validators_sshkey_test.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package validators
  15. import (
  16. "testing"
  17. )
  18. func TestSSHKeyValidator(t *testing.T) {
  19. aKey := `
  20. -----BEGIN RSA PRIVATE KEY-----
  21. MIIEowIBAAKCAQEAvWB7GIQ5nuffEtS5L5fPvkBP8MjOLuuIkn+G+BS8HDhWkXr4
  22. jYokpPz/mXwdk2VmJONQw28XmAvJTLyT6xZPNOehBENm6VNakY7PJ4fXAoHFNMaF
  23. crkj3KmwjQXQAEX6Ul7vOVl8wRBMWQ3iQiR2OKvnIkrWZF7Y4lEQVJkHTPzp7GLv
  24. LjmiOEnOZdtrM6YtrRtIdfEk/vGDJL86xOAWmM7vMFrH9obuhyXwqtomGn+4II3C
  25. j4ShMWKQkmHoOOmd14At+fhHlKkvtAOtDOlCXB/svKSvqBfzjbYORHCtXXc8WvID
  26. yz2OCPgh9VgxAIcgfEt4cKvtZjz3hlcCgIY0qQIDAQABAoIBAQCPNCQhd+typHhl
  27. bwLSYIQxo8RPmimABY/y6AiSFGvjEx8zR8Aol+v5728BC3/589V304VBJAK9cTw5
  28. kOhx/x7KLNXvuWBa1DNKmqk/hVMrjCIqNGy5QhNCS/c7zMdrTX9rRmqz/V1/SOnS
  29. 9dLAnX3ggO15WwogQDDVguNMdaO1rMWtO/DZS53rVbhSxfM5JPq2oxAucDKxlhjT
  30. MGdF/iK3/NyRft36QEbBB9qG+97YvXUmXFF2UVFAro9k+nWzR7BLGhkcDRRc5FsK
  31. R/Vixe3G8pR9/XBs6MyWK/HlGBEvzdlehyEw1duGxEUNdBALcVtZXTZ37L6pn8G9
  32. yHSvzzcBAoGBAOPUGPC77CBR9d0YP+YydkTjayV+p55k1vhrW/uvlSKZO/LwZ5b5
  33. T/2qcmWt2SiXE6A6YUOwq2NJvBPeq+6WJBVqQoPsiVg7mc0j5/nP0TtH2GGgfPBm
  34. JKCG+bdrh5OcVkql5fdX35zLSDkKNnxASS4bEAISdViBelmPN/QH7ayxAoGBANTL
  35. MtnwhKj9Eas7yNfV6H1Va6AUuB3nx+ZDcFq/mPNzPE15Ddv3gqoQqi9doXe61oGx
  36. X4XfMiKBlo5Jzh2u5LcO6fAmV1itCi2pyWcKk8Nc+Aarc36HsOLao4sw1zczCVyt
  37. BF0TlxKeRpqBT/uQfmEThwbN8LUyoBKGl2oBWiV5AoGAHpW0m2y+8D/Qf9PnkCGq
  38. Gulk0u3D1tG2wja3bHxPywtDLwPzBCOIB4fAP8Is6vQNIG916z5mY7fcVdaIwkjJ
  39. o05Wi5tPfNbTeOSfGbw6XHjypXiEDUnJFPvJvkPjOX+9XdwTmTbkwAnSMkYatmdy
  40. 64uahIyx0CXhpPBDFLGTyKECgYAO4XLZ6MbuJlxg9BpUdaH/ecS/+hLyDG5fPOIT
  41. hoiEpc9Wv5tngYSCrg2oqEyNWeR8R1Idw4D3BsbnhmPCkaNu5b0YTSYYjmlCzjfG
  42. W+f/ZnX1yXGXLJgDFTUQm8bBFnGWKIdAlwkehTD8xwQ33F/qG/p6UFZ/5V1qTj0y
  43. bYvHSQKBgBwzshyuDA/QSxSVDn2HI3hK1202eAN2PERsBGP2VSAEpIwav2KvBVva
  44. p30+rx5gwUquGpB24gyHlZ0l3eVbONop84wOS8eoA4wUyXBlkgzvZvlFvJCpm8x1
  45. qtvUqlXM7TheLX3gGucB76fmc+wLs06QPHd0sxAlTGcwwBVOUPvH
  46. -----END RSA PRIVATE KEY-----
  47. `
  48. cases := []*C{
  49. {
  50. Name: "missing non-optional",
  51. In: `{}`,
  52. Out: `{}`,
  53. Optional: false,
  54. Err: ERR_MISSING_KEY,
  55. ValueWant: "",
  56. },
  57. {
  58. Name: "missing optional",
  59. In: `{}`,
  60. Out: `{}`,
  61. Optional: true,
  62. ValueWant: "",
  63. },
  64. {
  65. Name: "missing with default",
  66. In: `{}`,
  67. Out: `{s: "` + aKey + `"}`,
  68. Default: aKey,
  69. ValueWant: aKey,
  70. },
  71. {
  72. Name: "good in",
  73. In: `{"s": "` + aKey + `"}`,
  74. Out: `{"s": "` + aKey + `"}`,
  75. ValueWant: aKey,
  76. },
  77. {
  78. Name: "bad in",
  79. In: `{"s": "0"}`,
  80. Out: `{"s": "0"}`,
  81. Err: ERR_INVALID_VALUE,
  82. ValueWant: "",
  83. },
  84. }
  85. for _, c := range cases {
  86. t.Run(c.Name, func(t *testing.T) {
  87. v := NewSSHKeyValidator("s")
  88. if c.Default != nil {
  89. s := c.Default.(string)
  90. v.Default(s)
  91. }
  92. if c.Optional {
  93. v.Optional(true)
  94. }
  95. testS(t, v, c)
  96. })
  97. }
  98. }