Adding upstream version 0.28.1.
Signed-off-by: Daniel Baumann <daniel@debian.org>
This commit is contained in:
parent
88f1d47ab6
commit
e28c88ef14
933 changed files with 194711 additions and 0 deletions
160
core/record_model_auth_test.go
Normal file
160
core/record_model_auth_test.go
Normal file
|
@ -0,0 +1,160 @@
|
|||
package core_test
|
||||
|
||||
import (
|
||||
"context"
|
||||
"testing"
|
||||
|
||||
"github.com/pocketbase/pocketbase/core"
|
||||
"github.com/pocketbase/pocketbase/tests"
|
||||
"github.com/pocketbase/pocketbase/tools/security"
|
||||
)
|
||||
|
||||
func TestRecordEmail(t *testing.T) {
|
||||
record := core.NewRecord(core.NewAuthCollection("test"))
|
||||
|
||||
if record.Email() != "" {
|
||||
t.Fatalf("Expected email %q, got %q", "", record.Email())
|
||||
}
|
||||
|
||||
email := "test@example.com"
|
||||
record.SetEmail(email)
|
||||
|
||||
if record.Email() != email {
|
||||
t.Fatalf("Expected email %q, got %q", email, record.Email())
|
||||
}
|
||||
}
|
||||
|
||||
func TestRecordEmailVisibility(t *testing.T) {
|
||||
record := core.NewRecord(core.NewAuthCollection("test"))
|
||||
|
||||
if record.EmailVisibility() != false {
|
||||
t.Fatalf("Expected emailVisibility %v, got %v", false, record.EmailVisibility())
|
||||
}
|
||||
|
||||
record.SetEmailVisibility(true)
|
||||
|
||||
if record.EmailVisibility() != true {
|
||||
t.Fatalf("Expected emailVisibility %v, got %v", true, record.EmailVisibility())
|
||||
}
|
||||
}
|
||||
|
||||
func TestRecordVerified(t *testing.T) {
|
||||
record := core.NewRecord(core.NewAuthCollection("test"))
|
||||
|
||||
if record.Verified() != false {
|
||||
t.Fatalf("Expected verified %v, got %v", false, record.Verified())
|
||||
}
|
||||
|
||||
record.SetVerified(true)
|
||||
|
||||
if record.Verified() != true {
|
||||
t.Fatalf("Expected verified %v, got %v", true, record.Verified())
|
||||
}
|
||||
}
|
||||
|
||||
func TestRecordTokenKey(t *testing.T) {
|
||||
record := core.NewRecord(core.NewAuthCollection("test"))
|
||||
|
||||
if record.TokenKey() != "" {
|
||||
t.Fatalf("Expected tokenKey %q, got %q", "", record.TokenKey())
|
||||
}
|
||||
|
||||
tokenKey := "example"
|
||||
|
||||
record.SetTokenKey(tokenKey)
|
||||
|
||||
if record.TokenKey() != tokenKey {
|
||||
t.Fatalf("Expected tokenKey %q, got %q", tokenKey, record.TokenKey())
|
||||
}
|
||||
|
||||
record.RefreshTokenKey()
|
||||
|
||||
if record.TokenKey() == tokenKey {
|
||||
t.Fatalf("Expected tokenKey to be random generated, got %q", tokenKey)
|
||||
}
|
||||
|
||||
if len(record.TokenKey()) != 50 {
|
||||
t.Fatalf("Expected %d characters, got %d", 50, len(record.TokenKey()))
|
||||
}
|
||||
}
|
||||
|
||||
func TestRecordPassword(t *testing.T) {
|
||||
scenarios := []struct {
|
||||
name string
|
||||
password string
|
||||
expected bool
|
||||
}{
|
||||
{
|
||||
"empty password",
|
||||
"",
|
||||
false,
|
||||
},
|
||||
{
|
||||
"non-empty password",
|
||||
"123456",
|
||||
true,
|
||||
},
|
||||
}
|
||||
|
||||
for _, s := range scenarios {
|
||||
t.Run(s.name, func(t *testing.T) {
|
||||
record := core.NewRecord(core.NewAuthCollection("test"))
|
||||
|
||||
if record.ValidatePassword(s.password) {
|
||||
t.Fatal("[before set] Expected password to be invalid")
|
||||
}
|
||||
|
||||
record.SetPassword(s.password)
|
||||
|
||||
result := record.ValidatePassword(s.password)
|
||||
|
||||
if result != s.expected {
|
||||
t.Fatalf("[after set] Expected ValidatePassword %v, got %v", result, s.expected)
|
||||
}
|
||||
|
||||
// try with a random string to ensure that not any string validates
|
||||
if record.ValidatePassword(security.PseudorandomString(5)) {
|
||||
t.Fatal("[random] Expected password to be invalid")
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestRecordSetRandomPassword(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
oldTokenKey := "old_tokenKey"
|
||||
record := core.NewRecord(core.NewAuthCollection("test"))
|
||||
record.SetTokenKey(oldTokenKey)
|
||||
|
||||
pass := record.SetRandomPassword()
|
||||
|
||||
if pass == "" {
|
||||
t.Fatal("Expected non-empty generated random password")
|
||||
}
|
||||
|
||||
if !record.ValidatePassword(pass) {
|
||||
t.Fatal("Expected the generated random password to be valid")
|
||||
}
|
||||
|
||||
if record.TokenKey() == oldTokenKey {
|
||||
t.Fatal("Expected token key to change")
|
||||
}
|
||||
|
||||
f, ok := record.Collection().Fields.GetByName(core.FieldNamePassword).(*core.PasswordField)
|
||||
if !ok {
|
||||
t.Fatal("Expected *core.PasswordField")
|
||||
}
|
||||
|
||||
// ensure that the field validators will be ignored
|
||||
f.Min = 1
|
||||
f.Max = 2
|
||||
f.Pattern = `\d+`
|
||||
|
||||
if err := f.ValidateValue(context.Background(), app, record); err != nil {
|
||||
t.Fatalf("Expected password field plain value validators to be ignored, got %v", err)
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue