-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtest.py
140 lines (111 loc) · 5.28 KB
/
test.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
from support import DB_TEST, KEY_TEST
from support.encrypt_decrypt import is_encrypted, encrypt, decrypt, endec, read_data, write_data
from support.dbManage import store_in_db, fetch_from_db
import os
from pytest import raises
NO_FILE = os.path.join(os.path.dirname(__file__), './__nofileofthisname__.file')
# To test cryptography management, we assume is_encrypted as correct implementation except for the FileNotFound check done below
# This is because either it could be tested by either externally viewing the file or using the same lines of code in python that the function already carries
def test_is_encrypted():
with raises(SystemExit):
is_encrypted(NO_FILE)
assert isinstance(is_encrypted(DB_TEST), bool)
# This decorator ensures nothing was changed after execution of a testing function
# We do all experiments on test database and test key in test utils directory
def retainer(func: callable) -> callable:
def mod_func():
content_dbfile = read_data(DB_TEST)
content_keyfile = read_data(KEY_TEST)
func()
if read_data(DB_TEST) != content_dbfile:
write_data(DB_TEST, content_dbfile)
if read_data(KEY_TEST) != content_keyfile:
write_data(KEY_TEST, content_keyfile)
return mod_func
# Now, assuming now that is_encrypted is well enough to predict that its a SQLite interactable database or something else (thus, encrypted for us)
# Testing encrypt, decrypt and endec switch
@retainer
def test_encrypt_decrypt():
with raises(SystemExit):
decrypt(dbfile=NO_FILE, keyfile=KEY_TEST)
with raises(SystemExit):
decrypt(dbfile=DB_TEST, keyfile=NO_FILE)
with raises(SystemExit):
encrypt(dbfile=NO_FILE, keyfile=KEY_TEST, change_key=False)
with raises(SystemExit):
encrypt(dbfile=DB_TEST, keyfile=NO_FILE, change_key=False)
with raises(SystemExit):
endec(dbfile=NO_FILE, keyfile=KEY_TEST, change_key=False)
with raises(SystemExit):
endec(dbfile=DB_TEST, keyfile=NO_FILE, change_key=False)
# Test Database is expected to be completely decrypted
if flag := is_encrypted(DB_TEST):
# Test decrypt
decrypt(DB_TEST, KEY_TEST)
assert flag is not is_encrypted(DB_TEST)
# Test encrypt
encrypt(DB_TEST, KEY_TEST, False)
assert flag is is_encrypted(DB_TEST)
# As by now its tested to work
decrypt(DB_TEST, KEY_TEST)
else:
# Test encrypt
encrypt(DB_TEST, KEY_TEST, False)
assert flag is not is_encrypted(DB_TEST)
# Test decrypt
decrypt(DB_TEST, KEY_TEST)
assert flag is is_encrypted(DB_TEST)
# Test encrypt with key change
key = read_data(KEY_TEST)
encrypt(DB_TEST, KEY_TEST, True)
assert is_encrypted(DB_TEST)
assert key != read_data(KEY_TEST)
# Testing endec
# Encrypted Database
endec(DB_TEST, KEY_TEST, False)
assert not is_encrypted(DB_TEST)
# Decrypted Database
endec(DB_TEST, KEY_TEST, False)
assert is_encrypted(DB_TEST)
# Encrypted Database
key = read_data(KEY_TEST)
endec(DB_TEST, KEY_TEST, True)
assert not is_encrypted(DB_TEST)
assert key == read_data(KEY_TEST)
# Decrypted Database
key = read_data(KEY_TEST)
endec(DB_TEST, KEY_TEST, True)
assert is_encrypted(DB_TEST)
assert key != read_data(KEY_TEST)
# Similarly, to test database management for storage and retrieval, we assume fetch_from_db is correct implementation except for the FileNotFound and more checks done below
# Again, this is because its testing requires externally viewing the database or using the same lines of code in python that were used to make the function
@retainer
def test_fetch():
with raises(SystemExit):
fetch_from_db(None, None, True, NO_FILE)
if not is_encrypted(DB_TEST):
endec(DB_TEST, KEY_TEST, False)
assert fetch_from_db(None, None, True, DB_TEST) == 'ENCRYPTED'
endec(DB_TEST, KEY_TEST, False)
data = fetch_from_db(None, None, True, DB_TEST) # Assumes already a presence of the table named pswds
assert all(len(x) == 3 and all(isinstance(y, str) for y in x) for x in data)
data = fetch_from_db(None, None, False, DB_TEST)
assert all(len(x) == 2 and all(isinstance(y, str) for y in x) for x in data)
# Now, we need to get into testing store_in_db by believing in this fetch_from_db. Also, with a little fetch testing
@retainer
def test_store():
entry = ('foo', 'bar', 'foo@bar')
with raises(SystemExit):
store_in_db(*entry, NO_FILE)
if not is_encrypted(DB_TEST):
endec(DB_TEST, KEY_TEST, False)
assert store_in_db(*entry, DB_TEST) == 'ENCRYPTED'
endec(DB_TEST, KEY_TEST, False)
store_in_db(*entry, DB_TEST)
for search in [(None, None), ('foo', None), (None, 'bar'), ('foo', 'bar')]:
data = fetch_from_db(*search, True, DB_TEST)
assert all(len(x) == 3 and all(isinstance(y, str) for y in x) for x in data) and entry in data
data = fetch_from_db(*search, False, DB_TEST)
assert all(len(x) == 2 and all(isinstance(y, str) for y in x) for x in data) and entry[:2] in data
# The main file manager.py is just a clui using these tested function internally. Thus, it doesn't require subtle testing like this.
# This is because if anything is bad in clui, we see it while running the manager.py script itself