test(handlers): add additional coverage (#4698)
* test(handlers): handler_checks_safe_redirection * test(handlers): password_policy * test(handlers): health Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>pull/4702/head^2
parent
0f613588cc
commit
2ab50c7f61
|
@ -63,3 +63,33 @@ func TestCheckSafeRedirection_SafeRedirection(t *testing.T) {
|
|||
OK: true,
|
||||
})
|
||||
}
|
||||
|
||||
func TestShouldFailOnInvalidBody(t *testing.T) {
|
||||
mock := mocks.NewMockAutheliaCtxWithUserSession(t, session.UserSession{
|
||||
Username: "john",
|
||||
AuthenticationLevel: authentication.OneFactor,
|
||||
})
|
||||
defer mock.Close()
|
||||
mock.Ctx.Configuration.Session.Domain = exampleDotComDomain
|
||||
|
||||
mock.SetRequestBody(t, "not a valid json")
|
||||
|
||||
CheckSafeRedirectionPOST(mock.Ctx)
|
||||
mock.Assert200KO(t, "Operation failed.")
|
||||
}
|
||||
|
||||
func TestShouldFailOnInvalidURL(t *testing.T) {
|
||||
mock := mocks.NewMockAutheliaCtxWithUserSession(t, session.UserSession{
|
||||
Username: "john",
|
||||
AuthenticationLevel: authentication.OneFactor,
|
||||
})
|
||||
defer mock.Close()
|
||||
mock.Ctx.Configuration.Session.Domain = exampleDotComDomain
|
||||
|
||||
mock.SetRequestBody(t, checkURIWithinDomainRequestBody{
|
||||
URI: "https//invalid-url",
|
||||
})
|
||||
|
||||
CheckSafeRedirectionPOST(mock.Ctx)
|
||||
mock.Assert200KO(t, "Operation failed.")
|
||||
}
|
||||
|
|
|
@ -0,0 +1,83 @@
|
|||
package handlers
|
||||
|
||||
import (
|
||||
// "strings".
|
||||
"encoding/json"
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
"github.com/stretchr/testify/suite"
|
||||
|
||||
"github.com/authelia/authelia/v4/internal/mocks"
|
||||
)
|
||||
|
||||
type passwordPolicyResponseBody struct {
|
||||
Status string
|
||||
Data PasswordPolicyBody
|
||||
}
|
||||
|
||||
type PasswordPolicySuite struct {
|
||||
suite.Suite
|
||||
|
||||
mock *mocks.MockAutheliaCtx
|
||||
}
|
||||
|
||||
func (s *PasswordPolicySuite) SetupTest() {
|
||||
s.mock = mocks.NewMockAutheliaCtx(s.T())
|
||||
}
|
||||
|
||||
func (s *PasswordPolicySuite) TearDownTest() {
|
||||
s.mock.Close()
|
||||
}
|
||||
|
||||
func (s *PasswordPolicySuite) TestShouldBeDisabled() {
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.ZXCVBN.Enabled = false
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.Standard.Enabled = false
|
||||
|
||||
PasswordPolicyConfigurationGET(s.mock.Ctx)
|
||||
|
||||
response := &passwordPolicyResponseBody{}
|
||||
err := json.Unmarshal(s.mock.Ctx.Response.Body(), response)
|
||||
|
||||
require.NoError(s.T(), err)
|
||||
assert.Equal(s.T(), 200, s.mock.Ctx.Response.StatusCode())
|
||||
assert.Equal(s.T(), "disabled", response.Data.Mode)
|
||||
}
|
||||
|
||||
func (s *PasswordPolicySuite) TestShouldBeStandard() {
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.ZXCVBN.Enabled = false
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.Standard.Enabled = true
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.Standard.MinLength = 4
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.Standard.MaxLength = 8
|
||||
|
||||
PasswordPolicyConfigurationGET(s.mock.Ctx)
|
||||
|
||||
response := &passwordPolicyResponseBody{}
|
||||
err := json.Unmarshal(s.mock.Ctx.Response.Body(), response)
|
||||
|
||||
require.NoError(s.T(), err)
|
||||
assert.Equal(s.T(), 200, s.mock.Ctx.Response.StatusCode())
|
||||
assert.Equal(s.T(), "standard", response.Data.Mode)
|
||||
assert.Equal(s.T(), 4, response.Data.MinLength)
|
||||
assert.Equal(s.T(), 8, response.Data.MaxLength)
|
||||
}
|
||||
|
||||
func (s *PasswordPolicySuite) TestShouldBeZXCVBN() {
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.ZXCVBN.Enabled = true
|
||||
s.mock.Ctx.Configuration.PasswordPolicy.Standard.Enabled = false
|
||||
|
||||
PasswordPolicyConfigurationGET(s.mock.Ctx)
|
||||
|
||||
response := &passwordPolicyResponseBody{}
|
||||
err := json.Unmarshal(s.mock.Ctx.Response.Body(), response)
|
||||
|
||||
require.NoError(s.T(), err)
|
||||
assert.Equal(s.T(), 200, s.mock.Ctx.Response.StatusCode())
|
||||
assert.Equal(s.T(), "zxcvbn", response.Data.Mode)
|
||||
}
|
||||
|
||||
func TestRunPasswordPolicySuite(t *testing.T) {
|
||||
s := new(PasswordPolicySuite)
|
||||
suite.Run(t, s)
|
||||
}
|
|
@ -0,0 +1,26 @@
|
|||
package handlers
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
|
||||
"github.com/authelia/authelia/v4/internal/authentication"
|
||||
"github.com/authelia/authelia/v4/internal/mocks"
|
||||
"github.com/authelia/authelia/v4/internal/session"
|
||||
)
|
||||
|
||||
var okMessageBytes = []byte("{\"status\":\"OK\"}")
|
||||
|
||||
func TestHealthOk(t *testing.T) {
|
||||
mock := mocks.NewMockAutheliaCtxWithUserSession(t, session.UserSession{
|
||||
Username: "john",
|
||||
AuthenticationLevel: authentication.OneFactor,
|
||||
})
|
||||
defer mock.Close()
|
||||
|
||||
HealthGET(mock.Ctx)
|
||||
|
||||
assert.Equal(t, 200, mock.Ctx.Response.StatusCode())
|
||||
assert.Equal(t, okMessageBytes, mock.Ctx.Response.Body())
|
||||
}
|
Loading…
Reference in New Issue