2FAuth/tests/Api/v1/Requests/TwoFAccountUriRequestTest.php

109 lines
2.9 KiB
PHP
Raw Normal View History

2021-11-14 01:52:46 +01:00
<?php
namespace Tests\Api\v1\Requests;
use App\Api\v1\Requests\TwoFAccountUriRequest;
use Illuminate\Foundation\Testing\WithoutMiddleware;
use Illuminate\Support\Facades\Auth;
2022-11-22 15:15:52 +01:00
use Illuminate\Support\Facades\Validator;
2021-11-14 01:52:46 +01:00
use Tests\TestCase;
2022-12-09 10:52:17 +01:00
/**
* @covers \App\Api\v1\Requests\TwoFAccountUriRequest
*/
2021-11-14 01:52:46 +01:00
class TwoFAccountUriRequestTest extends TestCase
{
use WithoutMiddleware;
/**
* @test
*/
public function test_user_is_authorized()
2022-11-22 15:15:52 +01:00
{
2021-11-14 01:52:46 +01:00
Auth::shouldReceive('check')
2022-12-09 10:52:17 +01:00
->once()
->andReturn(true);
2021-11-14 01:52:46 +01:00
$request = new TwoFAccountUriRequest();
2022-11-22 15:15:52 +01:00
2021-11-14 01:52:46 +01:00
$this->assertTrue($request->authorize());
}
/**
* @dataProvider provideValidData
*/
2022-12-13 12:07:29 +01:00
public function test_valid_data(array $data) : void
2021-11-14 01:52:46 +01:00
{
2022-11-22 15:15:52 +01:00
$request = new TwoFAccountUriRequest();
2021-11-14 01:52:46 +01:00
$validator = Validator::make($data, $request->rules());
$this->assertFalse($validator->fails());
}
/**
* Provide Valid data for validation test
*/
2022-12-13 12:07:29 +01:00
public function provideValidData() : array
2021-11-14 01:52:46 +01:00
{
return [
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpauth://totp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test',
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpauth://hotp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test',
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpauth://totp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test',
'custom_otp' => 'steamtotp',
]],
2021-11-14 01:52:46 +01:00
];
}
/**
* @dataProvider provideInvalidData
*/
2022-12-13 12:07:29 +01:00
public function test_invalid_data(array $data) : void
2021-11-14 01:52:46 +01:00
{
2022-11-22 15:15:52 +01:00
$request = new TwoFAccountUriRequest();
2021-11-14 01:52:46 +01:00
$validator = Validator::make($data, $request->rules());
$this->assertTrue($validator->fails());
}
/**
* Provide invalid data for validation test
*/
2022-12-13 12:07:29 +01:00
public function provideInvalidData() : array
2021-11-14 01:52:46 +01:00
{
return [
[[
2022-11-22 15:15:52 +01:00
'uri' => null, // required
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => '', // required
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => true, // string
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 8, // string
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpXauth://totp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test', // regex
2021-11-14 01:52:46 +01:00
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpauth://totp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test',
'custom_otp' => 'notSteam', // not in
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpauth://totp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test',
'custom_otp' => 0, // string
]],
[[
2022-11-22 15:15:52 +01:00
'uri' => 'otpauth://totp/test@test.com?secret=A4GRFHZVRBGY7UIW&issuer=test',
'custom_otp' => true, // string
]],
2021-11-14 01:52:46 +01:00
];
}
2022-11-22 15:15:52 +01:00
}