mirror of
https://github.com/zitadel/zitadel
synced 2024-11-22 08:49:13 +00:00
a301c40f9f
* command/crypto: DRY the code - reuse the the algorithm switch to create a secret generator - add a verifyCryptoCode function * command: crypto code tests * migrate webauthn package * finish integration tests with webauthn mock client
55 lines
1.2 KiB
Go
55 lines
1.2 KiB
Go
package domain
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
|
)
|
|
|
|
func TestRenderPasskeyURLTemplate(t *testing.T) {
|
|
type args struct {
|
|
tmpl string
|
|
userID string
|
|
orgID string
|
|
codeID string
|
|
code string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantW string
|
|
wantErr error
|
|
}{
|
|
{
|
|
name: "parse error",
|
|
args: args{
|
|
tmpl: "{{",
|
|
},
|
|
wantErr: caos_errs.ThrowInvalidArgument(nil, "DOMAIN-oGh5e", "Errors.User.InvalidURLTemplate"),
|
|
},
|
|
{
|
|
name: "success",
|
|
args: args{
|
|
tmpl: "https://example.com/passkey/register?userID={{.UserID}}&orgID={{.OrgID}}&codeID={{.CodeID}}&code={{.Code}}",
|
|
userID: "user1",
|
|
orgID: "org1",
|
|
codeID: "99",
|
|
code: "123",
|
|
},
|
|
wantW: "https://example.com/passkey/register?userID=user1&orgID=org1&codeID=99&code=123",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
w := &bytes.Buffer{}
|
|
err := RenderPasskeyURLTemplate(w, tt.args.tmpl, tt.args.userID, tt.args.orgID, tt.args.codeID, tt.args.code)
|
|
require.ErrorIs(t, err, tt.wantErr)
|
|
assert.Equal(t, tt.wantW, w.String())
|
|
})
|
|
}
|
|
}
|