maddy/internal/auth/auth_test.go
fox.cpp bf188e454f
Move most code from the repo root into subdirectories
The intention is to keep to repo root clean while the list of packages
is slowly growing.

Additionally, a bunch of small (~30 LoC) files in the repo root is
merged into a single maddy.go file, for the same reason.

Most of the internal code is moved into the internal/ directory. Go
toolchain will make it impossible to import these packages from external
applications.

Some packages are renamed and moved into the pkg/ directory in the root.
According to https://github.com/golang-standards/project-layout this is
the de-facto standard to place "library code that's ok to use by
external applications" in.

To clearly define the purpose of top-level directories, README.md files
are added to each.
2019-12-06 01:35:12 +03:00

75 lines
1.7 KiB
Go

package auth
import (
"fmt"
"testing"
)
func TestCheckDomainAuth(t *testing.T) {
cases := []struct {
rawUsername string
perDomain bool
allowedDomains []string
loginName string
}{
{
rawUsername: "username",
loginName: "username",
},
{
rawUsername: "username",
allowedDomains: []string{"example.org"},
loginName: "username",
},
{
rawUsername: "username@example.org",
allowedDomains: []string{"example.org"},
loginName: "username",
},
{
rawUsername: "username@example.com",
allowedDomains: []string{"example.org"},
},
{
rawUsername: "username",
allowedDomains: []string{"example.org"},
perDomain: true,
},
{
rawUsername: "username@example.com",
allowedDomains: []string{"example.org"},
perDomain: true,
},
{
rawUsername: "username@EXAMPLE.Org",
allowedDomains: []string{"exaMPle.org"},
perDomain: true,
loginName: "username@EXAMPLE.Org",
},
{
rawUsername: "username@example.org",
allowedDomains: []string{"example.org"},
perDomain: true,
loginName: "username@example.org",
},
}
for _, case_ := range cases {
case_ := case_
t.Run(fmt.Sprintf("%+v", case_), func(t *testing.T) {
loginName, allowed := CheckDomainAuth(case_.rawUsername, case_.perDomain, case_.allowedDomains)
if case_.loginName != "" && !allowed {
t.Fatalf("Unexpected authentication fail")
}
if case_.loginName == "" && allowed {
t.Fatalf("Expected authentication fail, got %s as login name", loginName)
}
if loginName != case_.loginName {
t.Errorf("Incorrect login name, got %s, wanted %s", loginName, case_.loginName)
}
})
}
}