chore: add sign in tests
All checks were successful
Build and Push Docker Image / Explore-Gitea-Actions (push) Successful in 54s
All checks were successful
Build and Push Docker Image / Explore-Gitea-Actions (push) Successful in 54s
This commit was merged in pull request #188.
This commit is contained in:
@@ -1,6 +1,7 @@
|
|||||||
package handler
|
package handler
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"me-fit/db"
|
||||||
"me-fit/middleware"
|
"me-fit/middleware"
|
||||||
"me-fit/service"
|
"me-fit/service"
|
||||||
|
|
||||||
@@ -8,17 +9,17 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
)
|
)
|
||||||
|
|
||||||
func GetHandler(db *sql.DB) http.Handler {
|
func GetHandler(d *sql.DB) http.Handler {
|
||||||
var router = http.NewServeMux()
|
var router = http.NewServeMux()
|
||||||
|
|
||||||
router.HandleFunc("/", service.HandleIndexAnd404(db))
|
router.HandleFunc("/", service.HandleIndexAnd404(d))
|
||||||
|
|
||||||
handlerAuth := NewHandlerAuth(db, service.NewServiceAuthImpl(db))
|
handlerAuth := NewHandlerAuth(d, service.NewServiceAuthImpl(db.NewDbAuthSqlite(d)))
|
||||||
|
|
||||||
// Serve static files (CSS, JS and images)
|
// Serve static files (CSS, JS and images)
|
||||||
router.Handle("/static/", http.StripPrefix("/static/", http.FileServer(http.Dir("./static/"))))
|
router.Handle("/static/", http.StripPrefix("/static/", http.FileServer(http.Dir("./static/"))))
|
||||||
|
|
||||||
handleWorkout(db, router)
|
handleWorkout(d, router)
|
||||||
|
|
||||||
handlerAuth.handle(router)
|
handlerAuth.handle(router)
|
||||||
|
|
||||||
|
|||||||
@@ -51,9 +51,9 @@ type ServiceAuthImpl struct {
|
|||||||
dbAuth db.DbAuth
|
dbAuth db.DbAuth
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServiceAuthImpl(d *sql.DB) *ServiceAuthImpl {
|
func NewServiceAuthImpl(dbAuth db.DbAuth) *ServiceAuthImpl {
|
||||||
return &ServiceAuthImpl{
|
return &ServiceAuthImpl{
|
||||||
dbAuth: db.NewDbAuthSqlite(d),
|
dbAuth: dbAuth,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -64,7 +64,7 @@ func (service ServiceAuthImpl) SignIn(email string, password string) (*User, err
|
|||||||
if errors.Is(err, db.ErrUserNotFound) {
|
if errors.Is(err, db.ErrUserNotFound) {
|
||||||
return nil, ErrInvaidCredentials
|
return nil, ErrInvaidCredentials
|
||||||
} else {
|
} else {
|
||||||
return nil, err
|
return nil, types.ErrInternal
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
107
service/auth_test.go
Normal file
107
service/auth_test.go
Normal file
@@ -0,0 +1,107 @@
|
|||||||
|
package service
|
||||||
|
|
||||||
|
import (
|
||||||
|
"me-fit/db"
|
||||||
|
"me-fit/types"
|
||||||
|
|
||||||
|
"errors"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DbAuthStub struct {
|
||||||
|
user *db.User
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d DbAuthStub) GetUser(email string) (*db.User, error) {
|
||||||
|
return d.user, d.err
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSignIn(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
t.Run("should return user if password is correct", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
salt := []byte("salt")
|
||||||
|
stub := DbAuthStub{
|
||||||
|
user: db.NewUser(
|
||||||
|
uuid.New(),
|
||||||
|
"test@test.de",
|
||||||
|
true,
|
||||||
|
time.Date(2020, 1, 2, 0, 0, 0, 0, time.UTC),
|
||||||
|
false,
|
||||||
|
getHashPassword("password", salt),
|
||||||
|
salt,
|
||||||
|
time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC),
|
||||||
|
),
|
||||||
|
err: nil,
|
||||||
|
}
|
||||||
|
underTest := NewServiceAuthImpl(stub)
|
||||||
|
|
||||||
|
actualUser, err := underTest.SignIn("test@test.de", "password")
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Expected nil, got %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
expectedUser := User{
|
||||||
|
Id: stub.user.Id,
|
||||||
|
Email: stub.user.Email,
|
||||||
|
EmailVerified: stub.user.EmailVerified,
|
||||||
|
}
|
||||||
|
if *actualUser != expectedUser {
|
||||||
|
t.Errorf("Expected %v, got %v", expectedUser, actualUser)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("should return ErrInvalidCretentials if password is not correct", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
salt := []byte("salt")
|
||||||
|
stub := DbAuthStub{
|
||||||
|
user: db.NewUser(
|
||||||
|
uuid.New(),
|
||||||
|
"test@test.de",
|
||||||
|
true,
|
||||||
|
time.Date(2020, 1, 2, 0, 0, 0, 0, time.UTC),
|
||||||
|
false,
|
||||||
|
getHashPassword("password", salt),
|
||||||
|
salt,
|
||||||
|
time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC),
|
||||||
|
),
|
||||||
|
err: nil,
|
||||||
|
}
|
||||||
|
underTest := NewServiceAuthImpl(stub)
|
||||||
|
|
||||||
|
_, err := underTest.SignIn("test@test.de", "wrong password")
|
||||||
|
if err != ErrInvaidCredentials {
|
||||||
|
t.Errorf("Expected %v, got %v", ErrInvaidCredentials, err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
t.Run("should return ErrInvalidCretentials if user has not been found", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
stub := DbAuthStub{
|
||||||
|
user: nil,
|
||||||
|
err: db.ErrUserNotFound,
|
||||||
|
}
|
||||||
|
underTest := NewServiceAuthImpl(stub)
|
||||||
|
|
||||||
|
_, err := underTest.SignIn("test", "test")
|
||||||
|
if err != ErrInvaidCredentials {
|
||||||
|
t.Errorf("Expected %v, got %v", ErrInvaidCredentials, err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
t.Run("should forward ErrInternal on any other error", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
stub := DbAuthStub{
|
||||||
|
user: nil,
|
||||||
|
err: errors.New("Some error"),
|
||||||
|
}
|
||||||
|
underTest := NewServiceAuthImpl(stub)
|
||||||
|
|
||||||
|
_, err := underTest.SignIn("test", "test")
|
||||||
|
if err != types.ErrInternal {
|
||||||
|
t.Errorf("Expected %v, got %v", types.ErrInternal, err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user