diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2021-12-02 13:21:46 +1100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2021-12-02 13:21:46 +1100 |
| commit | bf9ab360bd8dd46739d4aa0018ceb4c08e05dba8 (patch) | |
| tree | 530f43f59e3a4dc4c0bf0256b443c5777bb7142c /internal/handlers/handler_verify_test.go | |
| parent | f3f3b31b12a87586770c5cfaf646a9e85a724089 (diff) | |
refactor(handlers): utilize referer for auth logging rm/rd (#2655)
This utilizes the referrer query parameters instead of current request query parameters for logging the requested URI and method. Minor performance improvements to header peek/sets.
Diffstat (limited to 'internal/handlers/handler_verify_test.go')
| -rw-r--r-- | internal/handlers/handler_verify_test.go | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/internal/handlers/handler_verify_test.go b/internal/handlers/handler_verify_test.go index cf1faa17f..bb78ff022 100644 --- a/internal/handlers/handler_verify_test.go +++ b/internal/handlers/handler_verify_test.go @@ -85,34 +85,34 @@ func TestShouldRaiseWhenXForwardedURIIsNotParsable(t *testing.T) { // Test parseBasicAuth. func TestShouldRaiseWhenHeaderDoesNotContainBasicPrefix(t *testing.T) { - _, _, err := parseBasicAuth(HeaderProxyAuthorization, "alzefzlfzemjfej==") + _, _, err := parseBasicAuth(headerProxyAuthorization, "alzefzlfzemjfej==") assert.Error(t, err) assert.Equal(t, "Basic prefix not found in Proxy-Authorization header", err.Error()) } func TestShouldRaiseWhenCredentialsAreNotInBase64(t *testing.T) { - _, _, err := parseBasicAuth(HeaderProxyAuthorization, "Basic alzefzlfzemjfej==") + _, _, err := parseBasicAuth(headerProxyAuthorization, "Basic alzefzlfzemjfej==") assert.Error(t, err) assert.Equal(t, "illegal base64 data at input byte 16", err.Error()) } func TestShouldRaiseWhenCredentialsAreNotInCorrectForm(t *testing.T) { // The decoded format should be user:password. - _, _, err := parseBasicAuth(HeaderProxyAuthorization, "Basic am9obiBwYXNzd29yZA==") + _, _, err := parseBasicAuth(headerProxyAuthorization, "Basic am9obiBwYXNzd29yZA==") assert.Error(t, err) assert.Equal(t, "format of Proxy-Authorization header must be user:password", err.Error()) } func TestShouldUseProvidedHeaderName(t *testing.T) { // The decoded format should be user:password. - _, _, err := parseBasicAuth("HeaderName", "") + _, _, err := parseBasicAuth([]byte("HeaderName"), "") assert.Error(t, err) assert.Equal(t, "Basic prefix not found in HeaderName header", err.Error()) } func TestShouldReturnUsernameAndPassword(t *testing.T) { // the decoded format should be user:password. - user, password, err := parseBasicAuth(HeaderProxyAuthorization, "Basic am9objpwYXNzd29yZA==") + user, password, err := parseBasicAuth(headerProxyAuthorization, "Basic am9objpwYXNzd29yZA==") assert.NoError(t, err) assert.Equal(t, "john", user) assert.Equal(t, "password", password) @@ -176,7 +176,7 @@ func TestShouldVerifyWrongCredentials(t *testing.T) { CheckUserPassword(gomock.Eq("john"), gomock.Eq("password")). Return(false, nil) - _, _, _, _, _, err := verifyBasicAuth(HeaderProxyAuthorization, []byte("Basic am9objpwYXNzd29yZA=="), mock.Ctx) + _, _, _, _, _, err := verifyBasicAuth(mock.Ctx, headerProxyAuthorization, []byte("Basic am9objpwYXNzd29yZA==")) assert.Error(t, err) } @@ -1211,7 +1211,7 @@ func TestShouldCheckValidSessionUsernameHeaderAndReturn200(t *testing.T) { require.NoError(t, err) mock.Ctx.Request.Header.Set("X-Original-URL", "https://one-factor.example.com") - mock.Ctx.Request.Header.Set(HeaderSessionUsername, testUsername) + mock.Ctx.Request.Header.SetBytesK(headerSessionUsername, testUsername) VerifyGet(verifyGetCfg)(mock.Ctx) assert.Equal(t, expectedStatusCode, mock.Ctx.Response.StatusCode()) @@ -1235,7 +1235,7 @@ func TestShouldCheckInvalidSessionUsernameHeaderAndReturn401(t *testing.T) { require.NoError(t, err) mock.Ctx.Request.Header.Set("X-Original-URL", "https://one-factor.example.com") - mock.Ctx.Request.Header.Set(HeaderSessionUsername, "root") + mock.Ctx.Request.Header.SetBytesK(headerSessionUsername, "root") VerifyGet(verifyGetCfg)(mock.Ctx) assert.Equal(t, expectedStatusCode, mock.Ctx.Response.StatusCode()) |
