1
0
mirror of https://github.com/mainflux/mainflux.git synced 2025-04-28 13:48:49 +08:00
Mainflux.mainflux/users/users_test.go
Aryan Godara b435b80d03
MF-1720 - Improve Test Reports (#1727)
* resolve merge conflicts

Signed-off-by: aryan <aryangodara03@gmail.com>

* change remaining require with assert

Signed-off-by: aryan <aryangodara03@gmail.com>

* replace assert with require, whenever required.

Signed-off-by: aryan <aryangodara03@gmail.com>

* fix failing tests

Signed-off-by: aryan <aryangodara03@gmail.com>

* resolve assert and require

Signed-off-by: aryan <aryangodara03@gmail.com>

* revert groups_test

Signed-off-by: aryan <aryangodara03@gmail.com>

---------

Signed-off-by: aryan <aryangodara03@gmail.com>
2023-04-12 17:30:01 +02:00

160 lines
3.3 KiB
Go

// Copyright (c) Mainflux
// SPDX-License-Identifier: Apache-2.0
package users_test
import (
"fmt"
"math/rand"
"testing"
"github.com/mainflux/mainflux/pkg/errors"
"github.com/mainflux/mainflux/users"
"github.com/stretchr/testify/assert"
)
const (
email = "user@example.com"
password = "password"
maxLocalLen = 64
maxDomainLen = 255
maxTLDLen = 24
)
var letters = "abcdefghijklmnopqrstuvwxyz"
func randomString(n int) string {
b := make([]byte, n)
for i := range b {
b[i] = letters[rand.Intn(len(letters))]
}
return string(b)
}
func TestValidate(t *testing.T) {
cases := []struct {
desc string
user users.User
err error
}{
{
desc: "validate user with valid data",
user: users.User{
Email: email,
Password: password,
},
err: nil,
},
{
desc: "validate user with valid domain and subdomain",
user: users.User{
Email: "user@example.sub.domain.com",
Password: password,
},
err: nil,
},
{
desc: "validate user with invalid subdomain",
user: users.User{
Email: "user@example..domain.com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with invalid domain",
user: users.User{
Email: "user@.sub.com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with empty email",
user: users.User{
Email: "",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with invalid email",
user: users.User{
Email: "userexample.com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with utf8 email (cyrillic)",
user: users.User{
Email: "почта@кино-россия.рф",
Password: password,
},
err: nil,
},
{
desc: "validate user with utf8 email (hieroglyph)",
user: users.User{
Email: "艾付忧西开@艾付忧西开.再得",
Password: password,
},
err: nil,
},
{
desc: "validate user with no email tld",
user: users.User{
Email: "user@example.",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with too long email tld",
user: users.User{
Email: "user@example." + randomString(maxTLDLen+1),
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with no email domain",
user: users.User{
Email: "user@.com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with too long email domain",
user: users.User{
Email: "user@" + randomString(maxDomainLen+1) + ".com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with no email local",
user: users.User{
Email: "@example.com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
{
desc: "validate user with too long email local",
user: users.User{
Email: randomString(maxLocalLen+1) + "@example.com",
Password: password,
},
err: errors.ErrMalformedEntity,
},
}
for _, tc := range cases {
err := tc.user.Validate()
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}