Newer
Older
package server
import (
"context"
"testing"
"buf.build/gen/go/bufbuild/protovalidate/protocolbuffers/go/buf/validate"
"code.fbi.h-da.de/danet/gosdn/api/go/gosdn/conflict"
apb "code.fbi.h-da.de/danet/gosdn/api/go/gosdn/rbac"
Fabian Seidl
committed
eventservice "code.fbi.h-da.de/danet/gosdn/controller/eventService"
"code.fbi.h-da.de/danet/gosdn/controller/rbac"
"github.com/bufbuild/protovalidate-go"
func getTestUserServer(t *testing.T) *UserServer {
jwtManager := rbac.NewJWTManager("test", time.Second)
Fabian Seidl
committed
eventService := eventservice.NewMockEventService()
userStore := rbac.NewMemoryUserStore()
Fabian Seidl
committed
userService := rbac.NewUserService(userStore, eventService)
roleStore := rbac.NewMemoryRoleStore()
Fabian Seidl
committed
roleService := rbac.NewRoleService(roleStore, eventService)
protoValidator, err := protovalidate.New()
if err != nil {
panic(err)
}
s := NewUserServer(jwtManager, userService, protoValidator)
err = clearAndCreateAuthTestSetup(userService, roleService)
if err != nil {
t.Fatalf("%v", err)
}
return s
}
func TestUser_CreateUsers(t *testing.T) {
type args struct {
ctx context.Context
request *apb.CreateUsersRequest
}
tests := []struct {
name string
args args
wantErr bool
validationErrors []*validate.Violation
}{
{
name: "default create users",
request: &apb.CreateUsersRequest{
User: []*apb.User{
{
Name: "someUser",
Roles: map[string]string{pndID: "userTestRole"},
Metadata: &conflict.Metadata{
ResourceVersion: 0,
},
},
},
},
},
wantErr: false,
},
{
name: "create users with too short password should fail",
args: args{
ctx: context.TODO(),
request: &apb.CreateUsersRequest{
User: []*apb.User{
{
Name: "someUser",
Roles: map[string]string{pndID: "userTestRole"},
Password: "pass",
Token: "",
Metadata: &conflict.Metadata{
ResourceVersion: 0,
},
},
},
},
},
wantErr: true,
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
validationErrors: []*validate.Violation{
{
FieldPath: "user[0].password",
ConstraintId: "string.min_len",
Message: "value length must be at least 5 characters",
}},
},
{
name: "create users with too short username should fail",
args: args{
ctx: context.TODO(),
request: &apb.CreateUsersRequest{
User: []*apb.User{
{
Name: "a",
Roles: map[string]string{pndID: "userTestRole"},
Password: "password",
Token: "",
Metadata: &conflict.Metadata{
ResourceVersion: 0,
},
},
},
},
},
wantErr: true,
validationErrors: []*validate.Violation{
{
FieldPath: "user[0].name",
ConstraintId: "string.min_len",
Message: "value length must be at least 3 characters",
}},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
s := getTestUserServer(t)
_, err := s.CreateUsers(tt.args.ctx, tt.args.request)
if (err != nil) != tt.wantErr {
t.Errorf("User.CreateUsers() error = %v, wantErr %v", err, tt.wantErr)
return
}
if tt.wantErr {
assertValidationErrors(t, err, tt.validationErrors)
}
})
}
}
func TestUser_GetUser(t *testing.T) {
patchLogger(t)
type args struct {
ctx context.Context
request *apb.GetUserRequest
}
tests := []struct {
name string
args args
want *apb.GetUserResponse
wantErr bool
validationErrors []*validate.Violation
}{
{
name: "default get user",
args: args{
ctx: context.TODO(),
request: &apb.GetUserRequest{
Name: "testAdmin",
Id: uuid.Nil.String(),
want: &apb.GetUserResponse{
User: &apb.User{Id: adminID,
Name: "testAdmin"}},
wantErr: false,
},
{
name: "fail get user",
args: args{
ctx: context.TODO(),
request: &apb.GetUserRequest{
Name: "nope",
Id: uuid.Nil.String(),
},
},
want: nil,
wantErr: true,
},
{
name: "fail get user due to missing name",
args: args{
ctx: context.TODO(),
request: &apb.GetUserRequest{
Name: "",
Id: uuid.Nil.String(),
},
},
want: nil,
wantErr: true,
validationErrors: []*validate.Violation{
{
FieldPath: "name",
ConstraintId: "required",
Message: "value is required",
}},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
s := getTestUserServer(t)
got, err := s.GetUser(tt.args.ctx, tt.args.request)
if (err != nil) != tt.wantErr {
t.Errorf("User.GetUser() error = %v, wantErr %v", err, tt.wantErr)
return
}
if tt.wantErr {
assertValidationErrors(t, err, tt.validationErrors)
}
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
if got.User.Name != tt.want.User.Name || got.User.Id != tt.want.User.Id {
t.Errorf("User.GetUser() = %v, want %v", got, tt.want)
}
} else {
if got != nil {
t.Errorf("User.GetUser() = %v, want %v", got, tt.want)
}
}
})
}
}
func TestUser_GetUsers(t *testing.T) {
type args struct {
ctx context.Context
request *apb.GetUsersRequest
}
tests := []struct {
name string
args args
want *apb.GetUsersResponse
wantLen int
wantErr bool
}{
{
name: "default get users",
args: args{ctx: context.TODO(),
request: &apb.GetUsersRequest{},
},
want: &apb.GetUsersResponse{
User: []*apb.User{
{Name: "testAdmin"},
{Name: "testUser"},
{Name: "testRandom"}},
},
wantLen: 3,
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
s := getTestUserServer(t)
got, err := s.GetUsers(tt.args.ctx, tt.args.request)
if (err != nil) != tt.wantErr {
t.Errorf("User.GetUsers() error = %v, wantErr %v", err, tt.wantErr)
return
}
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
if len(got.User) != tt.wantLen {
t.Errorf("User.GetUsers() = %v, want %v", got, tt.want)
}
for _, gotU := range got.User {
containsExpected := false
for _, wantU := range tt.want.User {
if gotU.Name == wantU.Name {
containsExpected = true
break
}
}
if !containsExpected {
t.Errorf("User.GetUsers() = %v, want %v", got, tt.want)
}
}
}
})
}
}
func TestUser_UpdateUsers(t *testing.T) {
type args struct {
ctx context.Context
request *apb.UpdateUsersRequest
}
tests := []struct {
name string
args args
want *apb.UpdateUsersResponse
wantErr bool
validationErrors []*validate.Violation
}{
{
name: "default update user",
args: args{ctx: context.TODO(),
request: &apb.UpdateUsersRequest{User: []*apb.UpdateUser{
{
Id: adminID,
Name: "sth Else",
Metadata: &conflict.Metadata{},
},
want: &apb.UpdateUsersResponse{},
wantErr: false,
},
{
name: "error update user",
args: args{ctx: context.TODO(),
request: &apb.UpdateUsersRequest{User: []*apb.UpdateUser{
{
Id: uuid.NewString(),
Name: "not a user",
Metadata: &conflict.Metadata{},
},
},
},
},
want: nil,
wantErr: true,
},
name: "update user without name should fail validation",
args: args{ctx: context.TODO(),
request: &apb.UpdateUsersRequest{User: []*apb.UpdateUser{
{
Id: uuid.NewString(),
Name: "",
Metadata: &conflict.Metadata{},
},
},
},
},
want: nil,
wantErr: true,
validationErrors: []*validate.Violation{
{
FieldPath: "name",
ConstraintId: "required",
Message: "value is required",
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
s := getTestUserServer(t)
_, err := s.UpdateUsers(tt.args.ctx, tt.args.request)
if (err != nil) != tt.wantErr {
t.Errorf("User.UpdateUsers() error = %v, wantErr %v", err, tt.wantErr)
return
}
if tt.wantErr {
assertValidationErrors(t, err, tt.validationErrors)
}
})
}
}
func TestUser_DeleteUsers(t *testing.T) {
type args struct {
ctx context.Context
request *apb.DeleteUsersRequest
}
tests := []struct {
name string
args args
want *apb.DeleteUsersResponse
wantErr bool
validationErrors []*validate.Violation
}{
{
name: "default delete users",
args: args{ctx: context.TODO(),
request: &apb.DeleteUsersRequest{Username: []string{"testUser"}},
},
want: &apb.DeleteUsersResponse{},
name: "error delete users for non existing user",
args: args{ctx: context.TODO(),
request: &apb.DeleteUsersRequest{Username: []string{"no user"}},
},
want: &apb.DeleteUsersResponse{},
{
name: "error delete users due to missing name",
args: args{ctx: context.TODO(),
request: &apb.DeleteUsersRequest{Username: []string{""}},
},
want: &apb.DeleteUsersResponse{},
wantErr: true,
validationErrors: []*validate.Violation{
{
FieldPath: "name",
ConstraintId: "required",
Message: "value is required",
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
s := getTestUserServer(t)
_, err := s.DeleteUsers(tt.args.ctx, tt.args.request)
if (err != nil) != tt.wantErr {
t.Errorf("User.DeleteUsers() error = %v, wantErr %v", err, tt.wantErr)
return
}
if tt.wantErr {
assertValidationErrors(t, err, tt.validationErrors)
}