mirror of
https://github.com/navidrome/navidrome.git
synced 2025-04-04 13:07:36 +03:00
More tests
This commit is contained in:
parent
3bedd89c17
commit
e3079d81ea
3 changed files with 138 additions and 1 deletions
|
@ -56,6 +56,7 @@ var _ = Describe("Auth", func() {
|
|||
Expect(parsed["token"]).ToNot(BeEmpty())
|
||||
})
|
||||
})
|
||||
|
||||
Describe("Login from HTTP headers", func() {
|
||||
fs := os.DirFS("tests/fixtures")
|
||||
|
||||
|
@ -133,8 +134,8 @@ var _ = Describe("Auth", func() {
|
|||
// Request Header authentication should not generate a JWT token
|
||||
Expect(parsed).ToNot(HaveKey("token"))
|
||||
})
|
||||
|
||||
})
|
||||
|
||||
Describe("login", func() {
|
||||
BeforeEach(func() {
|
||||
req = httptest.NewRequest("POST", "/login", strings.NewReader(`{"username":"janedoe", "password":"abc123"}`))
|
||||
|
@ -178,4 +179,47 @@ var _ = Describe("Auth", func() {
|
|||
Expect(w.Code).To(Equal(200))
|
||||
})
|
||||
})
|
||||
|
||||
Describe("validateIPAgainstList", func() {
|
||||
Context("when provided with empty inputs", func() {
|
||||
It("should return false", func() {
|
||||
Expect(validateIPAgainstList("", "")).To(BeFalse())
|
||||
Expect(validateIPAgainstList("192.168.1.1", "")).To(BeFalse())
|
||||
Expect(validateIPAgainstList("", "192.168.0.0/16")).To(BeFalse())
|
||||
})
|
||||
})
|
||||
|
||||
Context("when provided with invalid IP inputs", func() {
|
||||
It("should return false", func() {
|
||||
Expect(validateIPAgainstList("invalidIP", "192.168.0.0/16")).To(BeFalse())
|
||||
})
|
||||
})
|
||||
|
||||
Context("when provided with valid inputs", func() {
|
||||
It("should return true when IP is in the list", func() {
|
||||
Expect(validateIPAgainstList("192.168.1.1", "192.168.0.0/16,10.0.0.0/8")).To(BeTrue())
|
||||
Expect(validateIPAgainstList("10.0.0.1", "192.168.0.0/16,10.0.0.0/8")).To(BeTrue())
|
||||
})
|
||||
|
||||
It("should return false when IP is not in the list", func() {
|
||||
Expect(validateIPAgainstList("172.16.0.1", "192.168.0.0/16,10.0.0.0/8")).To(BeFalse())
|
||||
})
|
||||
})
|
||||
|
||||
Context("when provided with invalid CIDR notation in the list", func() {
|
||||
It("should ignore invalid CIDR and return the correct result", func() {
|
||||
Expect(validateIPAgainstList("192.168.1.1", "192.168.0.0/16,invalidCIDR")).To(BeTrue())
|
||||
Expect(validateIPAgainstList("10.0.0.1", "invalidCIDR,10.0.0.0/8")).To(BeTrue())
|
||||
Expect(validateIPAgainstList("172.16.0.1", "192.168.0.0/16,invalidCIDR")).To(BeFalse())
|
||||
})
|
||||
})
|
||||
|
||||
Context("when provided with IP:port format", func() {
|
||||
It("should handle IP:port format correctly", func() {
|
||||
Expect(validateIPAgainstList("192.168.1.1:8080", "192.168.0.0/16,10.0.0.0/8")).To(BeTrue())
|
||||
Expect(validateIPAgainstList("10.0.0.1:1234", "192.168.0.0/16,10.0.0.0/8")).To(BeTrue())
|
||||
Expect(validateIPAgainstList("172.16.0.1:9999", "192.168.0.0/16,10.0.0.0/8")).To(BeFalse())
|
||||
})
|
||||
})
|
||||
})
|
||||
})
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue