summaryrefslogtreecommitdiff
path: root/internal/authorization/util_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'internal/authorization/util_test.go')
-rw-r--r--internal/authorization/util_test.go21
1 files changed, 20 insertions, 1 deletions
diff --git a/internal/authorization/util_test.go b/internal/authorization/util_test.go
index 7106beab6..39061bc3b 100644
--- a/internal/authorization/util_test.go
+++ b/internal/authorization/util_test.go
@@ -11,6 +11,25 @@ import (
"github.com/authelia/authelia/v4/internal/configuration/schema"
)
+func TestLevelToString(t *testing.T) {
+ testCases := []struct {
+ have Level
+ expected string
+ }{
+ {Bypass, "bypass"},
+ {OneFactor, "one_factor"},
+ {TwoFactor, "two_factor"},
+ {Denied, "deny"},
+ {99, "deny"},
+ }
+
+ for _, tc := range testCases {
+ t.Run("Expected_"+tc.expected, func(t *testing.T) {
+ assert.Equal(t, tc.expected, LevelToString(tc.have))
+ })
+ }
+}
+
func TestShouldNotParseInvalidSubjects(t *testing.T) {
subjectsSchema := [][]string{{"groups:z"}, {"group:z", "users:b"}}
subjectsACL := schemaSubjectsToACL(subjectsSchema)
@@ -184,7 +203,7 @@ func TestShouldParseACLNetworks(t *testing.T) {
assert.Equal(t, fourthNetwork, networksCacheMap["fec0::1/128"])
}
-func TestShouldReturnCorrectValidationLevel(t *testing.T) {
+func TestIsAuthLevelSufficient(t *testing.T) {
assert.False(t, IsAuthLevelSufficient(authentication.NotAuthenticated, Denied))
assert.False(t, IsAuthLevelSufficient(authentication.OneFactor, Denied))
assert.False(t, IsAuthLevelSufficient(authentication.TwoFactor, Denied))