Merge pull request #592 from GJRTimmer/fix/test/coverage
fix/test/coverage
This commit is contained in:
commit
1013924b66
|
@ -1,8 +0,0 @@
|
||||||
// GoConvey Test Profile
|
|
||||||
|
|
||||||
// Activate Coverage
|
|
||||||
-cover
|
|
||||||
|
|
||||||
-tags=sqlite_userauth
|
|
||||||
|
|
||||||
// EOF
|
|
|
@ -0,0 +1,57 @@
|
||||||
|
// Copyright (C) 2018 G.J.R. Timmer <gjr.timmer@gmail.com>.
|
||||||
|
//
|
||||||
|
// Use of this source code is governed by an MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package sqlite3
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TestCryptEncoders to increase coverage
|
||||||
|
func TestCryptEncoders(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
enc string
|
||||||
|
salt string
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
{"sha1", "", "d033e22ae348aeb5660fc2140aec35850c4da997"},
|
||||||
|
{"sha256", "", "8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918"},
|
||||||
|
{"sha384", "", "9ca694a90285c034432c9550421b7b9dbd5c0f4b6673f05f6dbce58052ba20e4248041956ee8c9a2ec9f10290cdc0782"},
|
||||||
|
{"sha512", "", "c7ad44cbad762a5da0a452f9e854fdc1e0e7a52a38015f23f3eab1d80b931dd472634dfac71cd34ebc35d16ab7fb8a90c81f975113d6c7538dc69dd8de9077ec"},
|
||||||
|
{"ssha1", "salt", "9bc7aa55f08fdad935c3f8362d3f48bcf70eb280"},
|
||||||
|
{"ssha256", "salt", "f9a81477552594c79f2abc3fc099daa896a6e3a3590a55ffa392b6000412e80b"},
|
||||||
|
{"ssha384", "salt", "9ed776b477fcfc1b5e584989e8d770f5e17d98a7643546a63c2b07d4ab00f1348f6b8e73103d3a23554f727136e8c215"},
|
||||||
|
{"ssha512", "salt", "3c4a79782143337be4492be072abcfe979dd703c00541a8c39a0f3df4bab2029c050cf46fddc47090b5b04ac537b3e78189e3de16e601e859f95c51ac9f6dafb"},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, e := range tests {
|
||||||
|
var fn func(pass []byte, hash interface{}) []byte
|
||||||
|
switch e.enc {
|
||||||
|
case "sha1":
|
||||||
|
fn = CryptEncoderSHA1
|
||||||
|
case "ssha1":
|
||||||
|
fn = CryptEncoderSSHA1(e.salt)
|
||||||
|
case "sha256":
|
||||||
|
fn = CryptEncoderSHA256
|
||||||
|
case "ssha256":
|
||||||
|
fn = CryptEncoderSSHA256(e.salt)
|
||||||
|
case "sha384":
|
||||||
|
fn = CryptEncoderSHA384
|
||||||
|
case "ssha384":
|
||||||
|
fn = CryptEncoderSSHA384(e.salt)
|
||||||
|
case "sha512":
|
||||||
|
fn = CryptEncoderSHA512
|
||||||
|
case "ssha512":
|
||||||
|
fn = CryptEncoderSSHA512(e.salt)
|
||||||
|
}
|
||||||
|
|
||||||
|
h := fn([]byte("admin"), nil)
|
||||||
|
if strings.Compare(fmt.Sprintf("%x", h), e.expected) != 0 {
|
||||||
|
t.Fatalf("Invalid %s hash: expected: %s; got: %x", strings.ToUpper(e.enc), e.expected, h)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -80,7 +80,6 @@ func randStringBytes(n int) string {
|
||||||
}
|
}
|
||||||
|
|
||||||
func initDatabase(t *testing.T, db *sql.DB, rowCount int64) {
|
func initDatabase(t *testing.T, db *sql.DB, rowCount int64) {
|
||||||
t.Logf("Executing db initializing statements")
|
|
||||||
for _, query := range testTableStatements {
|
for _, query := range testTableStatements {
|
||||||
_, err := db.Exec(query)
|
_, err := db.Exec(query)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,2 +0,0 @@
|
||||||
// Goconvey Profile
|
|
||||||
IGNORE
|
|
Loading…
Reference in New Issue