-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathauth_test.go
61 lines (57 loc) · 2.11 KB
/
auth_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
package main
import (
"io/ioutil"
"testing"
"github.com/stretchr/testify/require"
)
// it doesn't seem like SignalPair works when we need to test at this level.
/*
func TestWrongFingerprint(t *testing.T) {
// initTest(t)
failed := make(chan bool)
// create an unknown client
client, certificate, err := NewClient(false)
require.Nil(t, err, "Failed to create a new client %v", err)
peer, err := peers.NewPeer(&peers.Conf{Logger: Logger,
Certificate: certificate})
require.NoError(t, err, "NewPeer failed with: %s", err)
require.NotNil(t, peer, "NewPeer returned nil")
dc, err := client.CreateDataChannel("echo,Failed", nil)
require.NoError(t, err, "failed to create the a channel: %q", err)
dc.OnMessage(func(_ webrtc.DataChannelMessage) { failed <- true })
require.Nil(t, err, "failed to signal pair: %q", err)
select {
case <-time.After(3 * time.Second):
case <-failed:
t.Error("Data channel is opened even though no authentication")
}
// peers.Shutdown()
}
*/
func TestFirstTooken(t *testing.T) {
// create the token file and test good & bad tokens
initTest(t)
file, err := ioutil.TempFile("", "authorized_fingerprints")
require.NoError(t, err, "Failed to create a temp tokens file: %s", err)
defer file.Close()
a := NewFileAuth(file.Name())
require.NotNil(t, a, "NewFileAuth returned nil")
tokens, err := a.ReadAuthorizedTokens()
require.NoError(t, err, "ReadAuthorizedTokens failed with: %s", err)
require.Empty(t, tokens, "ReadAuthorizedTokens returned non-empty tokens")
require.False(t, a.IsAuthorized("GOODTOKEN"))
}
func TestIsAuthorized(t *testing.T) {
// create the token file and test good & bad tokens
initTest(t)
file, err := ioutil.TempFile("", "authorized_fingerprints")
require.NoError(t, err, "Failed to create a temp tokens file: %s", err)
file.WriteString("GOODTOKEN\nANOTHERGOODTOKEN\n")
file.Close()
a := NewFileAuth(file.Name())
require.True(t, a.IsAuthorized("GOODTOKEN"))
require.False(t, a.IsAuthorized("BADTOKEN"))
require.True(t, a.IsAuthorized("BADTOKEN", "GOODTOKEN"))
require.True(t, a.IsAuthorized("GOODTOKEN", "BADTOKEN"))
require.True(t, a.IsAuthorized("ANOTHERGOODTOKEN"))
}