diff options
author | 2021-09-02 12:22:09 +0200 | |
---|---|---|
committer | 2021-09-02 12:22:09 +0200 | |
commit | cc7a35ee9299750667a5e53542c285ca05634706 (patch) | |
tree | 4e4405ed4ef7dbb264b7d175a79ea16d1f1c8f29 /internal/validate/token_test.go | |
parent | client_test (diff) | |
download | gotosocial-cc7a35ee9299750667a5e53542c285ca05634706.tar.xz |
token tests
Diffstat (limited to 'internal/validate/token_test.go')
-rw-r--r-- | internal/validate/token_test.go | 99 |
1 files changed, 99 insertions, 0 deletions
diff --git a/internal/validate/token_test.go b/internal/validate/token_test.go new file mode 100644 index 000000000..bf12328a2 --- /dev/null +++ b/internal/validate/token_test.go @@ -0,0 +1,99 @@ +/* + GoToSocial + Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU Affero General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Affero General Public License for more details. + + You should have received a copy of the GNU Affero General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +package validate_test + +import ( + "testing" + "time" + + "github.com/stretchr/testify/suite" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" + "github.com/superseriousbusiness/gotosocial/internal/validate" +) + +func happyToken() *gtsmodel.Token { + return >smodel.Token{ + ID: "01FE91RJR88PSEEE30EV35QR8N", + CreatedAt: time.Now(), + UpdatedAt: time.Now(), + ClientID: "01FEEDMF6C0QD589MRK7919Z0R", + UserID: "01FEK0BFJKYXB4Y51RBQ7P5P79", + RedirectURI: "oauth2redirect://com.keylesspalace.tusky/", + Scope: "read write follow", + } +} + +type TokenValidateTestSuite struct { + suite.Suite +} + +func (suite *TokenValidateTestSuite) TestValidateTokenHappyPath() { + // no problem here + a := happyToken() + err := validate.Struct(*a) + suite.NoError(err) +} + +func (suite *TokenValidateTestSuite) TestValidateTokenBadID() { + a := happyToken() + + a.ID = "" + err := validate.Struct(*a) + suite.EqualError(err, "Key: 'Token.ID' Error:Field validation for 'ID' failed on the 'required' tag") + + a.ID = "01FE96W293ZPRG9FQQP48HK8N001FE96W32AT24VYBGM12WN3GKB" + err = validate.Struct(*a) + suite.EqualError(err, "Key: 'Token.ID' Error:Field validation for 'ID' failed on the 'ulid' tag") +} + +func (suite *TokenValidateTestSuite) TestValidateTokenNoCreatedAt() { + a := happyToken() + + a.CreatedAt = time.Time{} + err := validate.Struct(*a) + suite.NoError(err) +} + +func (suite *TokenValidateTestSuite) TestValidateTokenRedirectURI() { + a := happyToken() + + a.RedirectURI = "invalid-uri" + err := validate.Struct(*a) + suite.EqualError(err, "Key: 'Token.RedirectURI' Error:Field validation for 'RedirectURI' failed on the 'uri' tag") + + a.RedirectURI = "" + err = validate.Struct(*a) + suite.EqualError(err, "Key: 'Token.RedirectURI' Error:Field validation for 'RedirectURI' failed on the 'required' tag") + + a.RedirectURI = "urn:ietf:wg:oauth:2.0:oob" + err = validate.Struct(*a) + suite.NoError(err) +} + +func (suite *TokenValidateTestSuite) TestValidateTokenScope() { + a := happyToken() + + a.Scope = "" + err := validate.Struct(*a) + suite.NoError(err) +} + +func TestTokenValidateTestSuite(t *testing.T) { + suite.Run(t, new(TokenValidateTestSuite)) +} |