Added coverage tests to utils

This commit is contained in:
andronache
2020-11-12 17:17:27 +02:00
committed by Dan Christian Bogos
parent 6923d1675e
commit 811884db62
3 changed files with 97 additions and 1 deletions

View File

@@ -26,6 +26,8 @@ import (
"testing"
"time"
"golang.org/x/crypto/bcrypt"
"github.com/cgrates/rpcclient"
)
@@ -1512,9 +1514,74 @@ func TestIsURL(t *testing.T) {
}
}
func TestComputeHash(t *testing.T) {
func TestComputeHashError(t *testing.T) {
_, err := ComputeHash("test1;test2;test3")
if err != nil {
t.Errorf("Expecting: <nil>, received: %+v", err)
}
}
func TestComputeHashMatch(t *testing.T) {
lns, _ := ComputeHash("test1;test2;test3")
if err := VerifyHash(lns, "test1;test2;test3"); err != true {
t.Errorf("Expected <true> received: <%v>", err)
}
}
func TestVerifyHash(t *testing.T) {
lns, _ := ComputeHash("test1;test2;test3")
lns2, _ := ComputeHash("test1;test2;test3")
verify1 := VerifyHash(lns, "test1;test2;test3")
verify2 := bcrypt.CompareHashAndPassword([]byte(lns2), []byte(ConcatenatedKey("test1;test2;test3")))
verify3 := false
if verify2 == nil {
verify3 = true
}
if !reflect.DeepEqual(verify3, verify1) {
t.Errorf("Expecting: <%+v>, received: <%+v>", verify3, verify1)
}
}
func TestAESEncryptErrorNil(t *testing.T) {
encKey := "6368616e676520746869732070617373776f726420746f206120736563726574"
_, err := AESEncrypt("exampleText", encKey)
if err != nil {
t.Errorf("Expecting: <nil>, received: <%+v>", err)
}
}
func TestAESEncryptError1(t *testing.T) {
encKey := "1"
_, err := AESEncrypt("exampleText", encKey)
if err == nil || err.Error() != "crypto/aes: invalid key size 0" {
t.Errorf("Expecting error: <crypto/aes: invalid key size 0>, received: <%+v>", err)
}
}
func TestAESDecryptErrorNil(t *testing.T) {
encKey := "6368616e676520746869732070617373776f726420746f206120736563726574"
eString, _ := AESEncrypt("exampleText", encKey)
_, err := AESDecrypt(eString, encKey)
if err != nil {
t.Errorf("Expecting: <nil>, received: <%+v>", err)
}
}
func TestAESDecryptError1(t *testing.T) {
encKey := "1"
eString, _ := AESEncrypt("exampleText", encKey)
_, err := AESDecrypt(eString, encKey)
if err == nil || err.Error() != "crypto/aes: invalid key size 0" {
t.Errorf("Expecting: <crypto/aes: invalid key size 0>, received: <%+v>", err)
}
}
func TestAESEncryptDecrypt(t *testing.T) {
encKey := "6368616e676520746869732070617373776f726420746f206120736563726574"
eString, _ := AESEncrypt("exampleText", encKey)
dString, _ := AESDecrypt(eString, encKey)
if !reflect.DeepEqual("exampleText", dString) {
t.Errorf("Expecting: <exampleText>, received: <%+v>", dString)
}
}

View File

@@ -69,3 +69,10 @@ func TestRPCObjectPointer(t *testing.T) {
}
*/
}
func TestGetRpcParamsError(t *testing.T) {
_, err := GetRpcParams("exampleTest")
if err == nil || err.Error() != "NOT_FOUND" {
t.Errorf("Expected <NOT_FOUND>, received <%+v>", err)
}
}

View File

@@ -23,6 +23,7 @@ import (
"math"
"reflect"
"testing"
"time"
)
func TestRemoveWhiteSpaces(t *testing.T) {
@@ -91,3 +92,24 @@ func TestNewECDSAPubKeyFromReader(t *testing.T) {
t.Errorf("Expected error")
}
}
func TestNewECDSAPrvKeyError(t *testing.T) {
_, err := NewECDSAPrvKey("string", time.Duration(10))
if err == nil || err.Error() != "open string: no such file or directory" {
t.Errorf("Expected <open string: no such file or directory>, received <%v>", err)
}
}
func TestNewECDSAPubKeyError(t *testing.T) {
_, err := NewECDSAPubKey("string", time.Duration(10))
if err == nil || err.Error() != "open string: no such file or directory" {
t.Errorf("Expected <open string: no such file or directory>, received <%v>", err)
}
}
func TestGetReaderFromPathError(t *testing.T) {
_, err := GetReaderFromPath("string", time.Duration(10))
if err == nil || err.Error() != "open string: no such file or directory" {
t.Errorf("Expected <open string: no such file or directory>, received <%v>", err)
}
}