miniserve/tests/auth.rs
Ali MJ Al-Nasrawy dfd0ecf931 tests: Refactor!
Remove duplicate code responsible for the initial setup and teardown of
the test binary.

This introduces `TestServer` as a resource manager for a running
miniserve binary, which can be created with the fixtures `server()` and
`server_no_stderr()`

It also provides convenience function for handling server url.
2021-08-26 14:21:47 +03:00

180 lines
5.0 KiB
Rust

mod fixtures;
use fixtures::{server, server_no_stderr, Error, FILES};
use pretty_assertions::assert_eq;
use reqwest::blocking::Client;
use reqwest::StatusCode;
use rstest::rstest;
use select::document::Document;
use select::predicate::Text;
#[rstest(
cli_auth_arg, client_username, client_password,
case("testuser:testpassword", "testuser", "testpassword"),
case(
"testuser:sha256:9f735e0df9a1ddc702bf0a1a7b83033f9f7153a00c29de82cedadc9957289b05",
"testuser",
"testpassword"
),
case(
"testuser:sha512:e9e633097ab9ceb3e48ec3f70ee2beba41d05d5420efee5da85f97d97005727587fda33ef4ff2322088f4c79e8133cc9cd9f3512f4d3a303cbdb5bc585415a00",
"testuser",
"testpassword"
),
)]
fn auth_accepts(
cli_auth_arg: &str,
client_username: &str,
client_password: &str,
) -> Result<(), Error> {
let server = server(&["-a", cli_auth_arg]);
let client = Client::new();
let response = client
.get(server.url())
.basic_auth(client_username, Some(client_password))
.send()?;
let status_code = response.status();
assert_eq!(status_code, StatusCode::OK);
let body = response.error_for_status()?;
let parsed = Document::from_read(body)?;
for &file in FILES {
assert!(parsed.find(Text).any(|x| x.text() == file));
}
Ok(())
}
#[rstest(
cli_auth_arg, client_username, client_password,
case("rightuser:rightpassword", "wronguser", "rightpassword"),
case(
"rightuser:sha256:314eee236177a721d0e58d3ca4ff01795cdcad1e8478ba8183a2e58d69c648c0",
"wronguser",
"rightpassword"
),
case(
"rightuser:sha512:84ec4056571afeec9f5b59453305877e9a66c3f9a1d91733fde759b370c1d540b9dc58bfc88c5980ad2d020c3a8ee84f21314a180856f5a82ba29ecba29e2cab",
"wronguser",
"rightpassword"
),
case("rightuser:rightpassword", "rightuser", "wrongpassword"),
case(
"rightuser:sha256:314eee236177a721d0e58d3ca4ff01795cdcad1e8478ba8183a2e58d69c648c0",
"rightuser",
"wrongpassword"
),
case(
"rightuser:sha512:84ec4056571afeec9f5b59453305877e9a66c3f9a1d91733fde759b370c1d540b9dc58bfc88c5980ad2d020c3a8ee84f21314a180856f5a82ba29ecba29e2cab",
"rightuser",
"wrongpassword"
),
)]
fn auth_rejects(
cli_auth_arg: &str,
client_username: &str,
client_password: &str,
) -> Result<(), Error> {
let server = server_no_stderr(&["-a", cli_auth_arg]);
let client = Client::new();
let status = client
.get(server.url())
.basic_auth(client_username, Some(client_password))
.send()?
.status();
assert_eq!(status, StatusCode::UNAUTHORIZED);
Ok(())
}
/// Command line arguments that register multiple accounts
static ACCOUNTS: &[&str] = &[
"--auth",
"usr0:pwd0",
"--auth",
"usr1:pwd1",
"--auth",
"usr2:sha256:149d2937d1bce53fa683ae652291bd54cc8754444216a9e278b45776b76375af", // pwd2
"--auth",
"usr3:sha256:ffc169417b4146cebe09a3e9ffbca33db82e3e593b4d04c0959a89c05b87e15d", // pwd3
"--auth",
"usr4:sha512:68050a967d061ac480b414bc8f9a6d368ad0082203edcd23860e94c36178aad1a038e061716707d5479e23081a6d920dc6e9f88e5eb789cdd23e211d718d161a", // pwd4
"--auth",
"usr5:sha512:be82a7dccd06122f9e232e9730e67e69e30ec61b268fd9b21a5e5d42db770d45586a1ce47816649a0107e9fadf079d9cf0104f0a3aaa0f67bad80289c3ba25a8",
// pwd5
];
#[rstest(
username,
password,
case("usr0", "pwd0"),
case("usr1", "pwd1"),
case("usr2", "pwd2"),
case("usr3", "pwd3"),
case("usr4", "pwd4"),
case("usr5", "pwd5")
)]
fn auth_multiple_accounts_pass(username: &str, password: &str) -> Result<(), Error> {
let server = server(ACCOUNTS);
let client = Client::new();
let response = client
.get(server.url())
.basic_auth(username, Some(password))
.send()?;
let status = response.status();
assert_eq!(status, StatusCode::OK);
let body = response.error_for_status()?;
let parsed = Document::from_read(body)?;
for &file in FILES {
assert!(parsed.find(Text).any(|x| x.text() == file));
}
Ok(())
}
#[rstest]
fn auth_multiple_accounts_wrong_username() -> Result<(), Error> {
let server = server_no_stderr(ACCOUNTS);
let client = Client::new();
let status = client
.get(server.url())
.basic_auth("unregistered user", Some("pwd0"))
.send()?
.status();
assert_eq!(status, StatusCode::UNAUTHORIZED);
Ok(())
}
#[rstest(
username,
password,
case("usr0", "pwd5"),
case("usr1", "pwd4"),
case("usr2", "pwd3"),
case("usr3", "pwd2"),
case("usr4", "pwd1"),
case("usr5", "pwd0")
)]
fn auth_multiple_accounts_wrong_password(username: &str, password: &str) -> Result<(), Error> {
let server = server_no_stderr(ACCOUNTS);
let client = Client::new();
let status = client
.get(server.url())
.basic_auth(username, Some(password))
.send()?
.status();
assert_eq!(status, StatusCode::UNAUTHORIZED);
Ok(())
}