Files
openfsd/protocol/auth_challenge_test.go
Reese Norris 57d54d6705 v0.1.0-alpha
Changes:
- Implement bootstrapping library for managing several concurrent internal services
- Refactor concurrency model for connections/logical clients and their associated I/O
- Refactor server context singleton
- Refactor error handling
    - Most errors are now gracefully sent to the FSD client directly encoded as an $ER packet,
      enhancing visibility and debugging
    - Most errors are now rightfully treated as non-fatal
- Refactor package/dependency graph
- Refactor calling conventions/interfaces for many packages
- Refactor database package
- Refactor post office

Features:
- Add VATSIM-esque HTTP/JSON "data feed"
- Add ephemeral in-memory database option
- Add user management REST API
- Add improved web interface
- Add MySQL support (drop SQLite support)
2024-10-07 12:50:39 -07:00

101 lines
2.2 KiB
Go

package protocol
import (
"github.com/go-playground/validator/v10"
"github.com/stretchr/testify/assert"
"strings"
"testing"
)
func TestAuthChallengePDU_Serialize(t *testing.T) {
tests := []struct {
name string
pdu *AuthChallengePDU
want string
}{
{
name: "Valid Serialization",
pdu: &AuthChallengePDU{
From: "SERVER",
To: "CLIENT",
Challenge: "abcd1234ef",
},
want: "$ZCSERVER:CLIENT:abcd1234ef\r\n",
},
}
V = validator.New()
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
result := test.pdu.Serialize()
assert.Equal(t, test.want, result)
})
}
}
func TestParseAuthChallengePDU(t *testing.T) {
V = validator.New(validator.WithRequiredStructEnabled())
tests := []struct {
name string
packet string
want *AuthChallengePDU
wantErr error
}{
{
name: "Valid Packet",
packet: "$ZCSERVER:CLIENT:abcd1234ef\r\n",
want: &AuthChallengePDU{
From: "SERVER",
To: "CLIENT",
Challenge: "abcd1234ef",
},
wantErr: nil,
},
{
name: "Missing From Field",
packet: "$ZC:CLIENT:abcd1234ef\r\n",
want: &AuthChallengePDU{},
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
},
{
name: "Missing To Field",
packet: "$ZCSERVER::abcd1234ef\r\n",
want: &AuthChallengePDU{},
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
},
{
name: "Invalid Challenge Len",
packet: "$ZCSERVER:CLIENT:ab\r\n",
want: &AuthChallengePDU{},
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
},
{
name: "Invalid Hexadecimal Challenge",
packet: "$ZCSERVER:CLIENT:ghij7890\r\n",
want: &AuthChallengePDU{},
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
},
}
V = validator.New()
for _, tc := range tests {
t.Run(tc.name, func(t *testing.T) {
pdu := AuthChallengePDU{}
err := pdu.Parse(tc.packet)
assert.Equal(t, tc.want, &pdu)
// Check the error
if tc.wantErr != nil {
if strings.Contains(tc.wantErr.Error(), "validation error") {
assert.Contains(t, err.Error(), "validation error")
} else {
assert.EqualError(t, err, tc.wantErr.Error())
}
} else {
assert.NoError(t, err)
}
})
}
}