forked from mirrors/gotosocial
5e2bf0bdca
* [chore] Remove years from all license headers Years or year ranges aren't required in license headers. Many projects have removed them in recent years and it avoids a bit of yearly toil. In many cases our copyright claim was also a bit dodgy since we added the 2021-2023 header to files created after 2021 but you can't claim copyright into the past that way. * [chore] Add license header check This ensures a license header is always added to any new file. This avoids maintainers/reviewers needing to remember to check for and ask for it in case a contribution doesn't include it. * [chore] Add missing license headers * [chore] Further updates to license header * Use the more common // indentend comment format * Remove the hack we had for the linter now that we use the // format * Add SPDX license identifier
134 lines
4.4 KiB
Go
134 lines
4.4 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package validate_test
|
|
|
|
import (
|
|
"net"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/validate"
|
|
"github.com/superseriousbusiness/gotosocial/testrig"
|
|
)
|
|
|
|
func happyUser() *gtsmodel.User {
|
|
return >smodel.User{
|
|
ID: "01FE8TTK9F34BR0KG7639AJQTX",
|
|
Email: "whatever@example.org",
|
|
AccountID: "01FE8TWA7CN8J7237K5DFS1RY5",
|
|
Account: nil,
|
|
EncryptedPassword: "$2y$10$tkRapNGW.RWkEuCMWdgArunABFvsPGRvFQY3OibfSJo0RDL3z8WfC",
|
|
CreatedAt: time.Now(),
|
|
UpdatedAt: time.Now(),
|
|
SignUpIP: net.ParseIP("128.64.32.16"),
|
|
CurrentSignInAt: time.Now(),
|
|
CurrentSignInIP: net.ParseIP("128.64.32.16"),
|
|
LastSignInAt: time.Now(),
|
|
LastSignInIP: net.ParseIP("128.64.32.16"),
|
|
SignInCount: 0,
|
|
InviteID: "",
|
|
ChosenLanguages: []string{},
|
|
FilteredLanguages: []string{},
|
|
Locale: "en",
|
|
CreatedByApplicationID: "01FE8Y5EHMWCA1MHMTNHRVZ1X4",
|
|
CreatedByApplication: nil,
|
|
LastEmailedAt: time.Now(),
|
|
ConfirmationToken: "",
|
|
ConfirmedAt: time.Now(),
|
|
ConfirmationSentAt: time.Time{},
|
|
UnconfirmedEmail: "",
|
|
Moderator: testrig.FalseBool(),
|
|
Admin: testrig.FalseBool(),
|
|
Disabled: testrig.FalseBool(),
|
|
Approved: testrig.TrueBool(),
|
|
}
|
|
}
|
|
|
|
type UserValidateTestSuite struct {
|
|
suite.Suite
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserHappyPath() {
|
|
// no problem here
|
|
u := happyUser()
|
|
err := validate.Struct(u)
|
|
suite.NoError(err)
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserNoID() {
|
|
// user has no id set
|
|
u := happyUser()
|
|
u.ID = ""
|
|
|
|
err := validate.Struct(u)
|
|
suite.EqualError(err, "Key: 'User.ID' Error:Field validation for 'ID' failed on the 'required' tag")
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserNoEmail() {
|
|
// user has no email or unconfirmed email set
|
|
u := happyUser()
|
|
u.Email = ""
|
|
|
|
err := validate.Struct(u)
|
|
suite.EqualError(err, "Key: 'User.Email' Error:Field validation for 'Email' failed on the 'required_with' tag\nKey: 'User.UnconfirmedEmail' Error:Field validation for 'UnconfirmedEmail' failed on the 'required_without' tag")
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserOnlyUnconfirmedEmail() {
|
|
// user has only UnconfirmedEmail but ConfirmedAt is set
|
|
u := happyUser()
|
|
u.Email = ""
|
|
u.UnconfirmedEmail = "whatever@example.org"
|
|
|
|
err := validate.Struct(u)
|
|
suite.EqualError(err, "Key: 'User.Email' Error:Field validation for 'Email' failed on the 'required_with' tag")
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserOnlyUnconfirmedEmailOK() {
|
|
// user has only UnconfirmedEmail and ConfirmedAt is not set
|
|
u := happyUser()
|
|
u.Email = ""
|
|
u.UnconfirmedEmail = "whatever@example.org"
|
|
u.ConfirmedAt = time.Time{}
|
|
|
|
err := validate.Struct(u)
|
|
suite.NoError(err)
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserNoConfirmedAt() {
|
|
// user has Email but no ConfirmedAt
|
|
u := happyUser()
|
|
u.ConfirmedAt = time.Time{}
|
|
|
|
err := validate.Struct(u)
|
|
suite.EqualError(err, "Key: 'User.ConfirmedAt' Error:Field validation for 'ConfirmedAt' failed on the 'required_with' tag")
|
|
}
|
|
|
|
func (suite *UserValidateTestSuite) TestValidateUserUnlikelySignInCount() {
|
|
// user has Email but no ConfirmedAt
|
|
u := happyUser()
|
|
u.SignInCount = -69
|
|
|
|
err := validate.Struct(u)
|
|
suite.EqualError(err, "Key: 'User.SignInCount' Error:Field validation for 'SignInCount' failed on the 'min' tag")
|
|
}
|
|
|
|
func TestUserValidateTestSuite(t *testing.T) {
|
|
suite.Run(t, new(UserValidateTestSuite))
|
|
}
|