1
0
mirror of https://github.com/mainflux/mainflux.git synced 2025-04-26 13:48:53 +08:00
Mainflux.mainflux/users/users_test.go
Ivan Milošević 7bcaa323d4
MF-1317 - Configurable regexp rule for password (#1355)
* read and validate regex envar

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* pass regexp to user/api

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* resolve conflicts

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* use exported regexp variable

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* move password validation from users package

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* remove dead code

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* add password change request

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* move regexp from api to users package

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* fix tests

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* remove commented code

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* add regexp as field in userService, remove it as user exported global var

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* add passwd validation in service

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* Add psswd validation for change password in service

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* add password validation in password reset

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* Remove password validation from user validation test

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* Replace email and passwords in test with constants

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* compile error not fail silently

Signed-off-by: Ivan Milosevic <iva@blokovi.com>

* fix tempate path

Signed-off-by: Ivan Milosevic <iva@blokovi.com>
2021-03-01 15:22:57 +01:00

145 lines
3.1 KiB
Go

// Copyright (c) Mainflux
// SPDX-License-Identifier: Apache-2.0
package users_test
import (
"fmt"
"math/rand"
"testing"
"github.com/mainflux/mainflux/pkg/errors"
"github.com/mainflux/mainflux/users"
"github.com/stretchr/testify/assert"
)
const (
email = "user@example.com"
password = "password"
maxLocalLen = 64
maxDomainLen = 255
maxTLDLen = 24
)
var letters = "abcdefghijklmnopqrstuvwxyz"
func randomString(n int) string {
b := make([]byte, n)
for i := range b {
b[i] = letters[rand.Intn(len(letters))]
}
return string(b)
}
func TestValidate(t *testing.T) {
cases := map[string]struct {
user users.User
err error
}{
"validate user with valid data": {
user: users.User{
Email: email,
Password: password,
},
err: nil,
},
"validate user with valid domain and subdomain": {
user: users.User{
Email: "user@example.sub.domain.com",
Password: password,
},
err: nil,
},
"validate user with invalid subdomain": {
user: users.User{
Email: "user@example..domain.com",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with invalid domain": {
user: users.User{
Email: "user@.sub.com",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with empty email": {
user: users.User{
Email: "",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with invalid email": {
user: users.User{
Email: "userexample.com",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with utf8 email (cyrillic)": {
user: users.User{
Email: "почта@кино-россия.рф",
Password: password,
},
err: nil,
},
"validate user with utf8 email (hieroglyph)": {
user: users.User{
Email: "艾付忧西开@艾付忧西开.再得",
Password: password,
},
err: nil,
},
"validate user with no email tld": {
user: users.User{
Email: "user@example.",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with too long email tld": {
user: users.User{
Email: "user@example." + randomString(maxTLDLen+1),
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with no email domain": {
user: users.User{
Email: "user@.com",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with too long email domain": {
user: users.User{
Email: "user@" + randomString(maxDomainLen+1) + ".com",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with no email local": {
user: users.User{
Email: "@example.com",
Password: password,
},
err: users.ErrMalformedEntity,
},
"validate user with too long email local": {
user: users.User{
Email: randomString(maxLocalLen+1) + "@example.com",
Password: password,
},
err: users.ErrMalformedEntity,
},
}
for desc, tc := range cases {
err := tc.user.Validate()
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", desc, tc.err, err))
}
}