mirror of
https://github.com/renorris/openfsd
synced 2026-03-22 23:05:36 +08:00
Changes:
- Implement bootstrapping library for managing several concurrent internal services
- Refactor concurrency model for connections/logical clients and their associated I/O
- Refactor server context singleton
- Refactor error handling
- Most errors are now gracefully sent to the FSD client directly encoded as an $ER packet,
enhancing visibility and debugging
- Most errors are now rightfully treated as non-fatal
- Refactor package/dependency graph
- Refactor calling conventions/interfaces for many packages
- Refactor database package
- Refactor post office
Features:
- Add VATSIM-esque HTTP/JSON "data feed"
- Add ephemeral in-memory database option
- Add user management REST API
- Add improved web interface
- Add MySQL support (drop SQLite support)
102 lines
2.5 KiB
Go
102 lines
2.5 KiB
Go
package protocol
|
|
|
|
import (
|
|
"github.com/go-playground/validator/v10"
|
|
"github.com/stretchr/testify/assert"
|
|
"strings"
|
|
"testing"
|
|
)
|
|
|
|
func TestAuthChallengeResponsePDU_Serialize(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
pdu *AuthChallengeResponsePDU
|
|
want string
|
|
}{
|
|
{
|
|
name: "Valid Serialization",
|
|
pdu: &AuthChallengeResponsePDU{
|
|
From: "SERVER",
|
|
To: "CLIENT",
|
|
ChallengeResponse: "0c4a96fa1cab961018620f120988cdf9",
|
|
},
|
|
want: "$ZRSERVER:CLIENT:0c4a96fa1cab961018620f120988cdf9\r\n",
|
|
},
|
|
}
|
|
|
|
V = validator.New()
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
result := test.pdu.Serialize()
|
|
assert.Equal(t, test.want, result)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestParseAuthChallengeResponsePDU(t *testing.T) {
|
|
V = validator.New(validator.WithRequiredStructEnabled())
|
|
|
|
tests := []struct {
|
|
name string
|
|
packet string
|
|
want *AuthChallengeResponsePDU
|
|
wantErr error
|
|
}{
|
|
{
|
|
name: "Valid Packet",
|
|
packet: "$ZRSERVER:CLIENT:0c4a96fa1cab961018620f120988cdf9\r\n",
|
|
want: &AuthChallengeResponsePDU{
|
|
From: "SERVER",
|
|
To: "CLIENT",
|
|
ChallengeResponse: "0c4a96fa1cab961018620f120988cdf9",
|
|
},
|
|
wantErr: nil,
|
|
},
|
|
{
|
|
name: "Missing From Field",
|
|
packet: "$ZR:CLIENT:0c4a96fa1cab961018620f120988cdf9\r\n",
|
|
want: &AuthChallengeResponsePDU{},
|
|
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
|
|
},
|
|
{
|
|
name: "Missing To Field",
|
|
packet: "$ZRSERVER::0c4a96fa1cab961018620f120988cdf9\r\n",
|
|
want: &AuthChallengeResponsePDU{},
|
|
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
|
|
},
|
|
{
|
|
name: "Challenge response not md5",
|
|
packet: "$ZRSERVER:CLIENT:0c4a96fa1cab9610\r\n",
|
|
want: &AuthChallengeResponsePDU{},
|
|
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
|
|
},
|
|
{
|
|
name: "Invalid Hexadecimal",
|
|
packet: "$ZRSERVER:CLIENT:ghij7890\r\n",
|
|
want: &AuthChallengeResponsePDU{},
|
|
wantErr: NewGenericFSDError(SyntaxError, "", "validation error"),
|
|
},
|
|
}
|
|
|
|
V = validator.New()
|
|
|
|
for _, tc := range tests {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
pdu := AuthChallengeResponsePDU{}
|
|
err := pdu.Parse(tc.packet)
|
|
assert.Equal(t, tc.want, &pdu)
|
|
|
|
// Check the error
|
|
if tc.wantErr != nil {
|
|
if strings.Contains(tc.wantErr.Error(), "validation error") {
|
|
assert.Contains(t, err.Error(), "validation error")
|
|
} else {
|
|
assert.EqualError(t, err, tc.wantErr.Error())
|
|
}
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
})
|
|
}
|
|
}
|