|
4 | 4 | package pwn
|
5 | 5 |
|
6 | 6 | import (
|
| 7 | + "errors" |
| 8 | + "io" |
7 | 9 | "net/http"
|
| 10 | + "strings" |
8 | 11 | "testing"
|
9 |
| - "time" |
10 | 12 |
|
11 |
| - "github.com/h2non/gock" |
12 | 13 | "github.com/stretchr/testify/assert"
|
13 | 14 | )
|
14 | 15 |
|
15 |
| -var client = New(WithHTTP(&http.Client{ |
16 |
| - Timeout: time.Second * 2, |
17 |
| -})) |
| 16 | +type mockTransport struct{} |
| 17 | + |
| 18 | +func (mockTransport) RoundTrip(req *http.Request) (*http.Response, error) { |
| 19 | + if req.URL.Host != "api.pwnedpasswords.com" { |
| 20 | + return nil, errors.New("unsupported host") |
| 21 | + } |
| 22 | + respMap := map[string]string{ |
| 23 | + "/range/5c1d8": "EAF2F254732680E8AC339B84F3266ECCBB5:1\r\nFC446EB88938834178CB9322C1EE273C2A7:2", |
| 24 | + "/range/ba189": "FD4CB34F0378BCB15D23F6FFD28F0775C9E:3\r\nFDF342FCD8C3611DAE4D76E8A992A3E4169:4", |
| 25 | + "/range/a1733": "C4CE0F1F0062B27B9E2F41AF0C08218017C:1\r\nFC446EB88938834178CB9322C1EE273C2A7:2\r\nFE81480327C992FE62065A827429DD1318B:0", |
| 26 | + "/range/5617b": "FD4CB34F0378BCB15D23F6FFD28F0775C9E:3\r\nFDF342FCD8C3611DAE4D76E8A992A3E4169:4\r\nFE81480327C992FE62065A827429DD1318B:0", |
| 27 | + "/range/79082": "FDF342FCD8C3611DAE4D76E8A992A3E4169:4\r\nFE81480327C992FE62065A827429DD1318B:0\r\nAFEF386F56EB0B4BE314E07696E5E6E6536:0", |
| 28 | + } |
| 29 | + if resp, ok := respMap[req.URL.Path]; ok { |
| 30 | + return &http.Response{Request: req, Body: io.NopCloser(strings.NewReader(resp))}, nil |
| 31 | + } |
| 32 | + return nil, errors.New("unsupported path") |
| 33 | +} |
18 | 34 |
|
19 | 35 | func TestPassword(t *testing.T) {
|
20 |
| - defer gock.Off() |
| 36 | + client := New(WithHTTP(&http.Client{Transport: mockTransport{}})) |
21 | 37 |
|
22 | 38 | count, err := client.CheckPassword("", false)
|
23 | 39 | assert.ErrorIs(t, err, ErrEmptyPassword, "blank input should return ErrEmptyPassword")
|
24 | 40 | assert.Equal(t, -1, count)
|
25 | 41 |
|
26 |
| - gock.New("https://api.pwnedpasswords.com").Get("/range/5c1d8").Times(1).Reply(200).BodyString("EAF2F254732680E8AC339B84F3266ECCBB5:1\r\nFC446EB88938834178CB9322C1EE273C2A7:2") |
27 | 42 | count, err = client.CheckPassword("pwned", false)
|
28 | 43 | assert.NoError(t, err)
|
29 | 44 | assert.Equal(t, 1, count)
|
30 | 45 |
|
31 |
| - gock.New("https://api.pwnedpasswords.com").Get("/range/ba189").Times(1).Reply(200).BodyString("FD4CB34F0378BCB15D23F6FFD28F0775C9E:3\r\nFDF342FCD8C3611DAE4D76E8A992A3E4169:4") |
32 | 46 | count, err = client.CheckPassword("notpwned", false)
|
33 | 47 | assert.NoError(t, err)
|
34 | 48 | assert.Equal(t, 0, count)
|
35 | 49 |
|
36 |
| - gock.New("https://api.pwnedpasswords.com").Get("/range/a1733").Times(1).Reply(200).BodyString("C4CE0F1F0062B27B9E2F41AF0C08218017C:1\r\nFC446EB88938834178CB9322C1EE273C2A7:2\r\nFE81480327C992FE62065A827429DD1318B:0") |
37 | 50 | count, err = client.CheckPassword("paddedpwned", true)
|
38 | 51 | assert.NoError(t, err)
|
39 | 52 | assert.Equal(t, 1, count)
|
40 | 53 |
|
41 |
| - gock.New("https://api.pwnedpasswords.com").Get("/range/5617b").Times(1).Reply(200).BodyString("FD4CB34F0378BCB15D23F6FFD28F0775C9E:3\r\nFDF342FCD8C3611DAE4D76E8A992A3E4169:4\r\nFE81480327C992FE62065A827429DD1318B:0") |
42 | 54 | count, err = client.CheckPassword("paddednotpwned", true)
|
43 | 55 | assert.NoError(t, err)
|
44 | 56 | assert.Equal(t, 0, count)
|
45 | 57 |
|
46 |
| - gock.New("https://api.pwnedpasswords.com").Get("/range/79082").Times(1).Reply(200).BodyString("FDF342FCD8C3611DAE4D76E8A992A3E4169:4\r\nFE81480327C992FE62065A827429DD1318B:0\r\nAFEF386F56EB0B4BE314E07696E5E6E6536:0") |
47 | 58 | count, err = client.CheckPassword("paddednotpwnedzero", true)
|
48 | 59 | assert.NoError(t, err)
|
49 | 60 | assert.Equal(t, 0, count)
|
|
0 commit comments