-
Notifications
You must be signed in to change notification settings - Fork 85
/
auth_test.go
106 lines (94 loc) · 2.62 KB
/
auth_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
package main
import (
"net"
"testing"
)
func TestParseUserPasswd(t *testing.T) {
testData := []struct {
val string
user string
au *authUser
}{
{"foo:bar", "foo", &authUser{"bar", "", 0}},
{"foo:bar:-1", "", nil},
{"hello:world:", "hello", &authUser{"world", "", 0}},
{"hello:world:0", "", nil},
{"hello:world:1024", "hello", &authUser{"world", "", 1024}},
{"hello:world:65535", "hello", &authUser{"world", "", 65535}},
}
for _, td := range testData {
user, au, err := parseUserPasswd(td.val)
if td.au == nil {
if err == nil {
t.Error(td.val, "should return error")
}
continue
}
if td.user != user {
t.Error(td.val, "user should be:", td.user, "got:", user)
}
if td.au.passwd != au.passwd {
t.Error(td.val, "passwd should be:", td.au.passwd, "got:", au.passwd)
}
if td.au.port != au.port {
t.Error(td.val, "port should be:", td.au.port, "got:", au.port)
}
}
}
func TestCalcDigest(t *testing.T) {
a1 := md5sum("cyf" + ":" + authRealm + ":" + "wlx")
auth := map[string]string{
"nonce": "50ed159c3b707061418bbb14",
"nc": "00000001",
"cnonce": "6c46874228c087eb",
"uri": "/",
}
const targetDigest = "c51dbb53e998cb7d68794574e60f8ea0"
digest := calcRequestDigest(auth, a1, "GET")
if digest != targetDigest {
t.Errorf("authentication digest calculation wrong, got: %s, should be: %s\n", digest, targetDigest)
}
}
func TestParseAllowedClient(t *testing.T) {
parseAllowedClient("") // this should not cause error
parseAllowedClient("192.168.1.1/16, 192.169.1.2")
na := &auth.allowedClient[0]
if !na.ip.Equal(net.ParseIP("192.168.0.0")) {
t.Error("ParseAllowedClient 192.168.1.1/16 ip error, got ip:", na.ip)
}
mask := []byte(na.mask)
if mask[0] != 0xff || mask[1] != 0xff || mask[2] != 0 || mask[3] != 0 {
t.Error("ParseAllowedClient 192.168.1.1/16 mask error")
}
na = &auth.allowedClient[1]
if !na.ip.Equal(net.ParseIP("192.169.1.2")) {
t.Error("ParseAllowedClient 192.169.1.2 ip error")
}
mask = []byte(na.mask)
if mask[0] != 0xff || mask[1] != 0xff || mask[2] != 0xff || mask[3] != 0xff {
t.Error("ParseAllowedClient 192.169.1.2 mask error")
}
}
func TestAuthIP(t *testing.T) {
parseAllowedClient("192.168.0.0/16, 192.169.2.1, 10.0.0.0/8, 8.8.8.8")
var testData = []struct {
ip string
allowed bool
}{
{"10.1.2.3", true},
{"192.168.1.2", true},
{"192.169.2.1", true},
{"192.169.2.2", false},
{"8.8.8.8", true},
{"1.2.3.4", false},
}
for _, td := range testData {
if authIP(td.ip) != td.allowed {
if td.allowed {
t.Errorf("%s should be allowed\n", td.ip)
} else {
t.Errorf("%s should NOT be allowed\n", td.ip)
}
}
}
}