mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-24 13:48:49 +08:00

* NOISSUE - Rename pkg aliases uuidProvider into uuid and fix authn typo Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Add missing error checks Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Use global uuidProvider Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Use expTime globally Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Fix user uuid provider Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Fix review Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Use idProvider name Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Use idProvider instead of uuidProvider Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Use idProvider instead of uuidProvider Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com>
159 lines
3.4 KiB
Go
159 lines
3.4 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package postgres_test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/mainflux/mainflux/auth"
|
|
"github.com/mainflux/mainflux/auth/postgres"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
"github.com/mainflux/mainflux/pkg/uuid"
|
|
"github.com/opentracing/opentracing-go"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
const email = "user-save@example.com"
|
|
|
|
var (
|
|
expTime = time.Now().Add(5 * time.Minute)
|
|
idProvider = uuid.New()
|
|
)
|
|
|
|
func TestKeySave(t *testing.T) {
|
|
dbMiddleware := postgres.NewDatabase(db)
|
|
repo := postgres.New(dbMiddleware)
|
|
|
|
id, err := idProvider.ID()
|
|
require.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
|
|
cases := []struct {
|
|
desc string
|
|
key auth.Key
|
|
err error
|
|
}{
|
|
{
|
|
desc: "save a new key",
|
|
key: auth.Key{
|
|
Subject: email,
|
|
IssuedAt: time.Now(),
|
|
ExpiresAt: expTime,
|
|
ID: id,
|
|
IssuerID: id,
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "save with duplicate id",
|
|
key: auth.Key{
|
|
Subject: email,
|
|
IssuedAt: time.Now(),
|
|
ExpiresAt: expTime,
|
|
ID: id,
|
|
IssuerID: id,
|
|
},
|
|
err: auth.ErrConflict,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
_, err := repo.Save(context.Background(), tc.key)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
}
|
|
}
|
|
|
|
func TestKeyRetrieve(t *testing.T) {
|
|
dbMiddleware := postgres.NewDatabase(db)
|
|
repo := postgres.New(dbMiddleware)
|
|
|
|
id, err := idProvider.ID()
|
|
require.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
|
|
key := auth.Key{
|
|
Subject: email,
|
|
IssuedAt: time.Now(),
|
|
ExpiresAt: expTime,
|
|
ID: id,
|
|
IssuerID: id,
|
|
}
|
|
_, err = repo.Save(context.Background(), key)
|
|
assert.Nil(t, err, fmt.Sprintf("Storing Key expected to succeed: %s", err))
|
|
cases := []struct {
|
|
desc string
|
|
id string
|
|
owner string
|
|
err error
|
|
}{
|
|
{
|
|
desc: "retrieve an existing key",
|
|
id: key.ID,
|
|
owner: key.IssuerID,
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "retrieve unauthorized",
|
|
id: key.ID,
|
|
owner: "",
|
|
err: auth.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "retrieve unknown key",
|
|
id: "",
|
|
owner: key.IssuerID,
|
|
err: auth.ErrNotFound,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
_, err := repo.Retrieve(context.Background(), tc.owner, tc.id)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
}
|
|
}
|
|
|
|
func TestKeyRemove(t *testing.T) {
|
|
dbMiddleware := postgres.NewDatabase(db)
|
|
repo := postgres.New(dbMiddleware)
|
|
|
|
id, err := idProvider.ID()
|
|
require.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
|
|
key := auth.Key{
|
|
Subject: email,
|
|
IssuedAt: time.Now(),
|
|
ExpiresAt: expTime,
|
|
ID: id,
|
|
IssuerID: id,
|
|
}
|
|
_, err = repo.Save(opentracing.ContextWithSpan(context.Background(), opentracing.StartSpan("")), key)
|
|
assert.Nil(t, err, fmt.Sprintf("Storing Key expected to succeed: %s", err))
|
|
cases := []struct {
|
|
desc string
|
|
id string
|
|
owner string
|
|
err error
|
|
}{
|
|
{
|
|
desc: "remove an existing key",
|
|
id: key.ID,
|
|
owner: key.IssuerID,
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "remove key that does not exist",
|
|
id: key.ID,
|
|
owner: key.IssuerID,
|
|
err: nil,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
err := repo.Remove(context.Background(), tc.owner, tc.id)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
}
|
|
}
|