test formatter

Signed-off-by: constantoine <cleo.rebert-ext@treezor.com>
This commit is contained in:
constantoine 2022-08-08 20:23:24 +02:00
parent 8e890ac14d
commit e5f152210a
No known key found for this signature in database
GPG Key ID: 0FA097951CF65367
1 changed files with 85 additions and 1 deletions

View File

@ -94,7 +94,7 @@ impl std::fmt::Display for TotpUrlError {
#[cfg(feature = "otpauth")]
TotpUrlError::Url(e) => write!(
f,
"Error parsing URL {}",
"Error parsing URL: {}",
e
)
}
@ -108,4 +108,88 @@ impl From<Rfc6238Error> for TotpUrlError {
Rfc6238Error::SecretTooSmall(bits) => TotpUrlError::SecretSize(bits),
}
}
}
#[cfg(test)]
mod tests {
use crate::TotpUrlError;
#[test]
fn account_name() {
let error = TotpUrlError::AccountName("Laziz:".to_string());
assert_eq!(error.to_string(), "Account Name can't contain a colon. \"Laziz:\" contains a colon")
}
#[test]
fn account_name_decoding() {
let error = TotpUrlError::AccountNameDecoding("Laz&iz".to_string());
assert_eq!(error.to_string(), "Couldn't URL decode \"Laz&iz\"".to_string())
}
#[test]
fn algorithm() {
let error = TotpUrlError::Algorithm("SIKE".to_string());
assert_eq!(error.to_string(), "Algorithm can only be SHA1, SHA256 or SHA512, not \"SIKE\"".to_string())
}
#[test]
fn digits() {
let error = TotpUrlError::Digits("six".to_string());
assert_eq!(error.to_string(), "Could not parse \"six\" as a number.".to_string())
}
#[test]
fn digits_number() {
let error = TotpUrlError::DigitsNumber(5);
assert_eq!(error.to_string(), "Implementations MUST extract a 6-digit code at a minimum and possibly 7 and 8-digit code. 5 digits is not allowed".to_string())
}
#[test]
fn host() {
let error = TotpUrlError::Host("hotp".to_string());
assert_eq!(error.to_string(), "Host should be totp, not \"hotp\"".to_string())
}
#[test]
fn issuer() {
let error = TotpUrlError::Issuer("Iss:uer".to_string());
assert_eq!(error.to_string(), "Issuer can't contain a colon. \"Iss:uer\" contains a colon".to_string())
}
#[test]
fn issuer_decoding() {
let error = TotpUrlError::IssuerDecoding("iss&uer".to_string());
assert_eq!(error.to_string(), "Couldn't URL decode \"iss&uer\"".to_string())
}
#[test]
fn issuer_mismatch() {
let error = TotpUrlError::IssuerMistmatch("Google".to_string(), "Github".to_string());
assert_eq!(error.to_string(), "An issuer \"Google\" could be retrieved from the path, but a different issuer \"Github\" was found in the issuer URL parameter".to_string())
}
#[test]
fn scheme() {
let error = TotpUrlError::Scheme("https".to_string());
assert_eq!(error.to_string(), "Scheme should be otpauth, not \"https\"".to_string())
}
#[test]
fn secret() {
let error = TotpUrlError::Secret("YoLo".to_string());
assert_eq!(error.to_string(), "Secret \"YoLo\" is not a valid non-padded base32 string".to_string())
}
#[test]
fn secret_size() {
let error = TotpUrlError::SecretSize(112);
assert_eq!(error.to_string(), "The length of the shared secret MUST be at least 128 bits. 112 bits is not enough".to_string())
}
#[test]
#[cfg(feature = "otpauth")]
fn step() {
let error = TotpUrlError::Url(url::ParseError::EmptyHost);
assert_eq!(error.to_string(), "Error parsing URL: empty host".to_string())
}
}