Phase 0 — mechanical rename ZB.MOM.WW.LmxOpcUa.* → ZB.MOM.WW.OtOpcUa.*
Renames all 11 projects (5 src + 6 tests), the .slnx solution file, all source-file namespaces, all axaml namespace references, and all v1 documentation references in CLAUDE.md and docs/*.md (excluding docs/v2/ which is already in OtOpcUa form). Also updates the TopShelf service registration name from "LmxOpcUa" to "OtOpcUa" per Phase 0 Task 0.6.
Preserves runtime identifiers per Phase 0 Out-of-Scope rules to avoid breaking v1/v2 client trust during coexistence: OPC UA `ApplicationUri` defaults (`urn:{GalaxyName}:LmxOpcUa`), server `EndpointPath` (`/LmxOpcUa`), `ServerName` default (feeds cert subject CN), `MxAccessConfiguration.ClientName` default (defensive — stays "LmxOpcUa" for MxAccess audit-trail consistency), client OPC UA identifiers (`ApplicationName = "LmxOpcUaClient"`, `ApplicationUri = "urn:localhost:LmxOpcUaClient"`, cert directory `%LocalAppData%\LmxOpcUaClient\pki\`), and the `LmxOpcUaServer` class name (class rename out of Phase 0 scope per Task 0.5 sed pattern; happens in Phase 1 alongside `LmxNodeManager → GenericDriverNodeManager` Core extraction). 23 LmxOpcUa references retained, all enumerated and justified in `docs/v2/implementation/exit-gate-phase-0.md`.
Build clean: 0 errors, 30 warnings (lower than baseline 167). Tests at strict improvement over baseline: 821 passing / 1 failing vs baseline 820 / 2 (one flaky pre-existing failure passed this run; the other still fails — both pre-existing and unrelated to the rename). `Client.UI.Tests`, `Historian.Aveva.Tests`, `Client.Shared.Tests`, `IntegrationTests` all match baseline exactly. Exit gate compliance results recorded in `docs/v2/implementation/exit-gate-phase-0.md` with all 7 checks PASS or DEFERRED-to-PR-review (#7 service install verification needs Windows service permissions on the reviewer's box).
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -0,0 +1,52 @@
|
||||
using Shouldly;
|
||||
using Xunit;
|
||||
using ZB.MOM.WW.OtOpcUa.Host.Configuration;
|
||||
|
||||
namespace ZB.MOM.WW.OtOpcUa.Tests.Security
|
||||
{
|
||||
public class SecurityProfileConfigurationTests
|
||||
{
|
||||
[Fact]
|
||||
public void DefaultConfig_HasNoneProfile()
|
||||
{
|
||||
var config = new SecurityProfileConfiguration();
|
||||
config.Profiles.ShouldContain("None");
|
||||
config.Profiles.Count.ShouldBe(1);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void DefaultConfig_AutoAcceptTrue()
|
||||
{
|
||||
var config = new SecurityProfileConfiguration();
|
||||
config.AutoAcceptClientCertificates.ShouldBe(true);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void DefaultConfig_RejectSha1True()
|
||||
{
|
||||
var config = new SecurityProfileConfiguration();
|
||||
config.RejectSHA1Certificates.ShouldBe(true);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void DefaultConfig_MinKeySize2048()
|
||||
{
|
||||
var config = new SecurityProfileConfiguration();
|
||||
config.MinimumCertificateKeySize.ShouldBe(2048);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void DefaultConfig_PkiRootPathNull()
|
||||
{
|
||||
var config = new SecurityProfileConfiguration();
|
||||
config.PkiRootPath.ShouldBeNull();
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void DefaultConfig_CertificateSubjectNull()
|
||||
{
|
||||
var config = new SecurityProfileConfiguration();
|
||||
config.CertificateSubject.ShouldBeNull();
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,140 @@
|
||||
using System.Collections.Generic;
|
||||
using Opc.Ua;
|
||||
using Shouldly;
|
||||
using Xunit;
|
||||
using ZB.MOM.WW.OtOpcUa.Host.OpcUa;
|
||||
|
||||
namespace ZB.MOM.WW.OtOpcUa.Tests.Security
|
||||
{
|
||||
public class SecurityProfileResolverTests
|
||||
{
|
||||
[Fact]
|
||||
public void Resolve_DefaultNone_ReturnsSingleNonePolicy()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string> { "None" });
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.None);
|
||||
result[0].SecurityPolicyUri.ShouldBe(SecurityPolicies.None);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_SignProfile_ReturnsBasic256Sha256Sign()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string> { "Basic256Sha256-Sign" });
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.Sign);
|
||||
result[0].SecurityPolicyUri.ShouldBe(SecurityPolicies.Basic256Sha256);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_SignAndEncryptProfile_ReturnsBasic256Sha256SignAndEncrypt()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string> { "Basic256Sha256-SignAndEncrypt" });
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.SignAndEncrypt);
|
||||
result[0].SecurityPolicyUri.ShouldBe(SecurityPolicies.Basic256Sha256);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_MultipleProfiles_ReturnsExpectedPolicies()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string>
|
||||
{
|
||||
"None", "Basic256Sha256-Sign", "Basic256Sha256-SignAndEncrypt"
|
||||
});
|
||||
|
||||
result.Count.ShouldBe(3);
|
||||
result.ShouldContain(p => p.SecurityMode == MessageSecurityMode.None);
|
||||
result.ShouldContain(p => p.SecurityMode == MessageSecurityMode.Sign);
|
||||
result.ShouldContain(p => p.SecurityMode == MessageSecurityMode.SignAndEncrypt);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_DuplicateProfiles_Deduplicated()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string>
|
||||
{
|
||||
"None", "None", "Basic256Sha256-Sign", "Basic256Sha256-Sign"
|
||||
});
|
||||
|
||||
result.Count.ShouldBe(2);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_UnknownProfile_SkippedWithWarning()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string>
|
||||
{
|
||||
"None", "SomeUnknownProfile"
|
||||
});
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.None);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_EmptyList_FallsBackToNone()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string>());
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.None);
|
||||
result[0].SecurityPolicyUri.ShouldBe(SecurityPolicies.None);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_NullList_FallsBackToNone()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(null!);
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.None);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_AllUnknownProfiles_FallsBackToNone()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string> { "Bogus", "AlsoBogus" });
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.None);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_CaseInsensitive()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string> { "none", "BASIC256SHA256-SIGN" });
|
||||
|
||||
result.Count.ShouldBe(2);
|
||||
result.ShouldContain(p => p.SecurityMode == MessageSecurityMode.None);
|
||||
result.ShouldContain(p => p.SecurityMode == MessageSecurityMode.Sign);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void Resolve_WhitespaceEntries_Skipped()
|
||||
{
|
||||
var result = SecurityProfileResolver.Resolve(new List<string> { "", " ", "None" });
|
||||
|
||||
result.Count.ShouldBe(1);
|
||||
result[0].SecurityMode.ShouldBe(MessageSecurityMode.None);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void ValidProfileNames_ContainsExpectedEntries()
|
||||
{
|
||||
var names = SecurityProfileResolver.ValidProfileNames;
|
||||
|
||||
names.ShouldContain("None");
|
||||
names.ShouldContain("Basic256Sha256-Sign");
|
||||
names.ShouldContain("Basic256Sha256-SignAndEncrypt");
|
||||
names.ShouldContain("Aes128_Sha256_RsaOaep-Sign");
|
||||
names.ShouldContain("Aes128_Sha256_RsaOaep-SignAndEncrypt");
|
||||
names.ShouldContain("Aes256_Sha256_RsaPss-Sign");
|
||||
names.ShouldContain("Aes256_Sha256_RsaPss-SignAndEncrypt");
|
||||
names.Count.ShouldBe(7);
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user