summaryrefslogtreecommitdiff
path: root/internal/configuration/validator/privacy_policy_test.go
blob: 56f3cf7c94c68d94d2eada67e5ae08ded468a59f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
package validator

import (
	"testing"

	"github.com/stretchr/testify/assert"

	"github.com/authelia/authelia/v4/internal/configuration/schema"
)

func TestValidatePrivacyPolicy(t *testing.T) {
	testCases := []struct {
		name     string
		have     *schema.PrivacyPolicy
		expected string
	}{
		{"ShouldValidateDefaultConfig", &schema.PrivacyPolicy{}, ""},
		{"ShouldValidateValidEnabledPolicy", &schema.PrivacyPolicy{Enabled: true, PolicyURL: MustParseURL("https://example.com/privacy")}, ""},
		{"ShouldValidateValidEnabledPolicyWithUserAcceptance", &schema.PrivacyPolicy{Enabled: true, RequireUserAcceptance: true, PolicyURL: MustParseURL("https://example.com/privacy")}, ""},
		{"ShouldNotValidateOnInvalidScheme", &schema.PrivacyPolicy{Enabled: true, PolicyURL: MustParseURL("http://example.com/privacy")}, "privacy_policy: option 'policy_url' must have the 'https' scheme but it's configured as 'http'"},
		{"ShouldNotValidateOnMissingURL", &schema.PrivacyPolicy{Enabled: true}, "privacy_policy: option 'policy_url' must be provided when the option 'enabled' is true"},
	}

	validator := schema.NewStructValidator()

	for _, tc := range testCases {
		validator.Clear()

		t.Run(tc.name, func(t *testing.T) {
			ValidatePrivacyPolicy(tc.have, validator)

			assert.Len(t, validator.Warnings(), 0)

			if tc.expected == "" {
				assert.Len(t, validator.Errors(), 0)
			} else {
				assert.EqualError(t, validator.Errors()[0], tc.expected)
			}
		})
	}
}