summaryrefslogtreecommitdiffstats
path: root/utils/password_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'utils/password_test.go')
-rw-r--r--utils/password_test.go127
1 files changed, 127 insertions, 0 deletions
diff --git a/utils/password_test.go b/utils/password_test.go
new file mode 100644
index 000000000..4daf25018
--- /dev/null
+++ b/utils/password_test.go
@@ -0,0 +1,127 @@
+package utils
+
+import (
+ "strings"
+ "testing"
+
+ "github.com/stretchr/testify/assert"
+
+ "github.com/mattermost/mattermost-server/model"
+)
+
+func TestIsPasswordValid(t *testing.T) {
+ for name, tc := range map[string]struct {
+ Password string
+ ExpectedError string
+ }{
+ "Short": {
+ Password: strings.Repeat("x", model.PASSWORD_MINIMUM_LENGTH),
+ },
+ "Long": {
+ Password: strings.Repeat("x", model.PASSWORD_MAXIMUM_LENGTH),
+ },
+ "TooShort": {
+ Password: strings.Repeat("x", model.PASSWORD_MINIMUM_LENGTH-1),
+ ExpectedError: "model.user.is_valid.pwd.app_error",
+ },
+ "TooLong": {
+ Password: strings.Repeat("x", model.PASSWORD_MAXIMUM_LENGTH+1),
+ ExpectedError: "model.user.is_valid.pwd.app_error",
+ },
+ } {
+ t.Run(name, func(t *testing.T) {
+ if err := IsPasswordValid(tc.Password); tc.ExpectedError == "" {
+ assert.Nil(t, err)
+ } else {
+ assert.Equal(t, tc.ExpectedError, err.Id)
+ }
+ })
+ }
+}
+
+func TestIsPasswordValidWithSettings(t *testing.T) {
+ for name, tc := range map[string]struct {
+ Password string
+ Settings *model.PasswordSettings
+ ExpectedError string
+ }{
+ "Short": {
+ Password: strings.Repeat("x", 3),
+ Settings: &model.PasswordSettings{
+ MinimumLength: model.NewInt(3),
+ },
+ },
+ "Long": {
+ Password: strings.Repeat("x", model.PASSWORD_MAXIMUM_LENGTH),
+ Settings: &model.PasswordSettings{},
+ },
+ "TooShort": {
+ Password: strings.Repeat("x", 2),
+ Settings: &model.PasswordSettings{
+ MinimumLength: model.NewInt(3),
+ },
+ ExpectedError: "model.user.is_valid.pwd.app_error",
+ },
+ "TooLong": {
+ Password: strings.Repeat("x", model.PASSWORD_MAXIMUM_LENGTH+1),
+ Settings: &model.PasswordSettings{},
+ ExpectedError: "model.user.is_valid.pwd.app_error",
+ },
+ "MissingLower": {
+ Password: "ASD123!@#",
+ Settings: &model.PasswordSettings{
+ Lowercase: model.NewBool(true),
+ },
+ ExpectedError: "model.user.is_valid.pwd_lowercase.app_error",
+ },
+ "MissingUpper": {
+ Password: "asd123!@#",
+ Settings: &model.PasswordSettings{
+ Uppercase: model.NewBool(true),
+ },
+ ExpectedError: "model.user.is_valid.pwd_uppercase.app_error",
+ },
+ "MissingNumber": {
+ Password: "asdASD!@#",
+ Settings: &model.PasswordSettings{
+ Number: model.NewBool(true),
+ },
+ ExpectedError: "model.user.is_valid.pwd_number.app_error",
+ },
+ "MissingSymbol": {
+ Password: "asdASD123",
+ Settings: &model.PasswordSettings{
+ Symbol: model.NewBool(true),
+ },
+ ExpectedError: "model.user.is_valid.pwd_symbol.app_error",
+ },
+ "MissingMultiple": {
+ Password: "asd",
+ Settings: &model.PasswordSettings{
+ Lowercase: model.NewBool(true),
+ Uppercase: model.NewBool(true),
+ Number: model.NewBool(true),
+ Symbol: model.NewBool(true),
+ },
+ ExpectedError: "model.user.is_valid.pwd_lowercase_uppercase_number_symbol.app_error",
+ },
+ "Everything": {
+ Password: "asdASD!@#123",
+ Settings: &model.PasswordSettings{
+ Lowercase: model.NewBool(true),
+ Uppercase: model.NewBool(true),
+ Number: model.NewBool(true),
+ Symbol: model.NewBool(true),
+ },
+ },
+ } {
+ tc.Settings.SetDefaults()
+ t.Run(name, func(t *testing.T) {
+ if err := IsPasswordValidWithSettings(tc.Password, tc.Settings); tc.ExpectedError == "" {
+ assert.Nil(t, err)
+ } else {
+ assert.Equal(t, tc.ExpectedError, err.Id)
+ }
+ })
+ }
+}