d775b2159a
This commit removes any assertion from Go's "testing" package, preferring instead to use an assertion from the testify package. All tests now have uniformity. This also decrease the number of iterations in the password generation test, decreasing test runtime tenfold Change-Id: I8799110e93dfa19bebe9050528e865b4c991c3df
102 lines
2.4 KiB
Go
102 lines
2.4 KiB
Go
package secret_test
|
|
|
|
import (
|
|
"math/rand"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"opendev.org/airship/airshipctl/pkg/secret"
|
|
)
|
|
|
|
const (
|
|
asciiLowers = "abcdefghijklmnopqrstuvwxyz"
|
|
asciiUppers = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
|
asciiNumbers = "0123456789"
|
|
asciiSymbols = "@#&-+=?"
|
|
|
|
defaultLength = 24
|
|
)
|
|
|
|
func TestDeterministicGenerateValidPassphrase(t *testing.T) {
|
|
assert := assert.New(t)
|
|
testSource := rand.NewSource(42)
|
|
engine := secret.NewPassphraseEngine(testSource)
|
|
|
|
// pre-calculated for rand.NewSource(42)
|
|
expectedPassphrases := []string{
|
|
"erx&97vfqd7LN3HJ?t@oPhds",
|
|
"##Xeuvf5Njy@hNWSaRoleFkf",
|
|
"jB=kirg7acIt-=fx1Fb-tZ+7",
|
|
"eOS#W8yoAljSThPL2oT&aUZu",
|
|
"vlaQqKr-jXSCJfXYnvGik3b1",
|
|
"rBKtHZkOmFUM75?c2UWiZjdh",
|
|
"9g?QV?w6BCWN2EKAc+dZ-Jun",
|
|
"X@IIyqAg7Mz@Wm8eRE6KMEf3",
|
|
"7JpQkLd3ufhj4bLB8S=ipjNP",
|
|
"XC?bDaHTa3mrBYLMG@#B=Q0B",
|
|
}
|
|
|
|
for i, expected := range expectedPassphrases {
|
|
actual := engine.GeneratePassphrase()
|
|
assert.Equal(expected, actual, "Test #%d failed", i)
|
|
}
|
|
}
|
|
|
|
func TestNondeterministicGenerateValidPassphrase(t *testing.T) {
|
|
assert := assert.New(t)
|
|
// Due to the nondeterminism of random number generators, this
|
|
// functionality is impossible to fully test. Let's just generate
|
|
// enough passphrases that we can be confident in the randomness.
|
|
// Fortunately, Go is pretty fast, so we can do upward of 10,000 of
|
|
// these without slowing down the test too much
|
|
charSets := []string{
|
|
asciiLowers,
|
|
asciiUppers,
|
|
asciiNumbers,
|
|
asciiSymbols,
|
|
}
|
|
|
|
engine := secret.NewPassphraseEngine(nil)
|
|
for i := 0; i < 10000; i++ {
|
|
passphrase := engine.GeneratePassphrase()
|
|
assert.Truef(len(passphrase) >= defaultLength,
|
|
"%s does not meet the length requirement", passphrase)
|
|
|
|
for _, charSet := range charSets {
|
|
assert.Truef(strings.ContainsAny(passphrase, charSet),
|
|
"%s does not contain any characters from [%s]",
|
|
passphrase, charSet)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestGenerateValidPassphraseN(t *testing.T) {
|
|
assert := assert.New(t)
|
|
testSource := rand.NewSource(42)
|
|
engine := secret.NewPassphraseEngine(testSource)
|
|
tests := []struct {
|
|
inputLegth int
|
|
expectedLength int
|
|
}{
|
|
{
|
|
inputLegth: 10,
|
|
expectedLength: defaultLength,
|
|
},
|
|
{
|
|
inputLegth: -5,
|
|
expectedLength: defaultLength,
|
|
},
|
|
{
|
|
inputLegth: 30,
|
|
expectedLength: 30,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
passphrase := engine.GeneratePassphraseN(tt.inputLegth)
|
|
assert.Len(passphrase, tt.expectedLength)
|
|
}
|
|
}
|