aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/args.rs28
1 files changed, 26 insertions, 2 deletions
diff --git a/src/args.rs b/src/args.rs
index 3972995..3d6cac4 100644
--- a/src/args.rs
+++ b/src/args.rs
@@ -202,7 +202,7 @@ mod tests {
case("username:sha256:abcd", "username", "abcd", "sha256"),
case("username:sha512:abcd", "username", "abcd", "sha512")
)]
- fn parse_auth_valid(auth_string: &str, username: &str, password: &str, encrypt: &str) {
+ fn parse_single_auth_valid(auth_string: &str, username: &str, password: &str, encrypt: &str) {
assert_eq!(
parse_auth(auth_string).unwrap(),
create_required_auth(username, password, encrypt),
@@ -228,8 +228,32 @@ mod tests {
"Invalid format for password hash. Expected hex code"
),
)]
- fn parse_auth_invalid(auth_string: &str, err_msg: &str) {
+ fn parse_single_auth_invalid(auth_string: &str, err_msg: &str) {
let err = parse_auth(auth_string).unwrap_err();
assert_eq!(format!("{}", err), err_msg.to_owned());
}
+
+ #[test]
+ fn parse_multiple_auth_valid() -> Result<(), ContextualError> {
+ let hex2str = |x: &str| hex::decode(x).expect("Invalid hex code");
+
+ let pairs = [
+ ("usr0", auth::RequiredAuthPassword::Plain("pwd0".to_owned())),
+ ("usr1", auth::RequiredAuthPassword::Plain("pwd1".to_owned())),
+ ("usr2", auth::RequiredAuthPassword::Sha256(hex2str("abcd"))),
+ ("usr3", auth::RequiredAuthPassword::Sha512(hex2str("abcd"))),
+ ];
+
+ let mut expected = auth::RequiredAuth::new();
+ for (username, password) in pairs.iter() {
+ expected.insert(username.to_owned().to_string(), password.clone());
+ }
+
+ assert_eq!(
+ parse_auth("usr0:pwd0 usr1:pwd1 usr2:sha256:abcd usr3:sha512:abcd")?,
+ expected,
+ );
+
+ Ok(())
+ }
}