mirror of
https://github.com/EchoVault/SugarDB.git
synced 2025-10-05 16:06:57 +08:00
Moved AUTH command from the acl module to the connection module. Added echo command to the list of commands that are skipped on ACL authorization.
This commit is contained in:
@@ -325,8 +325,8 @@ func (acl *ACL) AuthorizeConnection(conn *net.Conn, cmd []string, command intern
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Skip PING
|
// Skip certain commands from authorization
|
||||||
if strings.EqualFold(comm, "ping") {
|
if slices.Contains([]string{"ping", "echo"}, strings.ToLower(comm)) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -28,23 +28,6 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
)
|
)
|
||||||
|
|
||||||
func handleAuth(params internal.HandlerFuncParams) ([]byte, error) {
|
|
||||||
if len(params.Command) < 2 || len(params.Command) > 3 {
|
|
||||||
return nil, errors.New(constants.WrongArgsResponse)
|
|
||||||
}
|
|
||||||
acl, ok := params.GetACL().(*ACL)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("could not load ACL")
|
|
||||||
}
|
|
||||||
acl.LockUsers()
|
|
||||||
defer acl.UnlockUsers()
|
|
||||||
|
|
||||||
if err := acl.AuthenticateConnection(params.Context, params.Connection, params.Command); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return []byte(constants.OkResponse), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func handleCat(params internal.HandlerFuncParams) ([]byte, error) {
|
func handleCat(params internal.HandlerFuncParams) ([]byte, error) {
|
||||||
if len(params.Command) > 3 {
|
if len(params.Command) > 3 {
|
||||||
return nil, errors.New(constants.WrongArgsResponse)
|
return nil, errors.New(constants.WrongArgsResponse)
|
||||||
@@ -496,23 +479,6 @@ func handleSave(params internal.HandlerFuncParams) ([]byte, error) {
|
|||||||
|
|
||||||
func Commands() []internal.Command {
|
func Commands() []internal.Command {
|
||||||
return []internal.Command{
|
return []internal.Command{
|
||||||
{
|
|
||||||
Command: "auth",
|
|
||||||
Module: constants.ACLModule,
|
|
||||||
Categories: []string{constants.ConnectionCategory, constants.SlowCategory},
|
|
||||||
Description: `(AUTH [username] password)
|
|
||||||
Authenticates the connection. If the username is not provided, the connection will be authenticated against the
|
|
||||||
default ACL user. Otherwise, it is authenticated against the ACL user with the provided username.`,
|
|
||||||
Sync: false,
|
|
||||||
KeyExtractionFunc: func(cmd []string) (internal.KeyExtractionFuncResult, error) {
|
|
||||||
return internal.KeyExtractionFuncResult{
|
|
||||||
Channels: make([]string, 0),
|
|
||||||
ReadKeys: make([]string, 0),
|
|
||||||
WriteKeys: make([]string, 0),
|
|
||||||
}, nil
|
|
||||||
},
|
|
||||||
HandlerFunc: handleAuth,
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
Command: "acl",
|
Command: "acl",
|
||||||
Module: constants.ACLModule,
|
Module: constants.ACLModule,
|
||||||
|
@@ -176,135 +176,6 @@ func Test_ACL(t *testing.T) {
|
|||||||
mockServer.ShutDown()
|
mockServer.ShutDown()
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("Test_HandleAuth", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
conn, err := internal.GetConnection("localhost", port)
|
|
||||||
if err != nil {
|
|
||||||
t.Error(err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
if conn != nil {
|
|
||||||
_ = conn.Close()
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
r := resp.NewConn(conn)
|
|
||||||
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
cmd []resp.Value
|
|
||||||
wantRes string
|
|
||||||
wantErr string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
name: "1. Authenticate with default user without specifying username",
|
|
||||||
cmd: []resp.Value{resp.StringValue("AUTH"), resp.StringValue("password1")},
|
|
||||||
wantRes: "OK",
|
|
||||||
wantErr: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "2. Authenticate with plaintext password",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("with_password_user"),
|
|
||||||
resp.StringValue("password2"),
|
|
||||||
},
|
|
||||||
wantRes: "OK",
|
|
||||||
wantErr: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "3. Authenticate with SHA256 password",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("with_password_user"),
|
|
||||||
resp.StringValue("password3"),
|
|
||||||
},
|
|
||||||
wantRes: "OK",
|
|
||||||
wantErr: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "4. Authenticate with no password user",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("no_password_user"),
|
|
||||||
resp.StringValue("password4"),
|
|
||||||
},
|
|
||||||
wantRes: "OK",
|
|
||||||
wantErr: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "5. Fail to authenticate with disabled user",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("disabled_user"),
|
|
||||||
resp.StringValue("password5"),
|
|
||||||
},
|
|
||||||
wantRes: "",
|
|
||||||
wantErr: "Error user disabled_user is disabled",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "6. Fail to authenticate with non-existent user",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("non_existent_user"),
|
|
||||||
resp.StringValue("password6"),
|
|
||||||
},
|
|
||||||
wantRes: "",
|
|
||||||
wantErr: "Error no user with username non_existent_user",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "7. Fail to authenticate with the wrong password",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("with_password_user"),
|
|
||||||
resp.StringValue("wrong_password"),
|
|
||||||
},
|
|
||||||
wantRes: "",
|
|
||||||
wantErr: "Error could not authenticate user",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "8. Command too short",
|
|
||||||
cmd: []resp.Value{resp.StringValue("AUTH")},
|
|
||||||
wantRes: "",
|
|
||||||
wantErr: fmt.Sprintf("Error %s", constants.WrongArgsResponse),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "9. Command too long",
|
|
||||||
cmd: []resp.Value{
|
|
||||||
resp.StringValue("AUTH"),
|
|
||||||
resp.StringValue("user"),
|
|
||||||
resp.StringValue("password1"),
|
|
||||||
resp.StringValue("password2"),
|
|
||||||
},
|
|
||||||
wantRes: "",
|
|
||||||
wantErr: fmt.Sprintf("Error %s", constants.WrongArgsResponse),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, test := range tests {
|
|
||||||
t.Run(test.name, func(t *testing.T) {
|
|
||||||
if err = r.WriteArray(test.cmd); err != nil {
|
|
||||||
t.Error(err)
|
|
||||||
}
|
|
||||||
rv, _, err := r.ReadValue()
|
|
||||||
if err != nil {
|
|
||||||
t.Error(err)
|
|
||||||
}
|
|
||||||
if test.wantErr != "" {
|
|
||||||
if rv.Error().Error() != test.wantErr {
|
|
||||||
t.Errorf("expected error response \"%s\", got \"%s\"", test.wantErr, rv.Error().Error())
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if rv.String() != test.wantRes {
|
|
||||||
t.Errorf("expected response \"%s\", got \"%s\"", test.wantRes, rv.String())
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("Test_Permissions", func(t *testing.T) {
|
t.Run("Test_Permissions", func(t *testing.T) {
|
||||||
port, err := internal.GetFreePort()
|
port, err := internal.GetFreePort()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@@ -25,6 +25,23 @@ import (
|
|||||||
"github.com/echovault/echovault/internal/constants"
|
"github.com/echovault/echovault/internal/constants"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func handleAuth(params internal.HandlerFuncParams) ([]byte, error) {
|
||||||
|
if len(params.Command) < 2 || len(params.Command) > 3 {
|
||||||
|
return nil, errors.New(constants.WrongArgsResponse)
|
||||||
|
}
|
||||||
|
accessControlList, ok := params.GetACL().(*acl.ACL)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not load ACL")
|
||||||
|
}
|
||||||
|
accessControlList.LockUsers()
|
||||||
|
defer accessControlList.UnlockUsers()
|
||||||
|
|
||||||
|
if err := accessControlList.AuthenticateConnection(params.Context, params.Connection, params.Command); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return []byte(constants.OkResponse), nil
|
||||||
|
}
|
||||||
|
|
||||||
func handlePing(params internal.HandlerFuncParams) ([]byte, error) {
|
func handlePing(params internal.HandlerFuncParams) ([]byte, error) {
|
||||||
switch len(params.Command) {
|
switch len(params.Command) {
|
||||||
default:
|
default:
|
||||||
@@ -112,6 +129,23 @@ func handleHello(params internal.HandlerFuncParams) ([]byte, error) {
|
|||||||
|
|
||||||
func Commands() []internal.Command {
|
func Commands() []internal.Command {
|
||||||
return []internal.Command{
|
return []internal.Command{
|
||||||
|
{
|
||||||
|
Command: "auth",
|
||||||
|
Module: constants.ConnectionModule,
|
||||||
|
Categories: []string{constants.ConnectionCategory, constants.SlowCategory},
|
||||||
|
Description: `(AUTH [username] password)
|
||||||
|
Authenticates the connection. If the username is not provided, the connection will be authenticated against the
|
||||||
|
default ACL user. Otherwise, it is authenticated against the ACL user with the provided username.`,
|
||||||
|
Sync: false,
|
||||||
|
KeyExtractionFunc: func(cmd []string) (internal.KeyExtractionFuncResult, error) {
|
||||||
|
return internal.KeyExtractionFuncResult{
|
||||||
|
Channels: make([]string, 0),
|
||||||
|
ReadKeys: make([]string, 0),
|
||||||
|
WriteKeys: make([]string, 0),
|
||||||
|
}, nil
|
||||||
|
},
|
||||||
|
HandlerFunc: handleAuth,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
Command: "ping",
|
Command: "ping",
|
||||||
Module: constants.ConnectionModule,
|
Module: constants.ConnectionModule,
|
||||||
|
@@ -15,7 +15,10 @@
|
|||||||
package connection_test
|
package connection_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/sha256"
|
||||||
|
"encoding/hex"
|
||||||
"errors"
|
"errors"
|
||||||
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
@@ -26,6 +29,67 @@ import (
|
|||||||
"github.com/tidwall/resp"
|
"github.com/tidwall/resp"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func setUpServer(port int, requirePass bool, aclConfig string) (*echovault.EchoVault, error) {
|
||||||
|
conf := config.Config{
|
||||||
|
BindAddr: "localhost",
|
||||||
|
Port: uint16(port),
|
||||||
|
DataDir: "",
|
||||||
|
EvictionPolicy: constants.NoEviction,
|
||||||
|
RequirePass: requirePass,
|
||||||
|
Password: "password1",
|
||||||
|
AclConfig: aclConfig,
|
||||||
|
}
|
||||||
|
|
||||||
|
mockServer, err := echovault.NewEchoVault(
|
||||||
|
echovault.WithConfig(conf),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add the initial test users to the ACL module.
|
||||||
|
for _, user := range generateInitialTestUsers() {
|
||||||
|
if _, err := mockServer.ACLSetUser(user); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return mockServer, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateInitialTestUsers() []echovault.User {
|
||||||
|
return []echovault.User{
|
||||||
|
{
|
||||||
|
// User with both hash password and plaintext password.
|
||||||
|
Username: "with_password_user",
|
||||||
|
Enabled: true,
|
||||||
|
IncludeCategories: []string{"*"},
|
||||||
|
IncludeCommands: []string{"*"},
|
||||||
|
AddPlainPasswords: []string{"password2"},
|
||||||
|
AddHashPasswords: []string{generateSHA256Password("password3")},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// User with NoPassword option.
|
||||||
|
Username: "no_password_user",
|
||||||
|
Enabled: true,
|
||||||
|
NoPassword: true,
|
||||||
|
AddPlainPasswords: []string{"password4"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// Disabled user.
|
||||||
|
Username: "disabled_user",
|
||||||
|
Enabled: false,
|
||||||
|
AddPlainPasswords: []string{"password5"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateSHA256Password(plain string) string {
|
||||||
|
h := sha256.New()
|
||||||
|
h.Write([]byte(plain))
|
||||||
|
return hex.EncodeToString(h.Sum(nil))
|
||||||
|
}
|
||||||
|
|
||||||
func Test_Connection(t *testing.T) {
|
func Test_Connection(t *testing.T) {
|
||||||
port, err := internal.GetFreePort()
|
port, err := internal.GetFreePort()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -33,14 +97,7 @@ func Test_Connection(t *testing.T) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
mockServer, err := echovault.NewEchoVault(
|
mockServer, err := setUpServer(port, true, "")
|
||||||
echovault.WithConfig(config.Config{
|
|
||||||
DataDir: "",
|
|
||||||
EvictionPolicy: constants.NoEviction,
|
|
||||||
BindAddr: "localhost",
|
|
||||||
Port: uint16(port),
|
|
||||||
}),
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Error(err)
|
t.Error(err)
|
||||||
return
|
return
|
||||||
@@ -54,6 +111,135 @@ func Test_Connection(t *testing.T) {
|
|||||||
mockServer.ShutDown()
|
mockServer.ShutDown()
|
||||||
})
|
})
|
||||||
|
|
||||||
|
t.Run("Test_HandleAuth", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
conn, err := internal.GetConnection("localhost", port)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if conn != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
r := resp.NewConn(conn)
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
cmd []resp.Value
|
||||||
|
wantRes string
|
||||||
|
wantErr string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "1. Authenticate with default user without specifying username",
|
||||||
|
cmd: []resp.Value{resp.StringValue("AUTH"), resp.StringValue("password1")},
|
||||||
|
wantRes: "OK",
|
||||||
|
wantErr: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "2. Authenticate with plaintext password",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("with_password_user"),
|
||||||
|
resp.StringValue("password2"),
|
||||||
|
},
|
||||||
|
wantRes: "OK",
|
||||||
|
wantErr: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "3. Authenticate with SHA256 password",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("with_password_user"),
|
||||||
|
resp.StringValue("password3"),
|
||||||
|
},
|
||||||
|
wantRes: "OK",
|
||||||
|
wantErr: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "4. Authenticate with no password user",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("no_password_user"),
|
||||||
|
resp.StringValue("password4"),
|
||||||
|
},
|
||||||
|
wantRes: "OK",
|
||||||
|
wantErr: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "5. Fail to authenticate with disabled user",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("disabled_user"),
|
||||||
|
resp.StringValue("password5"),
|
||||||
|
},
|
||||||
|
wantRes: "",
|
||||||
|
wantErr: "Error user disabled_user is disabled",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "6. Fail to authenticate with non-existent user",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("non_existent_user"),
|
||||||
|
resp.StringValue("password6"),
|
||||||
|
},
|
||||||
|
wantRes: "",
|
||||||
|
wantErr: "Error no user with username non_existent_user",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "7. Fail to authenticate with the wrong password",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("with_password_user"),
|
||||||
|
resp.StringValue("wrong_password"),
|
||||||
|
},
|
||||||
|
wantRes: "",
|
||||||
|
wantErr: "Error could not authenticate user",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "8. Command too short",
|
||||||
|
cmd: []resp.Value{resp.StringValue("AUTH")},
|
||||||
|
wantRes: "",
|
||||||
|
wantErr: fmt.Sprintf("Error %s", constants.WrongArgsResponse),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "9. Command too long",
|
||||||
|
cmd: []resp.Value{
|
||||||
|
resp.StringValue("AUTH"),
|
||||||
|
resp.StringValue("user"),
|
||||||
|
resp.StringValue("password1"),
|
||||||
|
resp.StringValue("password2"),
|
||||||
|
},
|
||||||
|
wantRes: "",
|
||||||
|
wantErr: fmt.Sprintf("Error %s", constants.WrongArgsResponse),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range tests {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
if err = r.WriteArray(test.cmd); err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
rv, _, err := r.ReadValue()
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
if test.wantErr != "" {
|
||||||
|
if rv.Error().Error() != test.wantErr {
|
||||||
|
t.Errorf("expected error response \"%s\", got \"%s\"", test.wantErr, rv.Error().Error())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if rv.String() != test.wantRes {
|
||||||
|
t.Errorf("expected response \"%s\", got \"%s\"", test.wantRes, rv.String())
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
t.Run("Test_HandlePing", func(t *testing.T) {
|
t.Run("Test_HandlePing", func(t *testing.T) {
|
||||||
conn, err := internal.GetConnection("localhost", port)
|
conn, err := internal.GetConnection("localhost", port)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -115,66 +301,65 @@ func Test_Connection(t *testing.T) {
|
|||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
||||||
t.Run("Test_HandleEcho", func(t *testing.T) {
|
t.Run("Test_HandleEcho", func(t *testing.T) {
|
||||||
conn, err := internal.GetConnection("localhost", port)
|
conn, err := internal.GetConnection("localhost", port)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
_ = conn.Close()
|
||||||
|
}()
|
||||||
|
client := resp.NewConn(conn)
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
command []resp.Value
|
||||||
|
expected string
|
||||||
|
expectedErr error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
command: []resp.Value{resp.StringValue("ECHO"), resp.StringValue("Hello, EchoVault!")},
|
||||||
|
expected: "Hello, EchoVault!",
|
||||||
|
expectedErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
command: []resp.Value{resp.StringValue("ECHO")},
|
||||||
|
expected: "",
|
||||||
|
expectedErr: errors.New(constants.WrongArgsResponse),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
command: []resp.Value{
|
||||||
|
resp.StringValue("ECHO"),
|
||||||
|
resp.StringValue("Hello, EchoVault!"),
|
||||||
|
resp.StringValue("Once more"),
|
||||||
|
},
|
||||||
|
expected: "",
|
||||||
|
expectedErr: errors.New(constants.WrongArgsResponse),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range tests {
|
||||||
|
if err = client.WriteArray(test.command); err != nil {
|
||||||
t.Error(err)
|
t.Error(err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
defer func() {
|
|
||||||
_ = conn.Close()
|
|
||||||
}()
|
|
||||||
client := resp.NewConn(conn)
|
|
||||||
|
|
||||||
tests := []struct {
|
res, _, err := client.ReadValue()
|
||||||
command []resp.Value
|
if err != nil {
|
||||||
expected string
|
t.Error(err)
|
||||||
expectedErr error
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
command: []resp.Value{resp.StringValue("ECHO"), resp.StringValue("Hello, EchoVault!")},
|
|
||||||
expected: "Hello, EchoVault!",
|
|
||||||
expectedErr: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
command: []resp.Value{resp.StringValue("ECHO")},
|
|
||||||
expected: "",
|
|
||||||
expectedErr: errors.New(constants.WrongArgsResponse),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
command: []resp.Value{
|
|
||||||
resp.StringValue("ECHO"),
|
|
||||||
resp.StringValue("Hello, EchoVault!"),
|
|
||||||
resp.StringValue("Once more"),
|
|
||||||
},
|
|
||||||
expected: "",
|
|
||||||
expectedErr: errors.New(constants.WrongArgsResponse),
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, test := range tests {
|
if test.expectedErr != nil {
|
||||||
if err = client.WriteArray(test.command); err != nil {
|
if !strings.Contains(res.Error().Error(), test.expectedErr.Error()) {
|
||||||
t.Error(err)
|
t.Errorf("expected error \"%s\", got \"%s\"", test.expectedErr.Error(), res.Error().Error())
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
res, _, err := client.ReadValue()
|
|
||||||
if err != nil {
|
|
||||||
t.Error(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if test.expectedErr != nil {
|
|
||||||
if !strings.Contains(res.Error().Error(), test.expectedErr.Error()) {
|
|
||||||
t.Errorf("expected error \"%s\", got \"%s\"", test.expectedErr.Error(), res.Error().Error())
|
|
||||||
}
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
if res.String() != test.expected {
|
|
||||||
t.Errorf("expected response \"%s\", got \"%s\"", test.expected, res.String())
|
|
||||||
}
|
}
|
||||||
|
continue
|
||||||
}
|
}
|
||||||
})
|
|
||||||
|
if res.String() != test.expected {
|
||||||
|
t.Errorf("expected response \"%s\", got \"%s\"", test.expected, res.String())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user