Simone Basso 2e0118d1a6
refactor(netxlite): hide details without breaking the rest of the tree ()
## Description

This PR continues the refactoring of `netx` under the following principles:

1. do not break the rest of the tree and do not engage in extensive tree-wide refactoring yet
2. move under `netxlite` clearly related subpackages (e.g., `iox`, `netxmocks`)
3. move into `internal/netxlite/internal` stuff that is clearly private of `netxlite`
4. hide implementation details in `netxlite` pending new factories
5. refactor `tls` code in `netxlite` to clearly separate `crypto/tls` code from `utls` code

After each commit, I run `go test -short -race ./...` locally. Each individual commit explains what it does. I will squash, but this operation will preserve the original commit titles, so this will give further insight on each step.

## Commits

* refactor: rename netxmocks -> netxlite/mocks

Part of https://github.com/ooni/probe/issues/1591

* refactor: rename quicx -> netxlite/quicx

See https://github.com/ooni/probe/issues/1591

* refactor: rename iox -> netxlite/iox

Regenerate sources and make sure the tests pass.

See https://github.com/ooni/probe/issues/1591.

* refactor(iox): move MockableReader to netxlite/mocks

See https://github.com/ooni/probe/issues/1591

* refactor(netxlite): generator is an implementation detail

See https://github.com/ooni/probe/issues/1591

* refactor(netxlite): separate tls and utls code

See https://github.com/ooni/probe/issues/1591

* refactor(netxlite): hide most types but keep old names as legacy

With this change we avoid breaking the rest of the tree, but we start
hiding some implementation details a bit. Factories will follow.

See https://github.com/ooni/probe/issues/1591
2021-09-05 14:49:38 +02:00

1434 lines
35 KiB
Go

// Code generated by go generate; DO NOT EDIT.
// 2021-09-05 13:54:21.967872 +0200 CEST m=+0.000174460
package ooapi
//go:generate go run ./internal/generator -file login_test.go
import (
"context"
"errors"
"net/http/httptest"
"testing"
"time"
"github.com/google/go-cmp/cmp"
"github.com/ooni/probe-cli/v3/internal/atomicx"
"github.com/ooni/probe-cli/v3/internal/kvstore"
"github.com/ooni/probe-cli/v3/internal/ooapi/apimodel"
)
func TestRegisterAndLoginPsiphonConfigSuccess(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestPsiphonConfigContinueUsingToken(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
// step 2: we disable register and login but we
// should be okay because of the token
errMocked := errors.New("mocked error")
registerAPI.Err = errMocked
registerAPI.Response = nil
loginAPI.Err = errMocked
loginAPI.Response = nil
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestPsiphonConfigWithValidButExpiredToken(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
errMocked := errors.New("mocked error")
registerAPI := &FakeRegisterAPI{
Err: errMocked,
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
ls := &loginState{
ClientID: "antani-antani",
Expire: time.Now().Add(-5 * time.Second),
Token: "antani-antani-token",
Password: "antani-antani-password",
}
if err := login.writestate(ls); err != nil {
t.Fatal(err)
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 0 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestPsiphonConfigWithRegisterAPIError(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
errMocked := errors.New("mocked error")
registerAPI := &FakeRegisterAPI{
Err: errMocked,
CountCall: &atomicx.Int64{},
}
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestPsiphonConfigWithLoginFailure(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
errMocked := errors.New("mocked error")
loginAPI := &FakeLoginAPI{
Err: errMocked,
CountCall: &atomicx.Int64{},
}
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestRegisterAndLoginPsiphonConfigThenFail(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
errMocked := errors.New("mocked error")
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Err: errMocked,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestPsiphonConfigTheDatabaseIsReplaced(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simplePsiphonConfigAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginPsiphonConfigAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget accounts and try again.
handler.forgetLogins()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 3 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 2 {
t.Fatal("invalid handler.registers")
}
}
func TestRegisterAndLoginPsiphonConfigCannotWriteState(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
errMocked := errors.New("mocked error")
login := &withLoginPsiphonConfigAPI{
API: &FakePsiphonConfigAPI{
WithResult: &FakePsiphonConfigAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
JSONCodec: &FakeCodec{
EncodeErr: errMocked,
},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestPsiphonConfigReadStateDecodeFailure(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.PsiphonConfigResponse
ff.fill(&expect)
errMocked := errors.New("mocked error")
login := &withLoginPsiphonConfigAPI{
KVStore: &kvstore.Memory{},
JSONCodec: &FakeCodec{DecodeErr: errMocked},
}
ls := &loginState{
ClientID: "antani-antani",
Expire: time.Now().Add(-5 * time.Second),
Token: "antani-antani-token",
Password: "antani-antani-password",
}
if err := login.writestate(ls); err != nil {
t.Fatal(err)
}
out, err := login.forceLogin(context.Background())
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if out != "" {
t.Fatal("expected empty string here")
}
}
func TestPsiphonConfigTheDatabaseIsReplacedThenFailure(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simplePsiphonConfigAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginPsiphonConfigAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget accounts and try again.
// but registrations are also failing.
handler.forgetLogins()
handler.noRegister = true
resp, err := login.Call(ctx, req)
if !errors.Is(err, ErrHTTPFailure) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if handler.logins.Load() != 2 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 2 {
t.Fatal("invalid handler.registers")
}
}
func TestPsiphonConfigClockIsOffThenSuccess(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simplePsiphonConfigAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginPsiphonConfigAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget tokens and try again.
// this should simulate the client clock
// being off and considering a token still valid
handler.forgetTokens()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 2 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
func TestPsiphonConfigClockIsOffThen401(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simplePsiphonConfigAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginPsiphonConfigAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget tokens and try again.
// this should simulate the client clock
// being off and considering a token still valid
handler.forgetTokens()
handler.failCallWith = []int{401, 401}
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal("not the error we expected", err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 3 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 2 {
t.Fatal("invalid handler.registers")
}
}
func TestPsiphonConfigClockIsOffThen500(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simplePsiphonConfigAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginPsiphonConfigAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.PsiphonConfigRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget tokens and try again.
// this should simulate the client clock
// being off and considering a token still valid
handler.forgetTokens()
handler.failCallWith = []int{401, 500}
resp, err := login.Call(ctx, req)
if !errors.Is(err, ErrHTTPFailure) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if handler.logins.Load() != 2 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
func TestRegisterAndLoginTorTargetsSuccess(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestTorTargetsContinueUsingToken(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
// step 2: we disable register and login but we
// should be okay because of the token
errMocked := errors.New("mocked error")
registerAPI.Err = errMocked
registerAPI.Response = nil
loginAPI.Err = errMocked
loginAPI.Response = nil
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestTorTargetsWithValidButExpiredToken(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
errMocked := errors.New("mocked error")
registerAPI := &FakeRegisterAPI{
Err: errMocked,
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
ls := &loginState{
ClientID: "antani-antani",
Expire: time.Now().Add(-5 * time.Second),
Token: "antani-antani-token",
Password: "antani-antani-password",
}
if err := login.writestate(ls); err != nil {
t.Fatal(err)
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if diff := cmp.Diff(expect, resp); diff != "" {
t.Fatal(diff)
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 0 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestTorTargetsWithRegisterAPIError(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
errMocked := errors.New("mocked error")
registerAPI := &FakeRegisterAPI{
Err: errMocked,
CountCall: &atomicx.Int64{},
}
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestTorTargetsWithLoginFailure(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
errMocked := errors.New("mocked error")
loginAPI := &FakeLoginAPI{
Err: errMocked,
CountCall: &atomicx.Int64{},
}
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestRegisterAndLoginTorTargetsThenFail(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
errMocked := errors.New("mocked error")
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Err: errMocked,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestTorTargetsTheDatabaseIsReplaced(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simpleTorTargetsAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginTorTargetsAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget accounts and try again.
handler.forgetLogins()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 3 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 2 {
t.Fatal("invalid handler.registers")
}
}
func TestRegisterAndLoginTorTargetsCannotWriteState(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
registerAPI := &FakeRegisterAPI{
Response: &apimodel.RegisterResponse{
ClientID: "antani-antani",
},
CountCall: &atomicx.Int64{},
}
loginAPI := &FakeLoginAPI{
Response: &apimodel.LoginResponse{
Expire: time.Now().Add(3600 * time.Second),
Token: "antani-antani-token",
},
CountCall: &atomicx.Int64{},
}
errMocked := errors.New("mocked error")
login := &withLoginTorTargetsAPI{
API: &FakeTorTargetsAPI{
WithResult: &FakeTorTargetsAPI{
Response: expect,
},
},
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
JSONCodec: &FakeCodec{
EncodeErr: errMocked,
},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
resp, err := login.Call(ctx, req)
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if loginAPI.CountCall.Load() != 1 {
t.Fatal("invalid loginAPI.CountCall")
}
if registerAPI.CountCall.Load() != 1 {
t.Fatal("invalid registerAPI.CountCall")
}
}
func TestTorTargetsReadStateDecodeFailure(t *testing.T) {
ff := &fakeFill{}
var expect apimodel.TorTargetsResponse
ff.fill(&expect)
errMocked := errors.New("mocked error")
login := &withLoginTorTargetsAPI{
KVStore: &kvstore.Memory{},
JSONCodec: &FakeCodec{DecodeErr: errMocked},
}
ls := &loginState{
ClientID: "antani-antani",
Expire: time.Now().Add(-5 * time.Second),
Token: "antani-antani-token",
Password: "antani-antani-password",
}
if err := login.writestate(ls); err != nil {
t.Fatal(err)
}
out, err := login.forceLogin(context.Background())
if !errors.Is(err, errMocked) {
t.Fatal("not the error we expected", err)
}
if out != "" {
t.Fatal("expected empty string here")
}
}
func TestTorTargetsTheDatabaseIsReplacedThenFailure(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simpleTorTargetsAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginTorTargetsAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget accounts and try again.
// but registrations are also failing.
handler.forgetLogins()
handler.noRegister = true
resp, err := login.Call(ctx, req)
if !errors.Is(err, ErrHTTPFailure) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if handler.logins.Load() != 2 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 2 {
t.Fatal("invalid handler.registers")
}
}
func TestTorTargetsClockIsOffThenSuccess(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simpleTorTargetsAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginTorTargetsAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget tokens and try again.
// this should simulate the client clock
// being off and considering a token still valid
handler.forgetTokens()
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 2 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
func TestTorTargetsClockIsOffThen401(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simpleTorTargetsAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginTorTargetsAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget tokens and try again.
// this should simulate the client clock
// being off and considering a token still valid
handler.forgetTokens()
handler.failCallWith = []int{401, 401}
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal("not the error we expected", err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 3 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 2 {
t.Fatal("invalid handler.registers")
}
}
func TestTorTargetsClockIsOffThen500(t *testing.T) {
ff := &fakeFill{}
handler := &LoginHandler{
logins: &atomicx.Int64{},
registers: &atomicx.Int64{},
t: t,
}
srvr := httptest.NewServer(handler)
defer srvr.Close()
registerAPI := &simpleRegisterAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
loginAPI := &simpleLoginAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
baseAPI := &simpleTorTargetsAPI{
HTTPClient: &VerboseHTTPClient{T: t},
BaseURL: srvr.URL,
}
login := &withLoginTorTargetsAPI{
API: baseAPI,
RegisterAPI: registerAPI,
LoginAPI: loginAPI,
KVStore: &kvstore.Memory{},
}
var req *apimodel.TorTargetsRequest
ff.fill(&req)
ctx := context.Background()
// step 1: we register and login and use the token
// inside a scope just to avoid mistakes
{
resp, err := login.Call(ctx, req)
if err != nil {
t.Fatal(err)
}
if resp == nil {
t.Fatal("expected non-nil response")
}
if handler.logins.Load() != 1 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}
// step 2: we forget tokens and try again.
// this should simulate the client clock
// being off and considering a token still valid
handler.forgetTokens()
handler.failCallWith = []int{401, 500}
resp, err := login.Call(ctx, req)
if !errors.Is(err, ErrHTTPFailure) {
t.Fatal("not the error we expected", err)
}
if resp != nil {
t.Fatal("expected nil response")
}
if handler.logins.Load() != 2 {
t.Fatal("invalid handler.logins")
}
if handler.registers.Load() != 1 {
t.Fatal("invalid handler.registers")
}
}