mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-27 13:48:49 +08:00

* Move Things and Users to Clients Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Update Add and Delete Policies (#1792) * Remove Policy Action Ranks Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Rebase Issues Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix CI Test Errors Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Adding Check on Subject For Clients Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Check Client Exists Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Check When Sharing Clients Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Only Add User to Group When Sharing Things Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove clientType Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Minor Fix on ShareClient and Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Policies Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Clean Up Things Authorization Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests on RetrieveAll Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Test ShareThing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Merge Conflicts Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Adding Policies. Only Use Ownership Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Check If Subject is same as Object Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Move Back To Union As Sometimes Policy is Empty and Fails to Evaluate on Ownership Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Entity Type For Failing Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix BUG in policy evaluation Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Comments Regarding checkAdmin Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests On Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Combine Authorize For Things and Users Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests On Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Error on Things SVC `unsupported protocol scheme` Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix Bug on Things Authorization Cache (#1810) Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Use Password instead of username in MQTT handler Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Simplify MQTT authorization Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix MQTT tests Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add More Functions to SDK (#1811) * Add More Functions to SDK Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Examples to GoDoc Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Update Unassign Interface Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Pass Subject as ID and Not Token on List Channels By Thing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Bootstrap Errors For Element Check Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add empty line Before Return Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Reorder URLS in things mux Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Listing Things Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Share Thing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Examples to CLI Docs Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Update Identity To Update Another User Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Identify an Update Policies on Things Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Update Things Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix GoDocs on Disconnect Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Change Authorize To Use AccessRequest Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * For Evaluate Policy Use AccessRequest (#1814) Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add SDK Tests (#1812) * Add Things Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Channel Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Certs Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Consumer Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Enrich Group Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Tests For Health Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Tests For Tokens Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename SDK for Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Policies Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Linter Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Make Variable Defination Inline Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Make Cache Key Duration Configurable (#1815) * Make Cache Key Duration Configurable Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename ENV Var Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Update GoDocs (#1816) * Add GoDocs Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Missing GoDoc Files Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Enable godot Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add License Information Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add Call Home Client to Mainflux services (#1751) * Move Things and Users to Clients Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> * collect and send data package Signed-off-by: SammyOina <sammyoina@gmail.com> * create telemetry migrations Signed-off-by: SammyOina <sammyoina@gmail.com> * add telemetry endpoints Signed-off-by: SammyOina <sammyoina@gmail.com> * add transport Signed-off-by: SammyOina <sammyoina@gmail.com> * create service Signed-off-by: SammyOina <sammyoina@gmail.com> * remove homing server Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home to adapters Signed-off-by: SammyOina <sammyoina@gmail.com> * add last seen Signed-off-by: SammyOina <sammyoina@gmail.com> * rename logger Signed-off-by: SammyOina <sammyoina@gmail.com> * remove homing client Signed-off-by: SammyOina <sammyoina@gmail.com> * use unmerged repo Signed-off-by: SammyOina <sammyoina@gmail.com> * use renamed module Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home version Signed-off-by: SammyOina <sammyoina@gmail.com> * edit documentation Signed-off-by: SammyOina <sammyoina@gmail.com> * align table Signed-off-by: SammyOina <sammyoina@gmail.com> * use alias for call home client Signed-off-by: SammyOina <sammyoina@gmail.com> * update callhome Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home pkg Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home Signed-off-by: SammyOina <sammyoina@gmail.com> * fix modules Signed-off-by: SammyOina <sammyoina@gmail.com> * use mf build version Signed-off-by: SammyOina <sammyoina@gmail.com> * use mf build version Signed-off-by: SammyOina <sammyoina@gmail.com> * restore default Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home for users and things Signed-off-by: SammyOina <sammyoina@gmail.com> * enable opting on call home Signed-off-by: SammyOina <sammyoina@gmail.com> * remove full stops Signed-off-by: SammyOina <sammyoina@gmail.com> * update callhome client Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home to all services Signed-off-by: SammyOina <sammyoina@gmail.com> * fix build Signed-off-by: SammyOina <sammyoina@gmail.com> * restore sdk tests Signed-off-by: SammyOina <sammyoina@gmail.com> * remove unnecessary changes Signed-off-by: SammyOina <sammyoina@gmail.com> * restore health_test.go Signed-off-by: SammyOina <sammyoina@gmail.com> --------- Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> Co-authored-by: b1ackd0t <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> --------- Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> Co-authored-by: b1ackd0t <blackd0t@protonmail.com> Co-authored-by: Sammy Kerata Oina <44265300+SammyOina@users.noreply.github.com>
452 lines
11 KiB
Go
452 lines
11 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package mqtt_test
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"fmt"
|
|
"log"
|
|
"testing"
|
|
|
|
"github.com/mainflux/mainflux/logger"
|
|
"github.com/mainflux/mainflux/mqtt"
|
|
"github.com/mainflux/mainflux/mqtt/mocks"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
"github.com/mainflux/mainflux/pkg/messaging"
|
|
"github.com/mainflux/mainflux/things/policies"
|
|
"github.com/mainflux/mproxy/pkg/session"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
const (
|
|
thingID = "513d02d2-16c1-4f23-98be-9e12f8fee898"
|
|
thingID1 = "513d02d2-16c1-4f23-98be-9e12f8fee899"
|
|
password = "password"
|
|
password1 = "password1"
|
|
chanID = "123e4567-e89b-12d3-a456-000000000001"
|
|
invalidID = "invalidID"
|
|
clientID = "clientID"
|
|
clientID1 = "clientID1"
|
|
subtopic = "testSubtopic"
|
|
invalidChannelIDTopic = "channels/**/messages"
|
|
)
|
|
|
|
var (
|
|
topicMsg = "channels/%s/messages"
|
|
topic = fmt.Sprintf(topicMsg, chanID)
|
|
invalidTopic = "invalidTopic"
|
|
payload = []byte("[{'n':'test-name', 'v': 1.2}]")
|
|
topics = []string{topic}
|
|
invalidTopics = []string{invalidTopic}
|
|
invalidChanIDTopics = []string{fmt.Sprintf(topicMsg, invalidTopic)}
|
|
//Test log messages for cases the handler does not provide a return value.
|
|
logBuffer = bytes.Buffer{}
|
|
sessionClient = session.Session{
|
|
ID: clientID,
|
|
Username: thingID,
|
|
Password: []byte(password),
|
|
}
|
|
sessionClientSub = session.Session{
|
|
ID: clientID1,
|
|
Username: thingID1,
|
|
Password: []byte(password1),
|
|
}
|
|
invalidThingSessionClient = session.Session{
|
|
ID: clientID,
|
|
Username: invalidID,
|
|
Password: []byte(password),
|
|
}
|
|
)
|
|
|
|
func TestAuthConnect(t *testing.T) {
|
|
handler := newHandler()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
err error
|
|
session *session.Session
|
|
}{
|
|
{
|
|
desc: "connect without active session",
|
|
err: mqtt.ErrClientNotInitialized,
|
|
session: nil,
|
|
},
|
|
{
|
|
desc: "connect without clientID",
|
|
err: mqtt.ErrMissingClientID,
|
|
session: &session.Session{
|
|
ID: "",
|
|
Username: thingID,
|
|
Password: []byte(password),
|
|
},
|
|
},
|
|
{
|
|
desc: "connect with invalid password",
|
|
err: errors.ErrAuthentication,
|
|
session: &session.Session{
|
|
ID: clientID,
|
|
Username: thingID,
|
|
Password: []byte(""),
|
|
},
|
|
},
|
|
{
|
|
desc: "connect with valid password and invalid username",
|
|
err: errors.ErrAuthentication,
|
|
session: &invalidThingSessionClient,
|
|
},
|
|
{
|
|
desc: "connect with valid username and password",
|
|
err: nil,
|
|
session: &sessionClient,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
err := handler.AuthConnect(ctx)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
}
|
|
}
|
|
|
|
func TestAuthPublish(t *testing.T) {
|
|
handler := newHandler()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
err error
|
|
topic *string
|
|
payload []byte
|
|
}{
|
|
{
|
|
desc: "publish with an inactive client",
|
|
session: nil,
|
|
err: mqtt.ErrClientNotInitialized,
|
|
topic: &topic,
|
|
payload: payload,
|
|
},
|
|
{
|
|
desc: "publish without topic",
|
|
session: &sessionClient,
|
|
err: mqtt.ErrMissingTopicPub,
|
|
topic: nil,
|
|
payload: payload,
|
|
},
|
|
{
|
|
desc: "publish with malformed topic",
|
|
session: &sessionClient,
|
|
err: mqtt.ErrMalformedTopic,
|
|
topic: &invalidTopic,
|
|
payload: payload,
|
|
},
|
|
{
|
|
desc: "publish with invalid access rights",
|
|
session: &sessionClientSub,
|
|
err: errors.ErrAuthorization,
|
|
topic: &topic,
|
|
payload: payload,
|
|
},
|
|
{
|
|
desc: "publish successfully",
|
|
session: &sessionClient,
|
|
err: nil,
|
|
topic: &topic,
|
|
payload: payload,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
err := handler.AuthPublish(ctx, tc.topic, &tc.payload)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
}
|
|
}
|
|
|
|
func TestAuthSubscribe(t *testing.T) {
|
|
handler := newHandler()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
err error
|
|
topic *[]string
|
|
}{
|
|
{
|
|
desc: "subscribe without active session",
|
|
session: nil,
|
|
err: mqtt.ErrClientNotInitialized,
|
|
topic: &topics,
|
|
},
|
|
{
|
|
desc: "subscribe without topics",
|
|
session: &sessionClient,
|
|
err: mqtt.ErrMissingTopicSub,
|
|
topic: nil,
|
|
},
|
|
{
|
|
desc: "subscribe with invalid topics",
|
|
session: &sessionClient,
|
|
err: mqtt.ErrMalformedTopic,
|
|
topic: &invalidTopics,
|
|
},
|
|
{
|
|
desc: "subscribe with invalid channel ID",
|
|
session: &sessionClient,
|
|
err: errors.ErrAuthorization,
|
|
topic: &invalidChanIDTopics,
|
|
},
|
|
{
|
|
desc: "subscribe with active session, valid topics, but invalid access rights",
|
|
session: &sessionClient,
|
|
err: errors.ErrAuthorization,
|
|
topic: &topics,
|
|
},
|
|
{
|
|
desc: "subscribe successfully",
|
|
session: &sessionClientSub,
|
|
err: nil,
|
|
topic: &topics,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
err := handler.AuthSubscribe(ctx, tc.topic)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
}
|
|
}
|
|
|
|
func TestConnect(t *testing.T) {
|
|
handler := newHandler()
|
|
logBuffer.Reset()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
logMsg string
|
|
}{
|
|
{
|
|
desc: "connect without active session",
|
|
session: nil,
|
|
logMsg: errors.Wrap(mqtt.ErrFailedConnect, mqtt.ErrClientNotInitialized).Error(),
|
|
},
|
|
{
|
|
desc: "connect with active session",
|
|
session: &sessionClient,
|
|
logMsg: fmt.Sprintf(mqtt.LogInfoConnected, clientID),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
handler.Connect(ctx)
|
|
assert.Contains(t, logBuffer.String(), tc.logMsg)
|
|
}
|
|
}
|
|
|
|
func TestPublish(t *testing.T) {
|
|
handler := newHandler()
|
|
logBuffer.Reset()
|
|
|
|
malformedSubtopics := topic + "/" + subtopic + "%"
|
|
wrongCharSubtopics := topic + "/" + subtopic + ">"
|
|
validSubtopic := topic + "/" + subtopic
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
topic string
|
|
payload []byte
|
|
logMsg string
|
|
}{
|
|
{
|
|
desc: "publish without active session",
|
|
session: nil,
|
|
topic: topic,
|
|
payload: payload,
|
|
logMsg: mqtt.ErrClientNotInitialized.Error(),
|
|
},
|
|
{
|
|
desc: "publish with invalid topic",
|
|
session: &sessionClient,
|
|
topic: invalidTopic,
|
|
payload: payload,
|
|
logMsg: fmt.Sprintf(mqtt.LogInfoPublished, clientID, invalidTopic),
|
|
},
|
|
{
|
|
desc: "publish with invalid channel ID",
|
|
session: &sessionClient,
|
|
topic: invalidChannelIDTopic,
|
|
payload: payload,
|
|
logMsg: errors.Wrap(mqtt.ErrFailedPublish, mqtt.ErrMalformedTopic).Error(),
|
|
},
|
|
{
|
|
desc: "publish with malformed subtopic",
|
|
session: &sessionClient,
|
|
topic: malformedSubtopics,
|
|
payload: payload,
|
|
logMsg: mqtt.ErrMalformedSubtopic.Error(),
|
|
},
|
|
{
|
|
desc: "publish with subtopic containing wrong character",
|
|
session: &sessionClient,
|
|
topic: wrongCharSubtopics,
|
|
payload: payload,
|
|
logMsg: mqtt.ErrMalformedSubtopic.Error(),
|
|
},
|
|
{
|
|
desc: "publish with subtopic",
|
|
session: &sessionClient,
|
|
topic: validSubtopic,
|
|
payload: payload,
|
|
logMsg: subtopic,
|
|
},
|
|
{
|
|
desc: "publish without subtopic",
|
|
session: &sessionClient,
|
|
topic: topic,
|
|
payload: payload,
|
|
logMsg: "",
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
handler.Publish(ctx, &tc.topic, &tc.payload)
|
|
assert.Contains(t, logBuffer.String(), tc.logMsg)
|
|
}
|
|
}
|
|
|
|
func TestSubscribe(t *testing.T) {
|
|
handler := newHandler()
|
|
logBuffer.Reset()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
topic []string
|
|
logMsg string
|
|
}{
|
|
{
|
|
desc: "subscribe without active session",
|
|
session: nil,
|
|
topic: topics,
|
|
logMsg: errors.Wrap(mqtt.ErrFailedSubscribe, mqtt.ErrClientNotInitialized).Error(),
|
|
},
|
|
{
|
|
desc: "subscribe with valid session and topics",
|
|
session: &sessionClient,
|
|
topic: topics,
|
|
logMsg: fmt.Sprintf(mqtt.LogInfoSubscribed, clientID, topics[0]),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
handler.Subscribe(ctx, &tc.topic)
|
|
assert.Contains(t, logBuffer.String(), tc.logMsg)
|
|
}
|
|
}
|
|
|
|
func TestUnsubscribe(t *testing.T) {
|
|
handler := newHandler()
|
|
logBuffer.Reset()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
topic []string
|
|
logMsg string
|
|
}{
|
|
{
|
|
desc: "unsubscribe without active session",
|
|
session: nil,
|
|
topic: topics,
|
|
logMsg: errors.Wrap(mqtt.ErrFailedUnsubscribe, mqtt.ErrClientNotInitialized).Error(),
|
|
},
|
|
{
|
|
desc: "unsubscribe with valid session and topics",
|
|
session: &sessionClient,
|
|
topic: topics,
|
|
logMsg: fmt.Sprintf(mqtt.LogInfoUnsubscribed, clientID, topics[0]),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
handler.Unsubscribe(ctx, &tc.topic)
|
|
assert.Contains(t, logBuffer.String(), tc.logMsg)
|
|
}
|
|
}
|
|
|
|
func TestDisconnect(t *testing.T) {
|
|
handler := newHandler()
|
|
logBuffer.Reset()
|
|
|
|
cases := []struct {
|
|
desc string
|
|
session *session.Session
|
|
topic []string
|
|
logMsg string
|
|
}{
|
|
{
|
|
desc: "disconnect without active session",
|
|
session: nil,
|
|
topic: topics,
|
|
logMsg: errors.Wrap(mqtt.ErrFailedDisconnect, mqtt.ErrClientNotInitialized).Error(),
|
|
},
|
|
{
|
|
desc: "disconnect with valid session",
|
|
session: &sessionClient,
|
|
topic: topics,
|
|
logMsg: mqtt.ErrClientNotInitialized.Error(),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
ctx := context.TODO()
|
|
if tc.session != nil {
|
|
ctx = session.NewContext(ctx, tc.session)
|
|
}
|
|
handler.Disconnect(ctx)
|
|
assert.Contains(t, logBuffer.String(), tc.logMsg)
|
|
}
|
|
}
|
|
|
|
func newHandler() session.Handler {
|
|
logger, err := logger.New(&logBuffer, "debug")
|
|
if err != nil {
|
|
log.Fatalf("failed to create logger: %s", err)
|
|
}
|
|
k := mocks.Key(&policies.AuthorizeReq{Sub: password, Obj: chanID})
|
|
elems := map[string][]string{k: {policies.WriteAction}}
|
|
k = mocks.Key(&policies.AuthorizeReq{Sub: password1, Obj: chanID})
|
|
elems[k] = []string{policies.ReadAction}
|
|
authClient := mocks.NewClient(map[string]string{password: thingID, password1: thingID1}, elems)
|
|
eventStore := mocks.NewEventStore()
|
|
return mqtt.NewHandler([]messaging.Publisher{mocks.NewPublisher()}, eventStore, logger, authClient)
|
|
}
|