mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-21 07:17:39 +00:00
7c494fd219
* feat: login with otp * fix(i18n): japanese translation * add missing files * fix provider change * add event types translations to en * add tests * resourceOwner * remove unused handler * fix: secret generators and add comments * add setup step * rename * linting * fix setup * improve otp handling * fix autocomplete * translations for login and notifications * translations for event types * changes from review * check selected mfa type
93 lines
2.9 KiB
Go
93 lines
2.9 KiB
Go
package crypto
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/golang/mock/gomock"
|
|
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
)
|
|
|
|
func CreateMockEncryptionAlg(ctrl *gomock.Controller) EncryptionAlgorithm {
|
|
return createMockEncryptionAlgorithm(
|
|
ctrl,
|
|
func(code []byte) ([]byte, error) {
|
|
return code, nil
|
|
},
|
|
)
|
|
}
|
|
|
|
// CreateMockEncryptionAlgWithCode compares the length of the value to be encrypted with the length of the provided code.
|
|
// It will return an error if they do not match.
|
|
// The provided code will be used to encrypt in favor of the value passed to the encryption.
|
|
// This function is intended to be used where the passed value is not in control, but where the returned encryption requires a static value.
|
|
func CreateMockEncryptionAlgWithCode(ctrl *gomock.Controller, code string) EncryptionAlgorithm {
|
|
return createMockEncryptionAlgorithm(
|
|
ctrl,
|
|
func(c []byte) ([]byte, error) {
|
|
if len(c) != len(code) {
|
|
return nil, errors.ThrowInvalidArgumentf(nil, "id", "invalid code length - expected %d, got %d", len(code), len(c))
|
|
}
|
|
return []byte(code), nil
|
|
},
|
|
)
|
|
}
|
|
|
|
func createMockEncryptionAlgorithm(ctrl *gomock.Controller, encryptFunction func(c []byte) ([]byte, error)) *MockEncryptionAlgorithm {
|
|
mCrypto := NewMockEncryptionAlgorithm(ctrl)
|
|
mCrypto.EXPECT().Algorithm().AnyTimes().Return("enc")
|
|
mCrypto.EXPECT().EncryptionKeyID().AnyTimes().Return("id")
|
|
mCrypto.EXPECT().DecryptionKeyIDs().AnyTimes().Return([]string{"id"})
|
|
mCrypto.EXPECT().Encrypt(gomock.Any()).AnyTimes().DoAndReturn(
|
|
encryptFunction,
|
|
)
|
|
mCrypto.EXPECT().DecryptString(gomock.Any(), gomock.Any()).AnyTimes().DoAndReturn(
|
|
func(code []byte, keyID string) (string, error) {
|
|
if keyID != "id" {
|
|
return "", errors.ThrowInternal(nil, "id", "invalid key id")
|
|
}
|
|
return string(code), nil
|
|
},
|
|
)
|
|
mCrypto.EXPECT().Decrypt(gomock.Any(), gomock.Any()).AnyTimes().DoAndReturn(
|
|
func(code []byte, keyID string) ([]byte, error) {
|
|
if keyID != "id" {
|
|
return nil, errors.ThrowInternal(nil, "id", "invalid key id")
|
|
}
|
|
return code, nil
|
|
},
|
|
)
|
|
return mCrypto
|
|
}
|
|
|
|
func CreateMockHashAlg(ctrl *gomock.Controller) HashAlgorithm {
|
|
mCrypto := NewMockHashAlgorithm(ctrl)
|
|
mCrypto.EXPECT().Algorithm().AnyTimes().Return("hash")
|
|
mCrypto.EXPECT().Hash(gomock.Any()).AnyTimes().DoAndReturn(
|
|
func(code []byte) ([]byte, error) {
|
|
return code, nil
|
|
},
|
|
)
|
|
mCrypto.EXPECT().CompareHash(gomock.Any(), gomock.Any()).AnyTimes().DoAndReturn(
|
|
func(hashed, comparer []byte) error {
|
|
if string(hashed) != string(comparer) {
|
|
return errors.ThrowInternal(nil, "id", "invalid")
|
|
}
|
|
return nil
|
|
},
|
|
)
|
|
return mCrypto
|
|
}
|
|
|
|
func createMockCrypto(t *testing.T) Crypto {
|
|
mCrypto := NewMockCrypto(gomock.NewController(t))
|
|
mCrypto.EXPECT().Algorithm().AnyTimes().Return("crypto")
|
|
return mCrypto
|
|
}
|
|
|
|
func createMockGenerator(t *testing.T, crypto Crypto) Generator {
|
|
mGenerator := NewMockGenerator(gomock.NewController(t))
|
|
mGenerator.EXPECT().Alg().AnyTimes().Return(crypto)
|
|
return mGenerator
|
|
}
|