tests working locally

This commit is contained in:
afeiszli
2021-05-28 10:04:07 -04:00
parent 8e9a0b46aa
commit 4e758d67aa
10 changed files with 54 additions and 31 deletions
+1 -1
View File
@@ -80,7 +80,7 @@ func api(t *testing.T, data interface{}, method, url, authorization string) (*ht
}
func addAdmin(t *testing.T) {
var admin models.User
var admin models.UserAuthParams
admin.UserName = "admin"
admin.Password = "password"
response, err := api(t, admin, http.MethodPost, baseURL+"/api/users/adm/createadmin", "secretkey")
+12 -12
View File
@@ -26,7 +26,7 @@ func TestCreateNetwork(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Contains(t, "ou are unauthorized to access this endpoint", message.Message)
assert.Contains(t, message.Message, "ou are unauthorized to access this endpoint")
})
t.Run("CreateNetwork", func(t *testing.T) {
response, err := api(t, network, http.MethodPost, baseURL+"/api/networks", "secretkey")
@@ -73,7 +73,7 @@ func TestGetNetworks(t *testing.T) {
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Contains(t, "ou are unauthorized to access this endpoint", message.Message)
assert.Contains(t, message.Message, "ou are unauthorized to access this endpoint")
})
}
@@ -99,7 +99,7 @@ func TestGetNetwork(t *testing.T) {
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Contains(t, "ou are unauthorized to access this endpoint", message.Message)
assert.Contains(t, message.Message, "ou are unauthorized to access this endpoint")
})
t.Run("InvalidNetwork", func(t *testing.T) {
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/badnetwork", "secretkey")
@@ -108,7 +108,7 @@ func TestGetNetwork(t *testing.T) {
var message models.ErrorResponse
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Contains(t, "his network does not exist", message.Message)
assert.Contains(t, message.Message, "his network does not exist")
assert.Equal(t, http.StatusNotFound, response.StatusCode)
})
}
@@ -125,7 +125,7 @@ func TestDeleteNetwork(t *testing.T) {
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Contains(t, "You are unauthorized to access this endpoint", message.Message)
assert.Contains(t, message.Message, "You are unauthorized to access this endpoint")
})
t.Run("Badnetwork", func(t *testing.T) {
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/badnetwork", "secretkey")
@@ -134,7 +134,7 @@ func TestDeleteNetwork(t *testing.T) {
var message models.ErrorResponse
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Contains(t, "his network does not exist", message.Message)
assert.Contains(t, message.Message, "his network does not exist")
assert.Equal(t, http.StatusNotFound, response.StatusCode)
})
t.Run("NodesExist", func(t *testing.T) {
@@ -147,7 +147,7 @@ func TestDeleteNetwork(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Contains(t, message.Message, "Node check failed")
assert.Equal(t, http.StatusBadRequest, message.Code)
assert.Equal(t, http.StatusForbidden, message.Code)
})
t.Run("ValidKey", func(t *testing.T) {
type Message struct {
@@ -222,7 +222,7 @@ func TestCreateKey(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Contains(t, "ou are unauthorized to access this endpoint", message.Message)
assert.Contains(t, message.Message, "ou are unauthorized to access this endpoint")
})
t.Run("Badnetwork", func(t *testing.T) {
response, err := api(t, key, http.MethodPost, baseURL+"/api/networks/badnetwork/keys", "secretkey")
@@ -231,7 +231,7 @@ func TestCreateKey(t *testing.T) {
var message models.ErrorResponse
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Contains(t, "his network does not exist", message.Message)
assert.Contains(t, message.Message, "his network does not exist")
assert.Equal(t, http.StatusNotFound, response.StatusCode)
})
}
@@ -265,7 +265,7 @@ func TestDeleteKey(t *testing.T) {
var message models.ErrorResponse
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Contains(t, "his network does not exist", message.Message)
assert.Contains(t, message.Message, "his network does not exist")
assert.Equal(t, http.StatusNotFound, response.StatusCode)
})
t.Run("InvalidCredentials", func(t *testing.T) {
@@ -351,8 +351,8 @@ func TestUpdateNetwork(t *testing.T) {
var message models.ErrorResponse
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Contains(t, message.Message, "his network does not exist.")
assert.Equal(t, http.StatusNotFound, message.Code)
assert.Contains(t, message.Message, "his network does not exist")
assert.Equal(t, http.StatusNotFound, response.StatusCode)
})
t.Run("UpdateAddress", func(t *testing.T) {
+5 -5
View File
@@ -400,7 +400,7 @@ func TestCreateNode(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusBadRequest, message.Code)
assert.Contains(t, message.Message, "Field validation for 'MacAddress' failed on the 'macaddress_valid' tag")
assert.Contains(t, message.Message, "Field validation for 'MacAddress' failed on the 'ma")
})
t.Run("BadPublicKey", func(t *testing.T) {
var node models.Node
@@ -501,7 +501,7 @@ func TestCreateNode(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusNotFound, message.Code)
assert.Contains(t, "etwork does not exist", message.Message)
assert.Contains(t, message.Message, "etwork does not exist")
})
t.Run("Valid", func(t *testing.T) {
deleteNetworks(t)
@@ -561,7 +561,7 @@ func TestNodeAuthenticate(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusOK, message.Code)
assert.Contains(t, "Device 01:02:03:04:05:06 Authorized", message.Message)
assert.Contains(t, message.Message, "Device 01:02:03:04:05:06 Authorized")
})
t.Run("MacEmpty", func(t *testing.T) {
var authRequest models.AuthParams
@@ -575,7 +575,7 @@ func TestNodeAuthenticate(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusBadRequest, message.Code)
assert.Contains(t, "acAddress can't be empty", message.Message)
assert.Contains(t, message.Message, "acAddress can't be empty")
})
t.Run("EmptyPass", func(t *testing.T) {
var authRequest models.AuthParams
@@ -589,7 +589,7 @@ func TestNodeAuthenticate(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusBadRequest, message.Code)
assert.Equal(t, "assword can't be empty", message.Message)
assert.Contains(t, message.Message, "assword can't be empty")
})
t.Run("BadPass", func(t *testing.T) {
var authRequest models.AuthParams
+3 -3
View File
@@ -40,7 +40,7 @@ func TestAdminCreation(t *testing.T) {
err = json.NewDecoder(response.Body).Decode(&message)
assert.Nil(t, err, err)
assert.Equal(t, http.StatusBadRequest, response.StatusCode)
assert.Equal(t, "W1R3: Admin already exists! ", message.Message)
assert.Contains(t, message.Message, "Admin already Exists")
})
}
@@ -69,7 +69,7 @@ func TestGetUser(t *testing.T) {
assert.Nil(t, err, err)
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
assert.Equal(t, http.StatusUnauthorized, message.Code)
assert.Equal(t, "token contains an invalid number of segments", message.Message)
assert.Contains(t, message.Message, "Error Verifying Auth Token")
})
}
@@ -207,7 +207,7 @@ func TestAuthenticateUser(t *testing.T) {
}
for _, tc := range cases {
t.Run(tc.testname, func(t *testing.T) {
var admin models.User
var admin models.UserAuthParams
admin.UserName = tc.name
admin.Password = tc.password
response, err := api(t, admin, http.MethodPost, "http://localhost:8081/api/users/adm/authenticate", "secretkey")