyWithKeyData(byte[] expKeyData) {\n return DiagnosisKey.builder()\n .withKeyData(expKeyData)\n@@ -223,7 +253,7 @@ private void assertDiagnosisKeyEquals(DiagnosisKey actDiagnosisKey) {\n }\n \n private long getCurrentHoursSinceEpoch() {\n- return Instant.now().getEpochSecond() / 3600L;\n+ return Instant.now().getEpochSecond() / SECONDS_PER_HOUR;\n }\n \n private void assertDiagnosisKeyEquals(DiagnosisKey actDiagnosisKey, long expSubmissionTimestamp) {\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyServiceMockedRepositoryTest.java\n@@ -26,20 +26,20 @@\n \n import app.coronawarn.server.common.persistence.repository.DiagnosisKeyRepository;\n import app.coronawarn.server.common.persistence.service.DiagnosisKeyService;\n-import java.nio.charset.Charset;\n+import java.nio.charset.StandardCharsets;\n import java.util.ArrayList;\n import java.util.List;\n import org.junit.jupiter.api.Test;\n import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;\n+import org.springframework.boot.test.autoconfigure.data.jdbc.DataJdbcTest;\n import org.springframework.boot.test.mock.mockito.MockBean;\n import org.springframework.data.domain.Sort;\n import org.springframework.data.domain.Sort.Direction;\n \n-@DataJpaTest\n+@DataJdbcTest\n class DiagnosisKeyServiceMockedRepositoryTest {\n \n- static final byte[] expKeyData = \"16-bytelongarray\".getBytes(Charset.defaultCharset());\n+ static final byte[] expKeyData = \"16-bytelongarray\".getBytes(StandardCharsets.US_ASCII);\n static final int expRollingStartIntervalNumber = 73800;\n static final int expTransmissionRiskLevel = 1;\n \n@@ -89,7 +89,7 @@ private DiagnosisKey validKey(long expSubmissionTimestamp) {\n }\n \n private DiagnosisKey invalidKey(long expSubmissionTimestamp) {\n- byte[] expKeyData = \"17--bytelongarray\".getBytes(Charset.defaultCharset());\n+ byte[] expKeyData = \"17--bytelongarray\".getBytes(StandardCharsets.US_ASCII);\n return new DiagnosisKey(expKeyData, expRollingStartIntervalNumber,\n DiagnosisKey.EXPECTED_ROLLING_PERIOD, expTransmissionRiskLevel, expSubmissionTimestamp);\n }\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/domain/DiagnosisKeyTest.java\n@@ -25,7 +25,7 @@\n import static org.assertj.core.api.Assertions.assertThatCode;\n import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;\n \n-import java.nio.charset.Charset;\n+import java.nio.charset.StandardCharsets;\n import java.time.Instant;\n import java.time.LocalDateTime;\n import org.junit.jupiter.api.DisplayName;\n@@ -35,7 +35,7 @@\n \n class DiagnosisKeyTest {\n \n- final static byte[] expKeyData = \"testKey111111111\".getBytes(Charset.defaultCharset());\n+ final static byte[] expKeyData = \"testKey111111111\".getBytes(StandardCharsets.US_ASCII);\n final static int expRollingStartIntervalNumber = 1;\n final static int expRollingPeriod = 2;\n final static int expTransmissionRiskLevel = 3;\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTest.java\n@@ -21,6 +21,8 @@\n package app.coronawarn.server.common.persistence.service;\n \n import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.assertDiagnosisKeysEqual;\n+import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.buildDiagnosisKeyForDateTime;\n+import static app.coronawarn.server.common.persistence.service.DiagnosisKeyServiceTestHelper.buildDiagnosisKeyForSubmissionTimestamp;\n import static java.time.ZoneOffset.UTC;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatCode;\n@@ -33,7 +35,6 @@\n import java.util.ArrayList;\n import java.util.Collections;\n import java.util.List;\n-import java.util.Random;\n import org.assertj.core.util.Lists;\n import org.junit.jupiter.api.AfterEach;\n import org.junit.jupiter.api.DisplayName;\n@@ -41,9 +42,9 @@\n import org.junit.jupiter.params.ParameterizedTest;\n import org.junit.jupiter.params.provider.ValueSource;\n import org.springframework.beans.factory.annotation.Autowired;\n-import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;\n+import org.springframework.boot.test.autoconfigure.data.jdbc.DataJdbcTest;\n \n-@DataJpaTest\n+@DataJdbcTest\n class DiagnosisKeyServiceTest {\n \n @Autowired\n@@ -171,19 +172,4 @@ void shouldNotUpdateExistingKey() {\n assertThat(actKeys.size()).isEqualTo(1);\n assertThat(actKeys.iterator().next().getTransmissionRiskLevel()).isEqualTo(2);\n }\n-\n- public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n- byte[] randomBytes = new byte[16];\n- Random random = new Random(submissionTimeStamp);\n- random.nextBytes(randomBytes);\n- return DiagnosisKey.builder()\n- .withKeyData(randomBytes)\n- .withRollingStartIntervalNumber(600)\n- .withTransmissionRiskLevel(2)\n- .withSubmissionTimestamp(submissionTimeStamp).build();\n- }\n-\n- public static DiagnosisKey buildDiagnosisKeyForDateTime(OffsetDateTime dateTime) {\n- return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond() / 3600);\n- }\n }\ndiff --git a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java\n--- a/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java\n+++ b/common/persistence/src/test/java/app/coronawarn/server/common/persistence/service/DiagnosisKeyServiceTestHelper.java\n@@ -23,13 +23,15 @@\n import static org.assertj.core.api.Assertions.assertThat;\n \n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import java.time.OffsetDateTime;\n import java.util.List;\n+import java.util.Random;\n \n public class DiagnosisKeyServiceTestHelper {\n \n public static void assertDiagnosisKeysEqual(List expKeys,\n List actKeys) {\n- assertThat(actKeys).withFailMessage(\"Cardinality mismatch\").isNotNull().hasSize(expKeys.size());\n+ assertThat(actKeys).withFailMessage(\"Cardinality mismatch\").hasSameSizeAs(expKeys);\n \n for (int i = 0; i < expKeys.size(); i++) {\n var expKey = expKeys.get(i);\n@@ -48,4 +50,19 @@ public static void assertDiagnosisKeysEqual(List expKeys,\n .isEqualTo(expKey.getSubmissionTimestamp());\n }\n }\n+\n+ public static DiagnosisKey buildDiagnosisKeyForSubmissionTimestamp(long submissionTimeStamp) {\n+ byte[] randomBytes = new byte[16];\n+ Random random = new Random(submissionTimeStamp);\n+ random.nextBytes(randomBytes);\n+ return DiagnosisKey.builder()\n+ .withKeyData(randomBytes)\n+ .withRollingStartIntervalNumber(600)\n+ .withTransmissionRiskLevel(2)\n+ .withSubmissionTimestamp(submissionTimeStamp).build();\n+ }\n+\n+ public static DiagnosisKey buildDiagnosisKeyForDateTime(OffsetDateTime dateTime) {\n+ return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond() / 3600);\n+ }\n }\ndiff --git a/common/persistence/src/test/resources/application.yaml b/common/persistence/src/test/resources/application.yaml\n--- a/common/persistence/src/test/resources/application.yaml\n+++ b/common/persistence/src/test/resources/application.yaml\n@@ -1,20 +1,16 @@\n ---\n spring:\n- test:\n- database:\n- replace: none\n flyway:\n- enabled: false\n- jpa:\n- hibernate:\n- ddl-auto: create\n- properties:\n- hibernate:\n- show_sql: false\n+ enabled: true\n+ locations: classpath:/db/migration, classpath:/db/specific/{vendor}\n datasource:\n url: jdbc:h2:mem:test;MODE=PostgreSQL\n driverClassName: org.h2.Driver\n platform: h2\n+ test:\n+ database:\n+ # Use datasource as defined above.\n+ replace: none\n main:\n banner-mode: off\n logging:\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationMasterFileTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationMasterFileTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationMasterFileTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationMasterFileTest.java\n@@ -22,19 +22,27 @@\n \n import static org.assertj.core.api.Assertions.assertThat;\n \n+import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ApplicationConfigurationValidator;\n import app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationResult;\n import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = ApplicationConfigurationPublicationConfig.class)\n class ApplicationConfigurationMasterFileTest {\n \n private static final ValidationResult SUCCESS = new ValidationResult();\n \n- @Test\n- void testMasterFile() throws UnableToLoadFileException {\n- var config = ApplicationConfigurationProvider.readMasterFile();\n+ @Autowired\n+ private ApplicationConfiguration applicationConfiguration;\n \n- var validator = new ApplicationConfigurationValidator(config);\n+ @Test\n+ void testMasterFile() {\n+ var validator = new ApplicationConfigurationValidator(applicationConfiguration);\n ValidationResult result = validator.validate();\n \n assertThat(result).isEqualTo(SUCCESS);\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationProviderTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java\nsimilarity index 74%\nrename from services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationProviderTest.java\nrename to services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/ApplicationConfigurationProviderTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/YamlLoaderTest.java\n@@ -20,6 +20,7 @@\n \n package app.coronawarn.server.services.distribution.assembly.appconfig;\n \n+import static app.coronawarn.server.services.distribution.common.Helpers.loadApplicationConfiguration;\n import static org.assertj.core.api.Assertions.assertThat;\n import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n \n@@ -27,11 +28,11 @@\n import org.junit.jupiter.params.ParameterizedTest;\n import org.junit.jupiter.params.provider.ValueSource;\n \n-class ApplicationConfigurationProviderTest {\n+class YamlLoaderTest {\n \n @Test\n void okFile() throws UnableToLoadFileException {\n- var result = ApplicationConfigurationProvider.readFile(\"configtests/app-config_ok.yaml\");\n+ var result = loadApplicationConfiguration(\"configtests/app-config_ok.yaml\");\n assertThat(result).withFailMessage(\"File is null, indicating loading failed\").isNotNull();\n }\n \n@@ -39,11 +40,11 @@ void okFile() throws UnableToLoadFileException {\n @ValueSource(strings = {\n \"configtests/app-config_empty.yaml\",\n \"configtests/wrong_file.yaml\",\n- \"configtests/broken_syntax.yaml\",\n- \"file_does_not_exist_anywhere.yaml\"\n+ \"configtests/app-config_broken_syntax.yaml\",\n+ \"configtests/naming_mismatch.yaml\",\n+ \"configtests/file_does_not_exist_anywhere.yaml\"\n })\n void throwsLoadFailure(String fileName) {\n- assertThatExceptionOfType(UnableToLoadFileException.class)\n- .isThrownBy(() -> ApplicationConfigurationProvider.readFile(fileName));\n+ assertThatExceptionOfType(UnableToLoadFileException.class).isThrownBy(() -> loadApplicationConfiguration(fileName));\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/parsing/NoMessageBuilderOnClassExceptionTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/parsing/NoMessageBuilderOnClassExceptionTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/parsing/NoMessageBuilderOnClassExceptionTest.java\n@@ -0,0 +1,40 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.parsing;\n+\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.when;\n+\n+import org.junit.jupiter.api.Test;\n+import org.yaml.snakeyaml.nodes.Node;\n+\n+class NoMessageBuilderOnClassExceptionTest {\n+\n+ @Test\n+ void testCorrectMessage() {\n+ Node node = mock(Node.class);\n+ Class expType = String.class;\n+ when(node.getType()).thenReturn(expType);\n+ NoMessageBuilderOnClassException actException = new NoMessageBuilderOnClassException(node);\n+ assertThat(actException.getMessage()).isEqualTo(\"No Message.Builder on class: \" + expType.getSimpleName());\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/AppConfigurationDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/AppConfigurationDirectoryTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/structure/AppConfigurationDirectoryTest.java\n@@ -0,0 +1,105 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.structure;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.loadApplicationConfiguration;\n+import static java.io.File.separator;\n+import static java.lang.String.join;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.ApplicationConfigurationPublicationConfig;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.structure.directory.AppConfigurationDirectory;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.common.Helpers;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.io.File;\n+import java.io.IOException;\n+import java.util.Set;\n+import org.junit.Rule;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.rules.TemporaryFolder;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, ApplicationConfigurationPublicationConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class AppConfigurationDirectoryTest {\n+\n+ @Rule\n+ private TemporaryFolder outputFolder = new TemporaryFolder();\n+\n+ @Autowired\n+ private CryptoProvider cryptoProvider;\n+\n+ @Autowired\n+ private DistributionServiceConfig distributionServiceConfigSpy;\n+\n+ @Autowired\n+ private ApplicationConfiguration applicationConfiguration;\n+\n+ @Test\n+ void createsCorrectFiles() throws IOException {\n+ Set expFiles = Set.of(\n+ join(separator, \"configuration\", \"country\", \"index\"),\n+ join(separator, \"configuration\", \"country\", \"index.checksum\"),\n+ join(separator, \"configuration\", \"country\", \"DE\", \"app_config\"),\n+ join(separator, \"configuration\", \"country\", \"DE\", \"app_config.checksum\"));\n+\n+ assertThat(writeDirectoryAndGetFiles(applicationConfiguration)).isEqualTo(expFiles);\n+ }\n+\n+ @Test\n+ void doesNotWriteAppConfigIfValidationFails() throws IOException, UnableToLoadFileException {\n+ ApplicationConfiguration invalidConfiguration =\n+ loadApplicationConfiguration(\"configtests/app-config_mrs_negative.yaml\");\n+\n+ Set expFiles = Set.of(\n+ join(separator, \"configuration\", \"country\", \"index\"),\n+ join(separator, \"configuration\", \"country\", \"index.checksum\"));\n+\n+ assertThat(writeDirectoryAndGetFiles(invalidConfiguration)).isEqualTo(expFiles);\n+ }\n+\n+ private Set writeDirectoryAndGetFiles(ApplicationConfiguration applicationConfiguration) throws IOException {\n+ outputFolder.create();\n+ File outputFile = outputFolder.newFolder();\n+ Directory parentDirectory = new DirectoryOnDisk(outputFile);\n+ AppConfigurationDirectory configurationDirectory =\n+ new AppConfigurationDirectory(applicationConfiguration, cryptoProvider, distributionServiceConfigSpy);\n+ parentDirectory.addWritable(configurationDirectory);\n+\n+ configurationDirectory.prepare(new ImmutableStack<>());\n+ configurationDirectory.write();\n+ return Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ApplicationConfigurationValidatorTest.java\n@@ -24,10 +24,10 @@\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ParameterSpec.RISK_SCORE_MIN;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.common.Helpers.loadApplicationConfiguration;\n import static org.assertj.core.api.Assertions.assertThat;\n-import static org.assertj.core.api.Assertions.assertThatThrownBy;\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n \n-import app.coronawarn.server.services.distribution.assembly.appconfig.ApplicationConfigurationProvider;\n import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n import java.util.stream.Stream;\n import org.junit.jupiter.api.Test;\n@@ -38,8 +38,7 @@\n class ApplicationConfigurationValidatorTest {\n \n private static final ValidationResult SUCCESS = new ValidationResult();\n-\n- private static final TestWithExpectedResult.Builder testBuilder = new TestWithExpectedResult.Builder(\"configtests/\");\n+ private static final TestWithExpectedResult.Builder TEST_BUILDER = new TestWithExpectedResult.Builder(\"configtests/\");\n \n @ParameterizedTest\n @MethodSource(\"createOkTests\")\n@@ -55,22 +54,18 @@ void negative(TestWithExpectedResult test) throws UnableToLoadFileException {\n \n @Test\n void circular() {\n- assertThatThrownBy(() -> {\n- ApplicationConfigurationProvider.readFile(\"configtests/app-config_circular.yaml\");\n- }).isInstanceOf(UnableToLoadFileException.class);\n+ assertThatExceptionOfType(UnableToLoadFileException.class)\n+ .isThrownBy(() -> loadApplicationConfiguration(\"configtests/app-config_circular.yaml\"));\n }\n \n- private ValidationResult getResultForTest(TestWithExpectedResult test)\n- throws UnableToLoadFileException {\n- var config = ApplicationConfigurationProvider.readFile(test.path());\n+ private ValidationResult getResultForTest(TestWithExpectedResult test) throws UnableToLoadFileException {\n+ var config = loadApplicationConfiguration(test.path());\n var validator = new ApplicationConfigurationValidator(config);\n return validator.validate();\n }\n \n private static Stream createOkTests() {\n- return Stream.of(\n- AllOk()\n- ).map(Arguments::of);\n+ return Stream.of(AllOk()).map(Arguments::of);\n }\n \n private static Stream createNegativeTests() {\n@@ -81,16 +76,16 @@ private static Stream createNegativeTests() {\n }\n \n public static TestWithExpectedResult AllOk() {\n- return testBuilder.build(\"app-config_ok.yaml\");\n+ return TEST_BUILDER.build(\"app-config_ok.yaml\");\n }\n \n public static TestWithExpectedResult MinRiskThresholdOutOfBoundsNegative() {\n- return testBuilder.build(\"app-config_mrs_negative.yaml\")\n+ return TEST_BUILDER.build(\"app-config_mrs_negative.yaml\")\n .with(buildError(\"min-risk-score\", RISK_SCORE_MIN - 1, VALUE_OUT_OF_BOUNDS));\n }\n \n public static TestWithExpectedResult MinRiskThresholdOutOfBoundsPositive() {\n- return testBuilder.build(\"app-config_mrs_oob.yaml\")\n+ return TEST_BUILDER.build(\"app-config_mrs_oob.yaml\")\n .with(buildError(\"min-risk-score\", RISK_SCORE_MAX + 1, VALUE_OUT_OF_BOUNDS));\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ExposureConfigurationValidatorTest.java\n@@ -22,9 +22,7 @@\n \n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ExposureConfigurationValidator.CONFIG_PREFIX;\n import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.RiskScoreClassificationValidatorTest.buildError;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.MISSING_ENTRY;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.TOO_MANY_DECIMAL_PLACES;\n-import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.VALUE_OUT_OF_BOUNDS;\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.*;\n import static org.assertj.core.api.Assertions.assertThat;\n \n import app.coronawarn.server.common.protocols.internal.RiskLevel;\n@@ -69,8 +67,6 @@ private static Stream createOkTests() {\n private static Stream createFailedTests() {\n return Stream.of(\n ScoreTooHigh(),\n- // TODO cwa-server/#320 Validate that no attributes are missing in .yaml\n- // ScoreNegative(),\n WeightNegative(),\n WeightTooHigh()\n ).map(Arguments::of);\n@@ -103,12 +99,6 @@ public static TestWithExpectedResult WeightTooHigh() {\n .with(buildError(CONFIG_PREFIX + \"transmission\", 101d, VALUE_OUT_OF_BOUNDS));\n }\n \n- public static TestWithExpectedResult ScoreNegative() {\n- return new TestWithExpectedResult(\"score_negative.yaml\")\n- .with(buildError(CONFIG_PREFIX + \"transmission.appDefined1\", RiskLevel.UNRECOGNIZED, VALUE_OUT_OF_BOUNDS))\n- .with(buildError(CONFIG_PREFIX + \"transmission.appDefined3\", null, MISSING_ENTRY));\n- }\n-\n public static TestWithExpectedResult ScoreTooHigh() {\n return new TestWithExpectedResult(\"score_too_high.yaml\")\n .with(buildError(CONFIG_PREFIX + \"transmission.appDefined1\", RiskLevel.UNRECOGNIZED, VALUE_OUT_OF_BOUNDS))\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationResultTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationResultTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/appconfig/validation/ValidationResultTest.java\n@@ -0,0 +1,60 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.appconfig.validation;\n+\n+import static app.coronawarn.server.services.distribution.assembly.appconfig.validation.ValidationError.ErrorType.INVALID_URL;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+\n+class ValidationResultTest {\n+\n+ private static final ValidationError EXP_VALIDATION_ERROR = new ValidationError(\"expSrc\", \"expValue\", INVALID_URL);\n+ private ValidationResult emptyValidationResult;\n+\n+ @BeforeEach\n+ void setUpEmptyResult() {\n+ emptyValidationResult = new ValidationResult();\n+ }\n+\n+ @Test\n+ void hasErrorsReturnsFalseIfNoErrors() {\n+ assertThat(emptyValidationResult.hasErrors()).isFalse();\n+ }\n+\n+ @Test\n+ void hasErrorsReturnsTrueIfErrors() {\n+ emptyValidationResult.add(EXP_VALIDATION_ERROR);\n+ assertThat(emptyValidationResult.hasErrors()).isTrue();\n+ }\n+\n+ @Test\n+ void toStringReturnsCorrectErrorInformation() {\n+ emptyValidationResult.add(EXP_VALIDATION_ERROR);\n+ assertThat(emptyValidationResult).hasToString(\"[\" + EXP_VALIDATION_ERROR.toString() + \"]\");\n+ }\n+\n+ @Test\n+ void toStringReturnsCorrectErrorInformationIfEmpty() {\n+ assertThat(emptyValidationResult).hasToString(\"[]\");\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerKeyRetrievalTest.java\n@@ -144,18 +144,18 @@ void testGetsDiagnosisKeysForDate() {\n .flatMap(List::stream)\n .collect(Collectors.toList());\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 20, 0));\n- assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 1))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 1))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 2))).hasSize(5);\n- assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 3))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 3))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 4))).hasSize(6);\n- assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 5))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 5))).isEmpty();\n }\n \n @Test\n void testEmptyListWhenGettingDiagnosisKeysForDateBeforeEarliestDiagnosisKey() {\n List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5);\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 1))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForDate(LocalDate.of(1970, 1, 1))).isEmpty();\n }\n \n @Test\n@@ -167,17 +167,25 @@ void testGetsDiagnosisKeysForHour() {\n .flatMap(List::stream)\n .collect(Collectors.toList());\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 3, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 3, 0))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 4, 0))).hasSize(5);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 5, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 5, 0))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 6, 0))).hasSize(6);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 7, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 2, 7, 0))).isEmpty();\n }\n \n @Test\n void testEmptyListWhenGettingDiagnosisKeysForHourBeforeEarliestDiagnosisKey() {\n List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5);\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 1, 0, 0, 0))).isEmpty();\n+ }\n+\n+ @Test\n+ void testGetsCorrectDistributionDate(){\n+ LocalDateTime expected = LocalDateTime.of(1970, 1, 5, 0, 0);\n+ List diagnosisKeys = buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 2, 4, 0), 5);\n+ bundler.setDiagnosisKeys(diagnosisKeys, expected);\n+ assertThat(bundler.getDistributionTime()).isEqualTo(expected);\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/ProdDiagnosisKeyBundlerShiftingPolicyTest.java\n@@ -69,7 +69,7 @@ void testShiftsIfPackageSizeLessThanThreshold() {\n .concat(buildDiagnosisKeys(6, 50L, 4).stream(), buildDiagnosisKeys(6, 51L, 1).stream())\n .collect(Collectors.toList());\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(5);\n }\n \n@@ -81,9 +81,9 @@ void testShiftsSinceLastDistribution() {\n .collect(Collectors.toList());\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(5);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(6);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).isEmpty();\n }\n \n @Test\n@@ -92,7 +92,7 @@ void testShiftIncludesPreviouslyUndistributedKeys() {\n .concat(buildDiagnosisKeys(6, 50L, 1).stream(), buildDiagnosisKeys(6, 51L, 5).stream())\n .collect(Collectors.toList());\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(6);\n }\n \n@@ -105,12 +105,12 @@ void testShiftsSparseDistributions() {\n .flatMap(List::stream)\n .collect(Collectors.toList());\n bundler.setDiagnosisKeys(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 6, 0, 0))).hasSize(0);\n- assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 7, 0, 0))).hasSize(0);\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 2, 0, 0))).isEmpty();\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 3, 0, 0))).isEmpty();\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 4, 0, 0))).isEmpty();\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 5, 0, 0))).isEmpty();\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 6, 0, 0))).isEmpty();\n+ assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 7, 0, 0))).isEmpty();\n assertThat(bundler.getDiagnosisKeysForHour(LocalDateTime.of(1970, 1, 3, 8, 0, 0))).hasSize(5);\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDateDirectoryTest.java\n@@ -0,0 +1,209 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getExpectedDateAndHourFiles;\n+import static java.io.File.separator;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.common.Helpers;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.io.File;\n+import java.io.IOException;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Map;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n+import org.junit.Rule;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.rules.TemporaryFolder;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class DiagnosisKeysDateDirectoryTest {\n+\n+ @Rule\n+ private final TemporaryFolder outputFolder = new TemporaryFolder();\n+\n+ @Autowired\n+ CryptoProvider cryptoProvider;\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ private File outputFile;\n+\n+ @BeforeEach\n+ void setupAll() throws IOException {\n+ outputFolder.create();\n+ outputFile = outputFolder.newFolder();\n+ }\n+\n+ private void runDateDistribution(Collection diagnosisKeys, LocalDateTime distributionTime) {\n+ DiagnosisKeyBundler bundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ bundler\n+ .setDiagnosisKeys(diagnosisKeys, distributionTime);\n+ DiagnosisKeysDateDirectory dateDirectory = new DiagnosisKeysDateDirectory(bundler, cryptoProvider,\n+ distributionServiceConfig);\n+ Directory outputDirectory = new DirectoryOnDisk(outputFile);\n+ outputDirectory.addWritable(dateDirectory);\n+ dateDirectory.prepare(new ImmutableStack<>()\n+ .push(\"version-directory\")\n+ .push(\"country-directory\"));\n+ outputDirectory.write();\n+ }\n+\n+ @Test\n+ void testCreatesCorrectDirectoryStructureForMultipleDates() {\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 0, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-04\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-06\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeCurrentDateInDirectoryStructure() {\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-04\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-05\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeEmptyDatesInDirectoryStructure() {\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .filter(currentDate -> currentDate != 1)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-05\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeDatesWithTooFewKeysInDirectoryStructure() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 1, 0), 4),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 1, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"1\"),\n+ \"1970-01-05\", List.of(\"1\")), \"1970-01-06\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeDatesInTheFuture() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 4, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 5, 1, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 4, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"1\"),\n+ \"1970-01-04\", List.of(\"1\")), \"1970-01-04\");\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+\n+ @Test\n+ void testWhenDemoProfileIsActiveItDoesIncludeCurrentDateInDirectoryStructure() {\n+ distributionServiceConfig.setIncludeIncompleteDays(true);\n+ Collection diagnosisKeys = IntStream.range(0, 3)\n+ .mapToObj(currentDate -> IntStream.range(0, 5)\n+ .mapToObj(currentHour ->\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3 + currentDate, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList()))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runDateDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 12, 0));\n+ Set actualFiles = Helpers.getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ Set expectedDateAndHourFiles = getExpectedDateAndHourFiles(Map.of(\n+ \"1970-01-03\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-04\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\"),\n+ \"1970-01-05\", List.of(\"0\", \"1\", \"2\", \"3\", \"4\")), \"1970-01-05\");\n+ expectedDateAndHourFiles.addAll(Set.of(\n+ String.join(separator, \"date\", \"1970-01-05\", \"index\"),\n+ String.join(separator, \"date\", \"1970-01-05\", \"index.checksum\")));\n+ assertThat(actualFiles).isEqualTo(expectedDateAndHourFiles);\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysDirectoryTest.java\n@@ -21,6 +21,7 @@\n package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n \n import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getFilePaths;\n import static java.lang.String.join;\n import static org.assertj.core.api.Assertions.assertThat;\n \n@@ -37,10 +38,8 @@\n import java.io.File;\n import java.io.IOException;\n import java.time.LocalDateTime;\n-import java.util.Arrays;\n import java.util.HashSet;\n import java.util.List;\n-import java.util.Objects;\n import java.util.Set;\n import java.util.stream.Collectors;\n import java.util.stream.IntStream;\n@@ -108,7 +107,7 @@ void checkBuildsTheCorrectDirectoryStructureWhenNoKeys() {\n join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"index\")\n );\n \n- Set actualFiles = getActualFiles(outputFile);\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n \n assertThat(actualFiles).isEqualTo(amendWithChecksumFiles(expectedFiles));\n }\n@@ -163,7 +162,7 @@ void checkBuildsTheCorrectDirectoryStructure() {\n join(s, \"diagnosis-keys\", \"country\", \"DE\", \"date\", \"1970-01-04\", \"hour\", \"5\", \"index\")\n );\n \n- Set actualFiles = getActualFiles(outputFile);\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n \n assertThat(actualFiles).isEqualTo(amendWithChecksumFiles(expectedFiles));\n }\n@@ -178,24 +177,4 @@ private Set amendWithChecksumFiles(Set expectedFiles) {\n \n return allExpectedFiles;\n }\n-\n- private Set getActualFiles(java.io.File root) {\n- Set files = Arrays.stream(Objects.requireNonNull(root.listFiles()))\n- .filter(File::isFile)\n- .map(File::getAbsolutePath)\n- .map(path -> path.substring(outputFile.getAbsolutePath().length() + 1))\n- .collect(Collectors.toSet());\n-\n- Set directories = Arrays.stream(Objects.requireNonNull(root.listFiles()))\n- .filter(File::isDirectory)\n- .collect(Collectors.toSet());\n-\n- Set subFiles = directories.stream()\n- .map(this::getActualFiles)\n- .flatMap(Set::stream)\n- .collect(Collectors.toSet());\n-\n- files.addAll(subFiles);\n- return files;\n- }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/DiagnosisKeysHourDirectoryTest.java\n@@ -0,0 +1,156 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.directory;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeys;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getExpectedHourFiles;\n+import static app.coronawarn.server.services.distribution.common.Helpers.getFilePaths;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.services.distribution.assembly.component.CryptoProvider;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.DiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.diagnosiskeys.ProdDiagnosisKeyBundler;\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import java.io.File;\n+import java.io.IOException;\n+import java.time.LocalDate;\n+import java.time.LocalDateTime;\n+import java.util.Collection;\n+import java.util.List;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+import java.util.stream.IntStream;\n+import org.junit.Rule;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.rules.TemporaryFolder;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {CryptoProvider.class, DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+class DiagnosisKeysHourDirectoryTest {\n+\n+ @Rule\n+ private final TemporaryFolder outputFolder = new TemporaryFolder();\n+\n+ @Autowired\n+ CryptoProvider cryptoProvider;\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ private File outputFile;\n+\n+ @BeforeEach\n+ void setupAll() throws IOException {\n+ outputFolder.create();\n+ outputFile = outputFolder.newFolder();\n+ }\n+\n+ private void runHourDistribution(Collection diagnosisKeys, LocalDateTime distributionTime) {\n+ DiagnosisKeyBundler bundler = new ProdDiagnosisKeyBundler(distributionServiceConfig);\n+ bundler.setDiagnosisKeys(diagnosisKeys, distributionTime);\n+ DiagnosisKeysHourDirectory hourDirectory = new DiagnosisKeysHourDirectory(bundler, cryptoProvider,\n+ distributionServiceConfig);\n+ Directory outputDirectory = new DirectoryOnDisk(outputFile);\n+ outputDirectory.addWritable(hourDirectory);\n+ hourDirectory.prepare(new ImmutableStack<>()\n+ .push(\"version-directory\")\n+ .push(\"country-directory\")\n+ .push(LocalDate.of(1970, 1, 3)) // date-directory\n+ );\n+ outputDirectory.write();\n+ }\n+\n+ @Test\n+ void testCreatesCorrectStructureForMultipleHours() {\n+ Collection diagnosisKeys = IntStream.range(0, 5)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"1\", \"2\", \"3\", \"4\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeEmptyHours() {\n+ Collection diagnosisKeys = IntStream.range(0, 5)\n+ .filter(currentHour -> currentHour != 3)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 5, 0, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"1\", \"2\", \"4\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeCurrentHour() {\n+ Collection diagnosisKeys = IntStream.range(0, 5)\n+ .mapToObj(currentHour -> buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0).plusHours(currentHour), 5))\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 3, 4, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"1\", \"2\", \"3\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeHoursWithTooFewKeys() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 4),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 2, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 6, 12, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\", \"2\")));\n+ }\n+\n+ @Test\n+ void testDoesNotIncludeHoursInTheFuture() {\n+ Collection diagnosisKeys = List.of(\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 0, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 1, 0), 5),\n+ buildDiagnosisKeys(6, LocalDateTime.of(1970, 1, 3, 2, 0), 5))\n+ .stream()\n+ .flatMap(List::stream)\n+ .collect(Collectors.toList());\n+ runHourDistribution(diagnosisKeys, LocalDateTime.of(1970, 1, 3, 1, 0));\n+ Set actualFiles = getFilePaths(outputFile, outputFile.getAbsolutePath());\n+ assertThat(actualFiles).isEqualTo(getExpectedHourFiles(Set.of(\"0\")));\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/DateIndexingDecoratorTest.java\n@@ -80,9 +80,9 @@ void excludesEmptyDatesFromIndex() {\n \n Set index = decorator.getIndex(new ImmutableStack<>());\n \n- assertThat(index).contains(LocalDate.of(1970, 1, 3));\n- assertThat(index).doesNotContain(LocalDate.of(1970, 1, 4));\n- assertThat(index).contains(LocalDate.of(1970, 1, 5));\n+ assertThat(index).contains(LocalDate.of(1970, 1, 3))\n+ .doesNotContain(LocalDate.of(1970, 1, 4))\n+ .contains(LocalDate.of(1970, 1, 5));\n }\n \n @Test\n@@ -94,8 +94,8 @@ void excludesCurrentDateFromIndex() {\n \n Set index = decorator.getIndex(new ImmutableStack<>());\n \n- assertThat(index).contains(LocalDate.of(1970, 1, 4));\n- assertThat(index).doesNotContain(LocalDate.of(1970, 1, 5));\n+ assertThat(index).contains(LocalDate.of(1970, 1, 4))\n+ .doesNotContain(LocalDate.of(1970, 1, 5));\n }\n \n @Test\n@@ -125,7 +125,6 @@ void excludesDatesThatExceedTheMaximumNumberOfKeys() {\n private DateIndexingDecorator makeDecoratedDateDirectory(DiagnosisKeyBundler diagnosisKeyBundler) {\n return new DateIndexingDecorator(\n new DiagnosisKeysDateDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig),\n- distributionServiceConfig\n- );\n+ distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/directory/decorator/HourIndexingDecoratorTest.java\n@@ -93,14 +93,13 @@ void excludesEmptyHoursFromIndex() {\n \n Set index = decorator.getIndex(new ImmutableStack<>().push(LocalDate.of(1970, 1, 5)));\n \n- assertThat(index).contains(LocalDateTime.of(1970, 1, 5, 0, 0));\n- assertThat(index).doesNotContain(LocalDateTime.of(1970, 1, 5, 1, 0));\n+ assertThat(index).contains(LocalDateTime.of(1970, 1, 5, 0, 0))\n+ .doesNotContain(LocalDateTime.of(1970, 1, 5, 1, 0));\n }\n \n private HourIndexingDecorator makeDecoratedHourDirectory(DiagnosisKeyBundler diagnosisKeyBundler) {\n return new HourIndexingDecorator(\n new DiagnosisKeysHourDirectory(diagnosisKeyBundler, cryptoProvider, distributionServiceConfig),\n- distributionServiceConfig\n- );\n+ distributionServiceConfig);\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/file/TemporaryExposureKeyExportFileTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/file/TemporaryExposureKeyExportFileTest.java\nnew file mode 100644\n--- /dev/null\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/diagnosiskeys/structure/file/TemporaryExposureKeyExportFileTest.java\n@@ -0,0 +1,122 @@\n+/*-\n+ * ---license-start\n+ * Corona-Warn-App\n+ * ---\n+ * Copyright (C) 2020 SAP SE and all other contributors\n+ * ---\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ * ---license-end\n+ */\n+\n+package app.coronawarn.server.services.distribution.assembly.diagnosiskeys.structure.file;\n+\n+import static app.coronawarn.server.services.distribution.common.Helpers.buildDiagnosisKeyForSubmissionTimestamp;\n+import static org.assertj.core.api.Assertions.assertThat;\n+\n+import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n+import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n+import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n+import app.coronawarn.server.services.distribution.config.DistributionServiceConfig.Signature;\n+import java.io.File;\n+import java.io.IOException;\n+import java.nio.file.Files;\n+import java.util.Set;\n+import org.junit.Rule;\n+import org.junit.jupiter.api.BeforeEach;\n+import org.junit.jupiter.api.Test;\n+import org.junit.jupiter.api.extension.ExtendWith;\n+import org.junit.rules.TemporaryFolder;\n+import org.springframework.beans.factory.annotation.Autowired;\n+import org.springframework.boot.context.properties.EnableConfigurationProperties;\n+import org.springframework.boot.test.context.ConfigFileApplicationContextInitializer;\n+import org.springframework.test.annotation.DirtiesContext;\n+import org.springframework.test.annotation.DirtiesContext.ClassMode;\n+import org.springframework.test.context.ContextConfiguration;\n+import org.springframework.test.context.junit.jupiter.SpringExtension;\n+\n+\n+@EnableConfigurationProperties(value = DistributionServiceConfig.class)\n+@ExtendWith(SpringExtension.class)\n+@ContextConfiguration(classes = {DistributionServiceConfig.class},\n+ initializers = ConfigFileApplicationContextInitializer.class)\n+@DirtiesContext(classMode = ClassMode.AFTER_EACH_TEST_METHOD)\n+class TemporaryExposureKeyExportFileTest {\n+\n+ public static final String TEK_EXPORT_CHECKSUM_FILE_NAME = \"export.bin.checksum\";\n+\n+ @Rule\n+ TemporaryFolder outputFolder = new TemporaryFolder();\n+\n+ @Autowired\n+ DistributionServiceConfig distributionServiceConfig;\n+\n+ @BeforeEach\n+ void setup() throws IOException {\n+ outputFolder.create();\n+ }\n+\n+ @Test\n+ void testChecksumIsDeterministic() throws IOException {\n+ File outputFile1 = createFile();\n+ byte[] checksum1 = readChecksumFile(outputFile1);\n+\n+ File outputFile2 = createFile();\n+ byte[] checksum2 = readChecksumFile(outputFile2);\n+\n+ assertThat(checksum1).isEqualTo(checksum2);\n+ }\n+\n+ @Test\n+ void testChecksumChangesWhenPrivateKeyIsModified() throws IOException {\n+ File outputFile1 = createFile();\n+ byte[] checksum1 = readChecksumFile(outputFile1);\n+\n+ modifySignaturePrivateKeyVersion();\n+\n+ File outputFile2 = createFile();\n+ byte[] checksum2 = readChecksumFile(outputFile2);\n+\n+ assertThat(checksum1).isNotEqualTo(checksum2);\n+ }\n+\n+ private TemporaryExposureKeyExportFile createTemporaryExposureKeyExportFile() {\n+ return TemporaryExposureKeyExportFile.fromDiagnosisKeys(\n+ Set.of(\n+ buildDiagnosisKeyForSubmissionTimestamp(1)\n+ ),\n+ \"DE\", 0, 10, distributionServiceConfig\n+ );\n+ }\n+\n+ private File createFile() throws IOException {\n+ TemporaryExposureKeyExportFile tekExportFile = createTemporaryExposureKeyExportFile();\n+ File outputFile = outputFolder.newFolder();\n+ Directory directory = new DirectoryOnDisk(outputFile);\n+ directory.addWritable(tekExportFile);\n+ directory.prepare(new ImmutableStack<>());\n+ directory.write();\n+ return outputFile;\n+ }\n+\n+ private byte[] readChecksumFile(File outputFile1) throws IOException {\n+ return Files.readAllBytes(outputFile1.toPath().resolve(TEK_EXPORT_CHECKSUM_FILE_NAME));\n+ }\n+\n+ private void modifySignaturePrivateKeyVersion() {\n+ Signature signature = distributionServiceConfig.getSignature();\n+ String verificationKeyVersion = signature.getVerificationKeyVersion();\n+ signature.setVerificationKeyVersion(verificationKeyVersion + \"x\");\n+ }\n+}\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/IndexDirectoryTest.java\n@@ -32,6 +32,7 @@\n import java.util.Arrays;\n import java.util.List;\n import java.util.Objects;\n+import java.util.Optional;\n import java.util.Set;\n import java.util.stream.Collectors;\n import java.util.stream.Stream;\n@@ -44,7 +45,7 @@ class IndexDirectoryTest {\n \n private static final String name = \"Numbers\";\n private static final Set index = Set.of(0, 1, 2);\n- private static final IndexFunction indexFunction = __ -> index;\n+ private static final IndexFunction indexFunction = ignoredValue -> index;\n private static final Formatter indexFormatter = Integer::valueOf;\n private IndexDirectory indexDirectory;\n private Directory outputDirectory;\n@@ -76,10 +77,10 @@ void checkGetIndexFormatter() {\n @Test\n void checkAddFileToAll() {\n List expectedFileList = new ArrayList<>();\n- indexDirectory.addWritableToAll(__ -> {\n+ indexDirectory.addWritableToAll(ignoredValue -> {\n FileOnDisk newFile = new FileOnDisk(\"index\", new byte[0]);\n expectedFileList.add(newFile);\n- return newFile;\n+ return Optional.of(newFile);\n });\n \n prepareAndWrite(outputDirectory);\n@@ -101,10 +102,10 @@ void checkAddFileToAll() {\n @Test\n void checkAddDirectoryToAll() {\n List expectedFileList = new ArrayList<>();\n- indexDirectory.addWritableToAll(__ -> {\n+ indexDirectory.addWritableToAll(ignoredValue -> {\n DirectoryOnDisk newDirectory = new DirectoryOnDisk(\"something\");\n expectedFileList.add(newDirectory);\n- return newDirectory;\n+ return Optional.of(newDirectory);\n });\n \n prepareAndWrite(outputDirectory);\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorators/DirectoryDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/DirectoryDecoratorTest.java\nsimilarity index 94%\nrename from services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorators/DirectoryDecoratorTest.java\nrename to services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/DirectoryDecoratorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorators/DirectoryDecoratorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/DirectoryDecoratorTest.java\n@@ -18,7 +18,7 @@\n * ---license-end\n */\n \n-package app.coronawarn.server.services.distribution.assembly.structure.directory.decorators;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory.decorator;\n \n import static org.mockito.Mockito.mock;\n import static org.mockito.Mockito.verify;\n@@ -26,7 +26,6 @@\n import app.coronawarn.server.services.distribution.assembly.structure.WritableOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.DirectoryDecorator;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n import org.junit.jupiter.api.Test;\n \ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorators/indexing/IndexingDecoratorTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorTest.java\nsimilarity index 90%\nrename from services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorators/indexing/IndexingDecoratorTest.java\nrename to services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorators/indexing/IndexingDecoratorTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/directory/decorator/indexing/IndexingDecoratorTest.java\n@@ -18,7 +18,7 @@\n * ---license-end\n */\n \n-package app.coronawarn.server.services.distribution.assembly.structure.directory.decorators.indexing;\n+package app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing;\n \n import static app.coronawarn.server.services.distribution.common.Helpers.prepareAndWrite;\n import static org.assertj.core.api.Assertions.assertThat;\n@@ -28,7 +28,6 @@\n import app.coronawarn.server.services.distribution.assembly.structure.directory.DirectoryOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectory;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.IndexDirectoryOnDisk;\n-import app.coronawarn.server.services.distribution.assembly.structure.directory.decorator.indexing.IndexingDecoratorOnDisk;\n import app.coronawarn.server.services.distribution.assembly.structure.file.FileOnDiskWithChecksum;\n import java.io.File;\n import java.io.FileReader;\n@@ -50,7 +49,7 @@ class IndexingDecoratorTest {\n @Rule\n private TemporaryFolder outputFolder = new TemporaryFolder();\n \n- private static final Set index = Set.of(1, 2, 3);\n+ private static final Set INDEX = Set.of(1, 2, 3);\n private java.io.File outputFile;\n private Directory parent;\n private IndexDirectory decoratee;\n@@ -61,7 +60,7 @@ public void setup() throws IOException {\n outputFolder.create();\n outputFile = outputFolder.newFolder();\n parent = new DirectoryOnDisk(outputFile);\n- decoratee = new IndexDirectoryOnDisk<>(\"foo\", __ -> index, __ -> __);\n+ decoratee = new IndexDirectoryOnDisk<>(\"foo\", ignoredValue -> INDEX, value -> value);\n decorator = new IndexingDecoratorOnDisk<>(decoratee, \"foo\");\n \n parent.addWritable(decorator);\n@@ -73,6 +72,7 @@ public void setup() throws IOException {\n void checkWritesIndexFile() throws IOException, ParseException {\n java.io.File actualIndexDirectoryFile = Objects.requireNonNull(outputFile.listFiles())[0];\n java.io.File actualPhysicalFile = Stream.of(actualIndexDirectoryFile)\n+ .filter(File::isDirectory)\n .map(File::listFiles)\n .flatMap(Arrays::stream)\n .filter(File::isFile)\n@@ -85,10 +85,9 @@ void checkWritesIndexFile() throws IOException, ParseException {\n Object obj = jsonParser.parse(reader);\n JSONArray indexJson = (JSONArray) obj;\n \n- index.forEach(expected ->\n+ INDEX.forEach(expected ->\n assertThat(indexJson.contains(expected.longValue()))\n .withFailMessage(expected.toString())\n- .isTrue()\n- );\n+ .isTrue());\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/assembly/structure/util/ImmutableStackTest.java\n@@ -61,7 +61,7 @@ void checksEmptyStackHasNoting() {\n \n @Test\n void throwsExceptionWhenPopsFromEmptyStack() {\n- assertThatExceptionOfType(NoSuchElementException.class)\n- .isThrownBy(() -> new ImmutableStack<>().pop());\n+ ImmutableStack stack = new ImmutableStack<>();\n+ assertThatExceptionOfType(NoSuchElementException.class).isThrownBy(() -> stack.pop());\n }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/common/Helpers.java\n@@ -20,12 +20,24 @@\n \n package app.coronawarn.server.services.distribution.common;\n \n+import static app.coronawarn.server.services.distribution.assembly.appconfig.YamlLoader.loadYamlIntoProtobufBuilder;\n+import static java.io.File.separator;\n+\n import app.coronawarn.server.common.persistence.domain.DiagnosisKey;\n+import app.coronawarn.server.common.protocols.internal.ApplicationConfiguration;\n+import app.coronawarn.server.services.distribution.assembly.appconfig.UnableToLoadFileException;\n import app.coronawarn.server.services.distribution.assembly.structure.directory.Directory;\n import app.coronawarn.server.services.distribution.assembly.structure.util.ImmutableStack;\n+import java.io.File;\n import java.time.LocalDateTime;\n import java.time.ZoneOffset;\n+import java.util.Arrays;\n+import java.util.Collection;\n+import java.util.HashSet;\n import java.util.List;\n+import java.util.Map;\n+import java.util.Objects;\n+import java.util.Set;\n import java.util.stream.Collectors;\n import java.util.stream.IntStream;\n \n@@ -48,18 +60,73 @@ public static DiagnosisKey buildDiagnosisKeyForDateTime(LocalDateTime dateTime)\n return buildDiagnosisKeyForSubmissionTimestamp(dateTime.toEpochSecond(ZoneOffset.UTC) / 3600);\n }\n \n- public static List buildDiagnosisKeys(int startIntervalNumber, LocalDateTime submissionTimestamp, int number) {\n+ public static List buildDiagnosisKeys(\n+ int startIntervalNumber, LocalDateTime submissionTimestamp, int number) {\n long timestamp = submissionTimestamp.toEpochSecond(ZoneOffset.UTC) / 3600;\n return buildDiagnosisKeys(startIntervalNumber, timestamp, number);\n }\n \n public static List buildDiagnosisKeys(int startIntervalNumber, long submissionTimestamp, int number) {\n return IntStream.range(0, number)\n- .mapToObj(__ -> DiagnosisKey.builder()\n+ .mapToObj(ignoredValue -> DiagnosisKey.builder()\n .withKeyData(new byte[16])\n .withRollingStartIntervalNumber(startIntervalNumber)\n .withTransmissionRiskLevel(2)\n .withSubmissionTimestamp(submissionTimestamp).build())\n .collect(Collectors.toList());\n }\n+\n+ public static Set getFilePaths(java.io.File root, String basePath) {\n+ Set files = Arrays.stream(Objects.requireNonNull(root.listFiles()))\n+ .filter(File::isFile)\n+ .map(File::getAbsolutePath)\n+ .map(path -> path.substring(basePath.length() + 1))\n+ .collect(Collectors.toSet());\n+\n+ Set directories = Arrays.stream(Objects.requireNonNull(root.listFiles()))\n+ .filter(File::isDirectory)\n+ .collect(Collectors.toSet());\n+\n+ Set subFiles = directories.stream()\n+ .map(subDirectory -> getFilePaths(subDirectory, basePath))\n+ .flatMap(Set::stream)\n+ .collect(Collectors.toSet());\n+\n+ files.addAll(subFiles);\n+ return files;\n+ }\n+\n+ public static ApplicationConfiguration loadApplicationConfiguration(String path) throws UnableToLoadFileException {\n+ return loadYamlIntoProtobufBuilder(path, ApplicationConfiguration.Builder.class).build();\n+ }\n+\n+ public static Set getExpectedHourFiles(Collection hours) {\n+ return hours.stream()\n+ .map(hour -> Set.of(\n+ String.join(separator, \"hour\", hour, \"index\"),\n+ String.join(separator, \"hour\", hour, \"index.checksum\")))\n+ .flatMap(Set::stream)\n+ .collect(Collectors.toSet());\n+ }\n+\n+ public static Set getExpectedDateAndHourFiles(Map> datesAndHours, String currentDate) {\n+ Set expectedFiles = new HashSet<>();\n+\n+ datesAndHours.forEach((date, hours) -> {\n+ if (!date.equals(currentDate)) {\n+ expectedFiles.add(String.join(separator, \"date\", date, \"index\"));\n+ expectedFiles.add(String.join(separator, \"date\", date, \"index.checksum\"));\n+ }\n+\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", \"index\"));\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", \"index.checksum\"));\n+\n+ hours.forEach(hour -> {\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", hour, \"index\"));\n+ expectedFiles.add(String.join(separator, \"date\", date, \"hour\", hour, \"index.checksum\"));\n+ });\n+ });\n+\n+ return expectedFiles;\n+ }\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessIT.java\nsimilarity index 88%\nrename from services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\nrename to services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessIT.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessIT.java\n@@ -25,11 +25,13 @@\n import static org.mockito.Mockito.when;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n-import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClientConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.ObjectStorePublishingConfig;\n+import app.coronawarn.server.services.distribution.objectstore.client.S3Object;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalGenericFile;\n import java.io.IOException;\n import java.nio.file.Path;\n+import java.util.List;\n import java.util.UUID;\n import org.junit.jupiter.api.AfterEach;\n import org.junit.jupiter.api.BeforeEach;\n@@ -43,15 +45,13 @@\n import org.springframework.test.context.junit.jupiter.SpringExtension;\n \n @ExtendWith(SpringExtension.class)\n-@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStoreClientConfig.class})\n+@SpringBootTest(classes = {ObjectStoreAccess.class, ObjectStorePublishingConfig.class})\n @EnableConfigurationProperties(value = DistributionServiceConfig.class)\n @Tag(\"s3-integration\")\n-class ObjectStoreAccessTest {\n+class ObjectStoreAccessIT {\n \n private static final String testRunId = \"testing/cwa/\" + UUID.randomUUID().toString() + \"/\";\n-\n private static final String rootTestFolder = \"objectstore/\";\n-\n private static final String textFile = rootTestFolder + \"store-test-file\";\n \n @Autowired\n@@ -93,15 +93,15 @@ void pushTestFileAndDelete() throws IOException {\n when(localFileSpy.getS3Key()).thenReturn(testRunId + localFile.getS3Key());\n \n objectStoreAccess.putObject(localFileSpy);\n- var files = objectStoreAccess.getObjectsWithPrefix(testRunId);\n- assertThat(files.size()).isEqualTo(1);\n+ List files = objectStoreAccess.getObjectsWithPrefix(testRunId);\n+ assertThat(files).hasSize(1);\n \n assertThat(files.get(0).getObjectName()).isEqualTo(testFileTargetKey);\n \n objectStoreAccess.deleteObjectsWithPrefix(testRunId);\n \n- var filesAfterDeletion = objectStoreAccess.getObjectsWithPrefix(testRunId);\n- assertThat(filesAfterDeletion.size()).isEqualTo(0);\n+ List filesAfterDeletion = objectStoreAccess.getObjectsWithPrefix(testRunId);\n+ assertThat(filesAfterDeletion).isEmpty();\n }\n \n private Path getExampleFile() throws IOException {\n@@ -111,5 +111,4 @@ private Path getExampleFile() throws IOException {\n private Path getRootTestFolder() throws IOException {\n return resourceLoader.getResource(rootTestFolder).getFile().toPath();\n }\n-\n }\ndiff --git a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java\n--- a/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java\n+++ b/services/distribution/src/test/java/app/coronawarn/server/services/distribution/objectstore/ObjectStoreAccessUnitTest.java\n@@ -21,21 +21,25 @@\n package app.coronawarn.server.services.distribution.objectstore;\n \n import static java.util.Map.entry;\n+import static org.assertj.core.api.Assertions.assertThat;\n+import static org.assertj.core.api.Assertions.assertThatExceptionOfType;\n import static org.mockito.ArgumentMatchers.eq;\n import static org.mockito.Mockito.any;\n import static org.mockito.Mockito.atLeastOnce;\n import static org.mockito.Mockito.mock;\n+import static org.mockito.Mockito.times;\n import static org.mockito.Mockito.verify;\n import static org.mockito.Mockito.when;\n \n import app.coronawarn.server.services.distribution.config.DistributionServiceConfig;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClient;\n import app.coronawarn.server.services.distribution.objectstore.client.ObjectStoreClient.HeaderKey;\n+import app.coronawarn.server.services.distribution.objectstore.client.S3Object;\n import app.coronawarn.server.services.distribution.objectstore.publish.LocalFile;\n import java.io.File;\n import java.nio.file.Path;\n+import java.util.List;\n import java.util.Map;\n-import org.assertj.core.api.Assertions;\n import org.junit.jupiter.api.BeforeEach;\n import org.junit.jupiter.api.Test;\n import org.junit.jupiter.api.extension.ExtendWith;\n@@ -87,6 +91,14 @@ private LocalFile setUpLocalFileMock() {\n return testLocalFile;\n }\n \n+ @Test\n+ void illegalArgumentExceptionIfBucketDoesNotExist() {\n+ when(objectStoreClient.bucketExists(any())).thenReturn(false);\n+\n+ assertThatExceptionOfType(IllegalArgumentException.class)\n+ .isThrownBy(() -> new ObjectStoreAccess(distributionServiceConfig, objectStoreClient));\n+ }\n+\n @Test\n void testPutObjectSetsDefaultCacheControlHeader() {\n ArgumentCaptor