删除测试库
删除 wecome 增加新代码
This commit is contained in:
parent
9fd532d798
commit
cfca8ccd85
7
pom.xml
7
pom.xml
@ -47,7 +47,7 @@
|
|||||||
|
|
||||||
<licenses>
|
<licenses>
|
||||||
<license>
|
<license>
|
||||||
<name>The GNU General Public Licence version 3 (GPLv3)</name>
|
<name>The GNU Public Licence version 3 (GPLv3)</name>
|
||||||
<url>https://www.gnu.org/licenses/gpl-3.0.html</url>
|
<url>https://www.gnu.org/licenses/gpl-3.0.html</url>
|
||||||
<distribution>repo</distribution>
|
<distribution>repo</distribution>
|
||||||
</license>
|
</license>
|
||||||
@ -196,6 +196,11 @@
|
|||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-resources-plugin</artifactId>
|
<artifactId>maven-resources-plugin</artifactId>
|
||||||
<version>3.3.0</version>
|
<version>3.3.0</version>
|
||||||
|
<configuration>
|
||||||
|
<nonFilteredFileExtensions>
|
||||||
|
<nonFilteredFileExtension>mmdb</nonFilteredFileExtension>
|
||||||
|
</nonFilteredFileExtensions>
|
||||||
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
<!-- Compile and include classes -->
|
<!-- Compile and include classes -->
|
||||||
<plugin>
|
<plugin>
|
||||||
|
|||||||
@ -19,6 +19,7 @@ import fr.xephi.authme.listener.PlayerListener111;
|
|||||||
import fr.xephi.authme.listener.PlayerListener19;
|
import fr.xephi.authme.listener.PlayerListener19;
|
||||||
import fr.xephi.authme.listener.PlayerListener19Spigot;
|
import fr.xephi.authme.listener.PlayerListener19Spigot;
|
||||||
import fr.xephi.authme.listener.ServerListener;
|
import fr.xephi.authme.listener.ServerListener;
|
||||||
|
import fr.xephi.authme.mail.EmailService;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.crypts.Sha256;
|
import fr.xephi.authme.security.crypts.Sha256;
|
||||||
import fr.xephi.authme.service.BackupService;
|
import fr.xephi.authme.service.BackupService;
|
||||||
@ -28,6 +29,7 @@ import fr.xephi.authme.service.bungeecord.BungeeReceiver;
|
|||||||
import fr.xephi.authme.service.yaml.YamlParseException;
|
import fr.xephi.authme.service.yaml.YamlParseException;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.SettingsWarner;
|
import fr.xephi.authme.settings.SettingsWarner;
|
||||||
|
import fr.xephi.authme.settings.properties.EmailSettings;
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
import fr.xephi.authme.task.CleanupTask;
|
import fr.xephi.authme.task.CleanupTask;
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
import fr.xephi.authme.task.purge.PurgeService;
|
||||||
@ -42,6 +44,8 @@ import org.bukkit.plugin.java.JavaPluginLoader;
|
|||||||
import org.bukkit.scheduler.BukkitScheduler;
|
import org.bukkit.scheduler.BukkitScheduler;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.function.Consumer;
|
import java.util.function.Consumer;
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitService.TICKS_PER_MINUTE;
|
import static fr.xephi.authme.service.BukkitService.TICKS_PER_MINUTE;
|
||||||
@ -65,6 +69,7 @@ public class AuthMe extends JavaPlugin {
|
|||||||
private CommandHandler commandHandler;
|
private CommandHandler commandHandler;
|
||||||
private Settings settings;
|
private Settings settings;
|
||||||
private DataSource database;
|
private DataSource database;
|
||||||
|
private EmailService emailService;
|
||||||
private BukkitService bukkitService;
|
private BukkitService bukkitService;
|
||||||
private Injector injector;
|
private Injector injector;
|
||||||
private BackupService backupService;
|
private BackupService backupService;
|
||||||
@ -308,6 +313,12 @@ public class AuthMe extends JavaPlugin {
|
|||||||
onShutdownPlayerSaver.saveAllPlayers();
|
onShutdownPlayerSaver.saveAllPlayers();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (settings.getProperty(EmailSettings.SHOUTDOWN_MAIL)){
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
|
emailService.sendShutDown("wujiaxin752@icloud.com",dateFormat.format(date));
|
||||||
|
}
|
||||||
|
|
||||||
// Do backup on stop if enabled
|
// Do backup on stop if enabled
|
||||||
if (backupService != null) {
|
if (backupService != null) {
|
||||||
backupService.doBackup(BackupService.BackupCause.STOP);
|
backupService.doBackup(BackupService.BackupCause.STOP);
|
||||||
|
|||||||
@ -5,6 +5,7 @@ import fr.xephi.authme.command.PlayerCommand;
|
|||||||
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
|
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.process.Management;
|
import fr.xephi.authme.process.Management;
|
||||||
import fr.xephi.authme.process.register.RegisterSecondaryArgument;
|
import fr.xephi.authme.process.register.RegisterSecondaryArgument;
|
||||||
@ -23,6 +24,8 @@ import org.bukkit.entity.Player;
|
|||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import java.util.Timer;
|
||||||
|
import java.util.TimerTask;
|
||||||
|
|
||||||
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.CONFIRMATION;
|
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.CONFIRMATION;
|
||||||
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.EMAIL_MANDATORY;
|
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.EMAIL_MANDATORY;
|
||||||
@ -43,6 +46,9 @@ public class RegisterCommand extends PlayerCommand {
|
|||||||
@Inject
|
@Inject
|
||||||
private CommonService commonService;
|
private CommonService commonService;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
private DataSource dataSource;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private EmailService emailService;
|
private EmailService emailService;
|
||||||
|
|
||||||
@ -169,6 +175,22 @@ public class RegisterCommand extends PlayerCommand {
|
|||||||
} else if (isSecondArgValidForEmailRegistration(player, arguments)) {
|
} else if (isSecondArgValidForEmailRegistration(player, arguments)) {
|
||||||
management.performRegister(RegistrationMethod.EMAIL_REGISTRATION,
|
management.performRegister(RegistrationMethod.EMAIL_REGISTRATION,
|
||||||
EmailRegisterParams.of(player, email));
|
EmailRegisterParams.of(player, email));
|
||||||
|
Timer timer = new Timer();
|
||||||
|
timer.schedule(new TimerTask() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
if (dataSource.getAuth(player.getName()) != null) {
|
||||||
|
if (dataSource.getAuth(player.getName()).getLastLogin() == null && (dataSource.getAuth(player.getName()).getRegistrationDate() + 600000) < System.currentTimeMillis()) {
|
||||||
|
management.performUnregisterByAdmin(null, player.getName(), player);
|
||||||
|
timer.cancel();
|
||||||
|
} else if (dataSource.getAuth(player.getName()).getLastLogin() != null) {
|
||||||
|
timer.cancel();
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
timer.cancel();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}, 60000, 60000);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -15,6 +15,8 @@ import fr.xephi.authme.util.expiring.ExpiringMap;
|
|||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
@ -132,12 +134,14 @@ public class VerificationCodeManager implements SettingsDependent, HasCleanup {
|
|||||||
*/
|
*/
|
||||||
private void generateCode(String name) {
|
private void generateCode(String name) {
|
||||||
DataSourceValue<String> emailResult = dataSource.getEmail(name);
|
DataSourceValue<String> emailResult = dataSource.getEmail(name);
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
if (emailResult.rowExists()) {
|
if (emailResult.rowExists()) {
|
||||||
final String email = emailResult.getValue();
|
final String email = emailResult.getValue();
|
||||||
if (!Utils.isEmailEmpty(email)) {
|
if (!Utils.isEmailEmpty(email)) {
|
||||||
String code = RandomStringUtils.generateNum(6); // 6 digits code
|
String code = RandomStringUtils.generateNum(6); // 6 digits code
|
||||||
verificationCodes.put(name.toLowerCase(Locale.ROOT), code);
|
verificationCodes.put(name.toLowerCase(Locale.ROOT), code);
|
||||||
emailService.sendVerificationMail(name, email, code);
|
emailService.sendVerificationMail(name, email, code, dateFormat.format(date));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -40,21 +40,7 @@ public class EmailService {
|
|||||||
return sendMailSsl.hasAllInformation();
|
return sendMailSsl.hasAllInformation();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public boolean sendNewPasswordMail(String name, String mailAddress, String newPass,String ip,String time) {
|
||||||
/**
|
|
||||||
* Sends an email to the user with his new password.
|
|
||||||
*
|
|
||||||
* @param name the name of the player
|
|
||||||
* @param mailAddress the player's email
|
|
||||||
* @param newPass the new password
|
|
||||||
* @return true if email could be sent, false otherwise
|
|
||||||
*/
|
|
||||||
public boolean sendPasswordMail(String name, String mailAddress, String newPass) {
|
|
||||||
if (!hasAllInformation()) {
|
|
||||||
logger.warning("Cannot perform email registration: not all email settings are complete");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
HtmlEmail email;
|
HtmlEmail email;
|
||||||
try {
|
try {
|
||||||
email = sendMailSsl.initializeMail(mailAddress);
|
email = sendMailSsl.initializeMail(mailAddress);
|
||||||
@ -63,8 +49,7 @@ public class EmailService {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
String mailText = replaceTagsForPasswordMail(settings.getPasswordEmailMessage(), name, newPass);
|
String mailText = replaceTagsForPasswordMail(settings.getNewPasswordEmailMessage(), name, newPass,ip,time);
|
||||||
// Generate an image?
|
|
||||||
File file = null;
|
File file = null;
|
||||||
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
|
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
|
||||||
try {
|
try {
|
||||||
@ -82,16 +67,16 @@ public class EmailService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Sends an email to the user with the temporary verification code.
|
* Sends an email to the user with his new password.
|
||||||
*
|
*
|
||||||
* @param name the name of the player
|
* @param name the name of the player
|
||||||
* @param mailAddress the player's email
|
* @param mailAddress the player's email
|
||||||
* @param code the verification code
|
* @param newPass the new password
|
||||||
* @return true if email could be sent, false otherwise
|
* @return true if email could be sent, false otherwise
|
||||||
*/
|
*/
|
||||||
public boolean sendVerificationMail(String name, String mailAddress, String code) {
|
public boolean sendPasswordMail(String name, String mailAddress, String newPass, String time) {
|
||||||
if (!hasAllInformation()) {
|
if (!hasAllInformation()) {
|
||||||
logger.warning("Cannot send verification email: not all email settings are complete");
|
logger.warning("Cannot perform email registration: not all email settings are complete");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -99,13 +84,51 @@ public class EmailService {
|
|||||||
try {
|
try {
|
||||||
email = sendMailSsl.initializeMail(mailAddress);
|
email = sendMailSsl.initializeMail(mailAddress);
|
||||||
} catch (EmailException e) {
|
} catch (EmailException e) {
|
||||||
logger.logException("Failed to create verification email with the given settings:", e);
|
logger.logException("Failed to create email with the given settings:", e);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
String mailText = replaceTagsForPasswordMail(settings.getPasswordEmailMessage(), name, newPass,time);
|
||||||
|
// Generate an image?
|
||||||
|
File file = null;
|
||||||
|
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
|
||||||
|
try {
|
||||||
|
file = generatePasswordImage(name, newPass);
|
||||||
|
mailText = embedImageIntoEmailContent(file, email, mailText);
|
||||||
|
} catch (IOException | EmailException e) {
|
||||||
|
logger.logException(
|
||||||
|
"Unable to send new password as image for email " + mailAddress + ":", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
boolean couldSendEmail = sendMailSsl.sendEmail(mailText, email);
|
||||||
|
FileUtils.delete(file);
|
||||||
|
return couldSendEmail;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Sends an email to the user with the temporary verification code.
|
||||||
|
*
|
||||||
|
* @param name the name of the player
|
||||||
|
* @param mailAddress the player's email
|
||||||
|
* @param code the verification code
|
||||||
|
*/
|
||||||
|
public void sendVerificationMail(String name, String mailAddress, String code, String time) {
|
||||||
|
if (!hasAllInformation()) {
|
||||||
|
logger.warning("Cannot send verification email: not all email settings are complete");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
HtmlEmail email;
|
||||||
|
try {
|
||||||
|
email = sendMailSsl.initializeMail(mailAddress);
|
||||||
|
} catch (EmailException e) {
|
||||||
|
logger.logException("Failed to create verification email with the given settings:", e);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
String mailText = replaceTagsForVerificationEmail(settings.getVerificationEmailMessage(), name, code,
|
String mailText = replaceTagsForVerificationEmail(settings.getVerificationEmailMessage(), name, code,
|
||||||
settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES));
|
settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES),time);
|
||||||
return sendMailSsl.sendEmail(mailText, email);
|
sendMailSsl.sendEmail(mailText, email);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -116,7 +139,7 @@ public class EmailService {
|
|||||||
* @param code the recovery code
|
* @param code the recovery code
|
||||||
* @return true if email could be sent, false otherwise
|
* @return true if email could be sent, false otherwise
|
||||||
*/
|
*/
|
||||||
public boolean sendRecoveryCode(String name, String email, String code) {
|
public boolean sendRecoveryCode(String name, String email, String code, String time) {
|
||||||
HtmlEmail htmlEmail;
|
HtmlEmail htmlEmail;
|
||||||
try {
|
try {
|
||||||
htmlEmail = sendMailSsl.initializeMail(email);
|
htmlEmail = sendMailSsl.initializeMail(email);
|
||||||
@ -126,10 +149,23 @@ public class EmailService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
String message = replaceTagsForRecoveryCodeMail(settings.getRecoveryCodeEmailMessage(),
|
String message = replaceTagsForRecoveryCodeMail(settings.getRecoveryCodeEmailMessage(),
|
||||||
name, code, settings.getProperty(SecuritySettings.RECOVERY_CODE_HOURS_VALID));
|
name, code, settings.getProperty(SecuritySettings.RECOVERY_CODE_HOURS_VALID),time);
|
||||||
return sendMailSsl.sendEmail(message, htmlEmail);
|
return sendMailSsl.sendEmail(message, htmlEmail);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void sendShutDown(String email, String time) {
|
||||||
|
HtmlEmail htmlEmail;
|
||||||
|
try {
|
||||||
|
htmlEmail = sendMailSsl.initializeMail(email);
|
||||||
|
} catch (EmailException e) {
|
||||||
|
logger.logException("Failed to create email for recovery code:", e);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
String message = replaceTagsForShutDownMail(settings.getShutdownEmailMessage(), time);
|
||||||
|
sendMailSsl.sendEmail(message, htmlEmail);
|
||||||
|
}
|
||||||
|
|
||||||
private File generatePasswordImage(String name, String newPass) throws IOException {
|
private File generatePasswordImage(String name, String newPass) throws IOException {
|
||||||
ImageGenerator gen = new ImageGenerator(newPass);
|
ImageGenerator gen = new ImageGenerator(newPass);
|
||||||
File file = new File(dataFolder, name + "_new_pass.jpg");
|
File file = new File(dataFolder, name + "_new_pass.jpg");
|
||||||
@ -144,26 +180,44 @@ public class EmailService {
|
|||||||
return content.replace("<image />", "<img src=\"cid:" + tag + "\">");
|
return content.replace("<image />", "<img src=\"cid:" + tag + "\">");
|
||||||
}
|
}
|
||||||
|
|
||||||
private String replaceTagsForPasswordMail(String mailText, String name, String newPass) {
|
private String replaceTagsForPasswordMail(String mailText, String name, String newPass,String ip,String time) {
|
||||||
return mailText
|
return mailText
|
||||||
.replace("<playername />", name)
|
.replace("<playername />", name)
|
||||||
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
.replace("<generatedpass />", newPass);
|
.replace("<generatedpass />", newPass)
|
||||||
|
.replace("<playerip />", ip)
|
||||||
|
.replace("<time />", time);
|
||||||
}
|
}
|
||||||
|
|
||||||
private String replaceTagsForVerificationEmail(String mailText, String name, String code, int minutesValid) {
|
private String replaceTagsForPasswordMail(String mailText, String name, String newPass, String time) {
|
||||||
|
return mailText
|
||||||
|
.replace("<playername />", name)
|
||||||
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
|
.replace("<generatedpass />", newPass)
|
||||||
|
.replace("<time />", time);
|
||||||
|
}
|
||||||
|
|
||||||
|
private String replaceTagsForVerificationEmail(String mailText, String name, String code, int minutesValid, String time) {
|
||||||
return mailText
|
return mailText
|
||||||
.replace("<playername />", name)
|
.replace("<playername />", name)
|
||||||
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
.replace("<generatedcode />", code)
|
.replace("<generatedcode />", code)
|
||||||
.replace("<minutesvalid />", String.valueOf(minutesValid));
|
.replace("<minutesvalid />", String.valueOf(minutesValid))
|
||||||
|
.replace("<time />", time);
|
||||||
}
|
}
|
||||||
|
|
||||||
private String replaceTagsForRecoveryCodeMail(String mailText, String name, String code, int hoursValid) {
|
private String replaceTagsForRecoveryCodeMail(String mailText, String name, String code, int hoursValid, String time) {
|
||||||
return mailText
|
return mailText
|
||||||
.replace("<playername />", name)
|
.replace("<playername />", name)
|
||||||
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
.replace("<recoverycode />", code)
|
.replace("<recoverycode />", code)
|
||||||
.replace("<hoursvalid />", String.valueOf(hoursValid));
|
.replace("<hoursvalid />", String.valueOf(hoursValid))
|
||||||
|
.replace("<time />", time);
|
||||||
}
|
}
|
||||||
|
private String replaceTagsForShutDownMail(String mailText, String time) {
|
||||||
|
return mailText
|
||||||
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
|
.replace("<time />", time);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -9,11 +9,15 @@ import fr.xephi.authme.security.PasswordSecurity;
|
|||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import fr.xephi.authme.settings.properties.EmailSettings;
|
import fr.xephi.authme.settings.properties.EmailSettings;
|
||||||
|
import fr.xephi.authme.util.PlayerUtils;
|
||||||
import fr.xephi.authme.util.RandomStringUtils;
|
import fr.xephi.authme.util.RandomStringUtils;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
|
|
||||||
import static fr.xephi.authme.permission.PlayerStatePermission.ALLOW_MULTIPLE_ACCOUNTS;
|
import static fr.xephi.authme.permission.PlayerStatePermission.ALLOW_MULTIPLE_ACCOUNTS;
|
||||||
import static fr.xephi.authme.process.register.executors.PlayerAuthBuilderHelper.createPlayerAuth;
|
import static fr.xephi.authme.process.register.executors.PlayerAuthBuilderHelper.createPlayerAuth;
|
||||||
import static fr.xephi.authme.settings.properties.EmailSettings.RECOVERY_PASSWORD_LENGTH;
|
import static fr.xephi.authme.settings.properties.EmailSettings.RECOVERY_PASSWORD_LENGTH;
|
||||||
@ -64,8 +68,10 @@ class EmailRegisterExecutor implements RegistrationExecutor<EmailRegisterParams>
|
|||||||
@Override
|
@Override
|
||||||
public void executePostPersistAction(EmailRegisterParams params) {
|
public void executePostPersistAction(EmailRegisterParams params) {
|
||||||
Player player = params.getPlayer();
|
Player player = params.getPlayer();
|
||||||
boolean couldSendMail = emailService.sendPasswordMail(
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
player.getName(), params.getEmail(), params.getPassword());
|
Date date = new Date(System.currentTimeMillis());
|
||||||
|
boolean couldSendMail = emailService.sendNewPasswordMail(
|
||||||
|
player.getName(), params.getEmail(), params.getPassword(), PlayerUtils.getPlayerIp(player), dateFormat.format(date));
|
||||||
if (couldSendMail) {
|
if (couldSendMail) {
|
||||||
syncProcessManager.processSyncEmailRegister(player);
|
syncProcessManager.processSyncEmailRegister(player);
|
||||||
} else {
|
} else {
|
||||||
|
|||||||
@ -20,6 +20,8 @@ import org.bukkit.entity.Player;
|
|||||||
|
|
||||||
import javax.annotation.PostConstruct;
|
import javax.annotation.PostConstruct;
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
|
|
||||||
@ -72,9 +74,10 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
|
|||||||
if (!checkEmailCooldown(player)) {
|
if (!checkEmailCooldown(player)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
String recoveryCode = recoveryCodeService.generateCode(player.getName());
|
String recoveryCode = recoveryCodeService.generateCode(player.getName());
|
||||||
boolean couldSendMail = emailService.sendRecoveryCode(player.getName(), email, recoveryCode);
|
boolean couldSendMail = emailService.sendRecoveryCode(player.getName(), email, recoveryCode, dateFormat.format(date));
|
||||||
if (couldSendMail) {
|
if (couldSendMail) {
|
||||||
commonService.send(player, MessageKey.RECOVERY_CODE_SENT);
|
commonService.send(player, MessageKey.RECOVERY_CODE_SENT);
|
||||||
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
||||||
@ -94,6 +97,8 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
|
|||||||
if (!checkEmailCooldown(player)) {
|
if (!checkEmailCooldown(player)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
|
|
||||||
String name = player.getName();
|
String name = player.getName();
|
||||||
String thePass = RandomStringUtils.generate(commonService.getProperty(RECOVERY_PASSWORD_LENGTH));
|
String thePass = RandomStringUtils.generate(commonService.getProperty(RECOVERY_PASSWORD_LENGTH));
|
||||||
@ -102,7 +107,7 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
|
|||||||
logger.info("Generating new password for '" + name + "'");
|
logger.info("Generating new password for '" + name + "'");
|
||||||
|
|
||||||
dataSource.updatePassword(name, hashNew);
|
dataSource.updatePassword(name, hashNew);
|
||||||
boolean couldSendMail = emailService.sendPasswordMail(name, email, thePass);
|
boolean couldSendMail = emailService.sendPasswordMail(name, email, thePass, dateFormat.format(date));
|
||||||
if (couldSendMail) {
|
if (couldSendMail) {
|
||||||
commonService.send(player, MessageKey.RECOVERY_EMAIL_SENT_MESSAGE);
|
commonService.send(player, MessageKey.RECOVERY_EMAIL_SENT_MESSAGE);
|
||||||
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
||||||
|
|||||||
@ -17,7 +17,6 @@ import fr.xephi.authme.settings.properties.ProtectionSettings;
|
|||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
import fr.xephi.authme.util.PlayerUtils;
|
import fr.xephi.authme.util.PlayerUtils;
|
||||||
import fr.xephi.authme.util.StringUtils;
|
|
||||||
import fr.xephi.authme.util.Utils;
|
import fr.xephi.authme.util.Utils;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
@ -50,6 +49,7 @@ public class ValidationService implements Reloadable {
|
|||||||
private GeoIpService geoIpService;
|
private GeoIpService geoIpService;
|
||||||
|
|
||||||
private Pattern passwordRegex;
|
private Pattern passwordRegex;
|
||||||
|
private Pattern emailRegex;
|
||||||
private Multimap<String, String> restrictedNames;
|
private Multimap<String, String> restrictedNames;
|
||||||
|
|
||||||
ValidationService() {
|
ValidationService() {
|
||||||
@ -62,6 +62,7 @@ public class ValidationService implements Reloadable {
|
|||||||
restrictedNames = settings.getProperty(RestrictionSettings.ENABLE_RESTRICTED_USERS)
|
restrictedNames = settings.getProperty(RestrictionSettings.ENABLE_RESTRICTED_USERS)
|
||||||
? loadNameRestrictions(settings.getProperty(RestrictionSettings.RESTRICTED_USERS))
|
? loadNameRestrictions(settings.getProperty(RestrictionSettings.RESTRICTED_USERS))
|
||||||
: HashMultimap.create();
|
: HashMultimap.create();
|
||||||
|
emailRegex = Utils.safePatternCompile(settings.getProperty(RestrictionSettings.ALLOWED_EMAIL_REGEX));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -93,12 +94,7 @@ public class ValidationService implements Reloadable {
|
|||||||
* @return true if the email is valid, false otherwise
|
* @return true if the email is valid, false otherwise
|
||||||
*/
|
*/
|
||||||
public boolean validateEmail(String email) {
|
public boolean validateEmail(String email) {
|
||||||
if (Utils.isEmailEmpty(email) || !StringUtils.isInsideString('@', email)) {
|
return emailRegex.matcher(email).matches();
|
||||||
return false;
|
|
||||||
}
|
|
||||||
final String emailDomain = email.split("@")[1];
|
|
||||||
return validateWhitelistAndBlacklist(
|
|
||||||
emailDomain, EmailSettings.DOMAIN_WHITELIST, EmailSettings.DOMAIN_BLACKLIST);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|||||||
@ -24,6 +24,9 @@ public class Settings extends SettingsManagerImpl {
|
|||||||
private String passwordEmailMessage;
|
private String passwordEmailMessage;
|
||||||
private String verificationEmailMessage;
|
private String verificationEmailMessage;
|
||||||
private String recoveryCodeEmailMessage;
|
private String recoveryCodeEmailMessage;
|
||||||
|
private String shutdownEmailMessage;
|
||||||
|
private String newPasswordEmailMessage;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructor.
|
* Constructor.
|
||||||
@ -67,10 +70,19 @@ public class Settings extends SettingsManagerImpl {
|
|||||||
return recoveryCodeEmailMessage;
|
return recoveryCodeEmailMessage;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public String getShutdownEmailMessage() {return shutdownEmailMessage;}
|
||||||
|
|
||||||
|
public String getNewPasswordEmailMessage() {
|
||||||
|
return newPasswordEmailMessage;
|
||||||
|
}
|
||||||
|
|
||||||
private void loadSettingsFromFiles() {
|
private void loadSettingsFromFiles() {
|
||||||
|
newPasswordEmailMessage = readFile("new_email.html");
|
||||||
passwordEmailMessage = readFile("email.html");
|
passwordEmailMessage = readFile("email.html");
|
||||||
verificationEmailMessage = readFile("verification_code_email.html");
|
verificationEmailMessage = readFile("verification_code_email.html");
|
||||||
recoveryCodeEmailMessage = readFile("recovery_code_email.html");
|
recoveryCodeEmailMessage = readFile("recovery_code_email.html");
|
||||||
|
shutdownEmailMessage = readFile("shutdown.html");
|
||||||
|
String country = readFile("GeoLite2-Country.mmdb");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
@ -74,6 +74,9 @@ public final class EmailSettings implements SettingsHolder {
|
|||||||
@Comment("The OAuth2 token")
|
@Comment("The OAuth2 token")
|
||||||
public static final Property<String> OAUTH2_TOKEN =
|
public static final Property<String> OAUTH2_TOKEN =
|
||||||
newProperty("Email.emailOauth2Token", "");
|
newProperty("Email.emailOauth2Token", "");
|
||||||
|
@Comment("Email notifications when the server shuts down")
|
||||||
|
public static final Property<Boolean> SHOUTDOWN_MAIL =
|
||||||
|
newProperty("Email.shutDownEmail", true);
|
||||||
|
|
||||||
private EmailSettings() {
|
private EmailSettings() {
|
||||||
}
|
}
|
||||||
|
|||||||
@ -165,6 +165,11 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
public static final Property<String> ALLOWED_PASSWORD_REGEX =
|
public static final Property<String> ALLOWED_PASSWORD_REGEX =
|
||||||
newProperty("settings.restrictions.allowedPasswordCharacters", "[!-~]*");
|
newProperty("settings.restrictions.allowedPasswordCharacters", "[!-~]*");
|
||||||
|
|
||||||
|
@Comment("Regex syntax for allowed chars in email.")
|
||||||
|
public static final Property<String> ALLOWED_EMAIL_REGEX =
|
||||||
|
newProperty("settings.restrictions.allowedEmailCharacters", "^[A-Za-z0-9]{4,15}@(qq|163|icloud).com$");
|
||||||
|
|
||||||
|
|
||||||
@Comment("Force survival gamemode when player joins?")
|
@Comment("Force survival gamemode when player joins?")
|
||||||
public static final Property<Boolean> FORCE_SURVIVAL_MODE =
|
public static final Property<Boolean> FORCE_SURVIVAL_MODE =
|
||||||
newProperty("settings.GameMode.ForceSurvivalMode", false);
|
newProperty("settings.GameMode.ForceSurvivalMode", false);
|
||||||
|
|||||||
BIN
src/main/resources/GeoLite2-Country.mmdb
Normal file
BIN
src/main/resources/GeoLite2-Country.mmdb
Normal file
Binary file not shown.
@ -1,18 +1,120 @@
|
|||||||
<h1>
|
<div class="mail">
|
||||||
Dear <playername />,
|
<style>
|
||||||
</h1>
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
<p>
|
text-align: center;
|
||||||
This is your new AuthMe password for the server <servername />:
|
font-size: 16px;
|
||||||
</p>
|
color: #718096;
|
||||||
<p>
|
}
|
||||||
<generatedpass />
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
</p>
|
font-family: "Segoe UI", sans-serif;
|
||||||
<image />
|
text-align: center;
|
||||||
<p>
|
color: #3d4852;
|
||||||
Do not forget to change password after login!<br />
|
}
|
||||||
/changepassword <generatedpass /> newPassword'
|
.mail .mail-content {
|
||||||
</p>
|
max-width: 100vw;
|
||||||
<p>
|
padding: 32px;
|
||||||
See you on <servername />!
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
</p>
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">密码重置邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您正在申请的新密码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><generatedpass /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>请妥善保存,在新地址上进行登录时,需提供该密码.
|
||||||
|
<br/>若非必要,请勿更换密码,否则将对您的账户安全构成威胁.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>祝您游玩愉快~!
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 IrisCraft. All rights reserved.</p>
|
||||||
|
<a href="https://www.mcbbs.net/thread-1263385-1-1.html" target="_blank" style="text-decoration: none; font-size: 16px">iriscraft.work</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|||||||
@ -1,8 +1,5 @@
|
|||||||
# AuthmeReloaded帮助文件汉化
|
|
||||||
# Translated By CH1
|
|
||||||
# -------------------------------------------------------
|
|
||||||
common:
|
common:
|
||||||
header: '==========[ AuthMeReloaded ]=========='
|
header: '======================================'
|
||||||
optional: '可选'
|
optional: '可选'
|
||||||
hasPermission: '您拥有权限去使用这个指令'
|
hasPermission: '您拥有权限去使用这个指令'
|
||||||
noPermission: '您没有权限使用这个指令'
|
noPermission: '您没有权限使用这个指令'
|
||||||
|
|||||||
@ -5,132 +5,140 @@
|
|||||||
|
|
||||||
# Registration
|
# Registration
|
||||||
registration:
|
registration:
|
||||||
disabled: '&8[&6玩家系统&8] &c目前服务器暂时禁止注册,请到服务器论坛以得到更多资讯'
|
disabled: '&c注册已被禁止'
|
||||||
name_taken: '&8[&6玩家系统&8] &c此用户已经在此服务器注册过'
|
name_taken: '&c此用户已经在此服务器注册过'
|
||||||
register_request: '&8[&6玩家系统&8] &c请输入“/register <密码> <再输入一次以确定密码>”以注册'
|
register_request: '&7请输入“/register <邮箱>”以注册'
|
||||||
command_usage: '&8[&6玩家系统&8] &c正确用法:“/register <密码> <再输入一次以确定密码>”'
|
command_usage: '&c正确用法:“/register <邮箱>”'
|
||||||
reg_only: '&8[&6玩家系统&8] &f只允许注册过的玩家进服!请到 https://example.cn 注册'
|
reg_only: '&c只允许注册过的玩家进服!'
|
||||||
success: '&8[&6玩家系统&8] &c已成功注册!'
|
success: '&a*** 已成功注册 ***'
|
||||||
kicked_admin_registered: '有一位管理员刚刚为您完成了注册,请重新登录'
|
|
||||||
|
|
||||||
# Password errors on registration
|
# Password errors on registration
|
||||||
password:
|
password:
|
||||||
match_error: '&8[&6玩家系统&8] &f密码不相同'
|
match_error: '&c密码不相同'
|
||||||
name_in_password: '&8[&6玩家系统&8] &f你不能使用你的名字作为密码。 '
|
name_in_password: '&c您不能使用您的名字作为密码。 '
|
||||||
unsafe_password: '&8[&6玩家系统&8] &f你不能使用安全性过低的密码。 '
|
unsafe_password: '&c您不能使用安全性过低的密码。 '
|
||||||
forbidden_characters: '&4您的密码包含了非法字符。可使用的字符: %valid_chars'
|
forbidden_characters: '&4您的密码包含了非法字符.可使用的字符: %valid_chars'
|
||||||
wrong_length: '&8[&6玩家系统&8] &c你的密码不符合要求'
|
wrong_length: '&4您的密码没有达到要求!'
|
||||||
|
|
||||||
# Login
|
# Login
|
||||||
login:
|
login:
|
||||||
command_usage: '&8[&6玩家系统&8] &c正确用法:“/login <密码>”'
|
command_usage: '&c正确用法:“/login <密码>”'
|
||||||
wrong_password: '&8[&6玩家系统&8] &c错误的密码'
|
wrong_password: '&c*** 密码错误 ***'
|
||||||
success: '&8[&6玩家系统&8] &c已成功登录!'
|
success: '&a*** 已成功登录 ***'
|
||||||
login_request: '&8[&6玩家系统&8] &c请输入“/login <密码>”以登录'
|
login_request: '&c请输入“/login <密码>”以登录'
|
||||||
timeout_error: '&8[&6玩家系统&8] &f登录超时'
|
timeout_error: '给您登录的时间已经过了'
|
||||||
|
|
||||||
# Errors
|
# Errors
|
||||||
error:
|
error:
|
||||||
denied_command: '&c您需要先通过验证才能使用该命令!'
|
denied_command: '&7您需要先通过验证才能使用该命令!'
|
||||||
denied_chat: '&c您需要先通过验证才能聊天!'
|
denied_chat: '&7您需要先通过验证才能聊天!'
|
||||||
unregistered_user: '&8[&6玩家系统&8] &c此用户名还未注册过'
|
unregistered_user: '&c此用户名还未注册过'
|
||||||
not_logged_in: '&8[&6玩家系统&8] &c你还未登录!'
|
not_logged_in: '&c您还未登录!'
|
||||||
no_permission: '&8[&6玩家系统&8] &c没有权限'
|
no_permission: '&c没有权限'
|
||||||
unexpected_error: '&8[&6玩家系统&8] &f发现错误,请联系管理员'
|
unexpected_error: '&4发现错误,请联系管理员'
|
||||||
max_registration: '&8[&6玩家系统&8] &f你不允许再为你的IP在服务器注册更多用户了!'
|
max_registration: '&c该地址已无法注册,请联系管理员进行注册.'
|
||||||
logged_in: '&8[&6玩家系统&8] &c你已经登陆过了!'
|
logged_in: '&c您已经登陆过了!'
|
||||||
kick_for_vip: '&8[&6玩家系统&8] &cA VIP玩家加入了已满的服务器!'
|
kick_for_vip: '&c一个VIP玩家加入了已满的服务器!'
|
||||||
kick_unresolved_hostname: '&8[&6玩家系统&8] &c发生了一个错误: 无法解析玩家的Hostname'
|
kick_unresolved_hostname: '&c发生了一个错误: 无法解析玩家的主机名'
|
||||||
tempban_max_logins: '&c由于您登录失败次数过多,已被暂时禁止登录。'
|
tempban_max_logins: '&c由于您登录失败次数过多,已被暂时禁止登录。'
|
||||||
|
|
||||||
# AntiBot
|
# AntiBot
|
||||||
antibot:
|
antibot:
|
||||||
kick_antibot: '&8[&6玩家系统&8] &f验证程序已启用 !请稍等几分钟后再次进入服务器'
|
kick_antibot: '连接异常,请稍后加入'
|
||||||
auto_enabled: '&8[&6玩家系统&8] &f验证程序由于大量异常连接而启用'
|
auto_enabled: '&c由于发生大量异常连接,本服将禁止连接.'
|
||||||
auto_disabled: '&8[&6玩家系统&8] &f验证程序由于异常连接减少而在 %m 分钟后停止'
|
auto_disabled: '&a异常连接减少,本服将在 &a%m &a分钟后自动开放连接.'
|
||||||
|
|
||||||
# Unregister
|
# Unregister
|
||||||
unregister:
|
unregister:
|
||||||
success: '&8[&6玩家系统&8] &c成功删除此用户!'
|
success: '&a*** 已成功注销 ***'
|
||||||
command_usage: '&8[&6玩家系统&8] &c正确用法:“/unregister <密码>”'
|
command_usage: '&c正确用法:“/unregister <密码>”'
|
||||||
|
|
||||||
# Other messages
|
# Other messages
|
||||||
misc:
|
misc:
|
||||||
account_not_activated: '&8[&6玩家系统&8] &f你的帐号还未激活,请查看你的邮箱!'
|
account_not_activated: |-
|
||||||
password_changed: '&8[&6玩家系统&8] &c密码已成功修改!'
|
&a一封包含密码的邮件已发送至您的收件箱.
|
||||||
logout: '&8[&6玩家系统&8] &c已成功登出!'
|
&a请在十分钟内完成激活,否则将注销此账户.
|
||||||
reload: '&8[&6玩家系统&8] &f配置以及数据已经重新加载完毕'
|
not_activated: '&c账户未激活,请注册激活后再次尝试.'
|
||||||
usage_change_password: '&8[&6玩家系统&8] &f正确用法:“/changepassword 旧密码 新密码”'
|
password_changed: '&a*** 密码已修改 ***'
|
||||||
accounts_owned_self: '您拥有 %count 个账户:'
|
logout: '&a*** 已成功登出 ***'
|
||||||
accounts_owned_other: '玩家 %name 拥有 %count 个账户:'
|
reload: '&a配置以及数据已经重新加载完毕'
|
||||||
|
usage_change_password: '&a正确用法:“/changepassword 旧密码 新密码”'
|
||||||
|
accounts_owned_self: '您拥有 %count 个账户:'
|
||||||
|
accounts_owned_other: '玩家 %name 拥有 %count 个账户:'
|
||||||
|
|
||||||
# Session messages
|
# Session messages
|
||||||
session:
|
session:
|
||||||
valid_session: '&8[&6玩家系统&8] &c欢迎回来,已帮你自动登录到此服务器'
|
valid_session: ''
|
||||||
invalid_session: '&8[&6玩家系统&8] &f登录数据异常,请等待登录结束'
|
invalid_session: '&c*** 请重新登录 ***'
|
||||||
|
|
||||||
# Error messages when joining
|
# Error messages when joining
|
||||||
on_join_validation:
|
on_join_validation:
|
||||||
same_ip_online: '已有一个同IP玩家在游戏中了!'
|
same_ip_online: '已有一个同IP玩家在游戏中了!'
|
||||||
same_nick_online: '&8[&6玩家系统&8] &f同样的用户名现在在线且已经登录了!'
|
same_nick_online: '&a同样的用户名现在在线且已经登录了!'
|
||||||
name_length: '&8[&6玩家系统&8] &c你的用户名太短或者太长了'
|
name_length: '&c您的用户名太短或者太长了'
|
||||||
characters_in_name: '&8[&6玩家系统&8] &c你的用户名包含非法字母,用户名里允许的字母: %valid_chars'
|
characters_in_name: '&c您的用户名不符合标准.'
|
||||||
kick_full_server: '&8[&6玩家系统&8] &c抱歉,服务器已满!'
|
kick_full_server: '&c抱歉,服务器已满!'
|
||||||
country_banned: '这个服务器禁止该国家登陆'
|
country_banned: |-
|
||||||
not_owner_error: '&8[&6玩家系统&8] &4警告! &c你并不是此帐户的拥有者,请立即登出! '
|
&6[&b&lAccount Security System&6]
|
||||||
invalid_name_case: '&8[&6玩家系统&8] &c你应该使用「%valid」而并非「%invalid」登入游戏。 '
|
&c为保证您的游玩体验,请使用中国境内网络连接.
|
||||||
quick_command: '&8[&6玩家系统&8] &c您发送命令的速度太快了,请重新加入服务器再等待一会后再使用命令'
|
&cTo ensure your play experience,please use the Internet connection within China.
|
||||||
|
not_owner_error: |-
|
||||||
|
&6[&b&lAccount Security System&6]
|
||||||
|
&c请勿尝试登陆系统账户,系统账户受安全系统保护.
|
||||||
|
&c如果您并不知情,请更换您的用户名重新加入该服务器.
|
||||||
|
invalid_name_case: '&c您应该使用 %valid 登录服务器,当前名字: %invalid .'
|
||||||
|
quick_command: '&c您发送命令的速度太快了,请重新加入服务器等待一会后再使用命令'
|
||||||
|
|
||||||
# Email
|
# Email
|
||||||
email:
|
email:
|
||||||
add_email_request: '&8[&6玩家系统&8] &c请输入“/email add <你的邮箱> <再输入一次以确认>”以添加您的邮箱到此帐号'
|
add_email_request: ''
|
||||||
usage_email_add: '&8[&6玩家系统&8] &f用法: /email add <邮箱> <确认邮箱地址> '
|
usage_email_add: '&a用法: /email add <邮箱> <确认邮箱> '
|
||||||
usage_email_change: '&8[&6玩家系统&8] &f用法: /email change <旧邮箱> <新邮箱> '
|
usage_email_change: '&a用法: /email change <旧邮箱> <新邮箱> '
|
||||||
new_email_invalid: '&8[&6玩家系统&8] &f新邮箱无效!'
|
new_email_invalid: '&c新邮箱无效!'
|
||||||
old_email_invalid: '&8[&6玩家系统&8] &f旧邮箱无效!'
|
old_email_invalid: '&c旧邮箱无效!'
|
||||||
invalid: '&8[&6玩家系统&8] &f无效的邮箱'
|
invalid: '&c无效的邮箱'
|
||||||
added: '&8[&6玩家系统&8] &f邮箱已添加 !'
|
added: '&a*** 邮箱已添加 ***'
|
||||||
add_not_allowed: '&8[&6玩家系统&8] &c服务器不允许添加邮箱地址'
|
add_not_allowed: '&c服务器不允许添加电子邮箱'
|
||||||
request_confirmation: '&8[&6玩家系统&8] &f确认你的邮箱 !'
|
request_confirmation: '&c确认您的邮箱'
|
||||||
changed: '&8[&6玩家系统&8] &f邮箱已修改 !'
|
changed: '&a*** 邮箱已修改 ***'
|
||||||
change_not_allowed: '&8[&6玩家系统&8] &c服务器不允许修改邮箱地址'
|
change_not_allowed: '&c服务器不允许修改邮箱地址'
|
||||||
email_show: '&8[&6玩家系统&8] &2您当前的电子邮件地址为: &f%email'
|
email_show: '&a该账户使用的电子邮箱为: &a%email'
|
||||||
no_email_for_account: '&8[&6玩家系统&8] &2您当前并没有任何邮箱与该账号绑定'
|
no_email_for_account: '&c当前并没有任何邮箱与该账号绑定'
|
||||||
already_used: '&8[&6玩家系统&8] &4邮箱已被使用'
|
already_used: '&c邮箱已被使用'
|
||||||
incomplete_settings: '&8[&6玩家系统&8] 错误:必要设置未设定完成,请联系管理员'
|
incomplete_settings: '&c错误: 必要设置未设定完成,请联系管理员'
|
||||||
send_failure: '&8[&6玩家系统&8] 邮件发送失败,请联系管理员'
|
send_failure: '&c邮件已被作废,请检查您的邮箱是否正常工作.'
|
||||||
change_password_expired: '&8[&6玩家系统&8] 您不能使用此命令更改密码'
|
change_password_expired: '&c您不能使用此命令更改密码'
|
||||||
email_cooldown_error: '&8[&6玩家系统&8] &c邮件已在几分钟前发送,您需要等待 %time 后才能再次请求发送'
|
email_cooldown_error: '&c您需要等待 %time 后才能再次请求发送'
|
||||||
|
|
||||||
# Password recovery by email
|
# Password recovery by email
|
||||||
recovery:
|
recovery:
|
||||||
forgot_password_hint: '&8[&6玩家系统&8] &c忘了你的密码?请输入:“/email recovery <你的邮箱>”'
|
forgot_password_hint: '&c忘了您的密码?请输入:“/email recovery <您的邮箱>”'
|
||||||
command_usage: '&8[&6玩家系统&8] &f用法: /email recovery <邮箱>'
|
command_usage: '&a用法: /email recovery <邮箱>'
|
||||||
email_sent: '&8[&6玩家系统&8] &f找回密码邮件已发送 !'
|
email_sent: '&a找回密码邮件已发送!'
|
||||||
code:
|
code:
|
||||||
code_sent: '一个用于重置您的密码的验证码已发到您的邮箱'
|
code_sent: '&a*** 已发送验证邮件 ***'
|
||||||
incorrect: '验证码不正确! 使用 /email recovery [邮箱] 以生成新的验证码'
|
incorrect: '&a验证码不正确! 使用 /email recovery [邮箱] 以生成新的验证码'
|
||||||
tries_exceeded: '您已经达到输入验证码次数的最大允许次数。请使用 "/email recovery [邮箱]" 来生成一个新的'
|
tries_exceeded: '&a您已经达到输入验证码次数的最大允许次数.'
|
||||||
correct: '验证码正确!'
|
correct: '&a*** 验证通过 ***'
|
||||||
change_password: '请使用 /email setpassword <新密码> 立即设置新的密码'
|
change_password: '&c请使用 /email setpassword <新密码> 立即设置新的密码'
|
||||||
|
|
||||||
# Captcha
|
# Captcha
|
||||||
captcha:
|
captcha:
|
||||||
usage_captcha: '&8[&6玩家系统&8] &c正确用法:/captcha %captcha_code'
|
usage_captcha: '&7请输入 /captcha %captcha_code 来验证操作.'
|
||||||
wrong_captcha: '&8[&6玩家系统&8] &c错误的验证码,请输入:“/captcha %captcha_code”'
|
wrong_captcha: '&c错误的验证码.'
|
||||||
valid_captcha: '&8[&6玩家系统&8] &c你的验证码是有效的!'
|
valid_captcha: '&a*** 验证通过 ***'
|
||||||
captcha_for_registration: '注册前您需要先提供验证码,请使用指令:/captcha %captcha_code'
|
captcha_for_registration: '&7请输入 /captcha %captcha_code 来验证操作.'
|
||||||
register_captcha_valid: '&2有效的验证码!您现在可以使用 /register 注册啦!'
|
register_captcha_valid: '&a验证通过, 现在可以使用 /register 注册啦!'
|
||||||
|
|
||||||
# Verification code
|
# Verification code
|
||||||
verification:
|
verification:
|
||||||
code_required: '&3这个命令非常敏感,需要电子邮件验证!请检查您的收件箱,并遵循邮件的指导。'
|
code_required: '&a*** 已发送验证邮件 ***'
|
||||||
command_usage: '&c使用方法: /verification <验证码>'
|
command_usage: '&c使用方法:/verification <验证码>'
|
||||||
incorrect_code: '&c验证码错误, 请在聊天框输入 "/verification <验证码>",使用您在电子邮件中收到的验证码。'
|
incorrect_code: '&c错误的验证码.'
|
||||||
success: '&2您的身份已经得到验证!您现在可以在当前会话中执行所有命令!'
|
success: '&a*** 验证通过 ***'
|
||||||
already_verified: '&2您已经可以在当前会话中执行任何敏感命令!'
|
already_verified: '&a您已经通过验证'
|
||||||
code_expired: '&3您的验证码已失效!执行另一个敏感命令以获得新的验证码!'
|
code_expired: '&c验证码已失效'
|
||||||
email_needed: '&3为了验证您的身份,您需要将一个电子邮件地址与您的帐户绑定!!'
|
email_needed: '&c邮箱未绑定'
|
||||||
|
|
||||||
# Time units
|
# Time units
|
||||||
time:
|
time:
|
||||||
@ -138,20 +146,20 @@ time:
|
|||||||
seconds: '秒'
|
seconds: '秒'
|
||||||
minute: '分'
|
minute: '分'
|
||||||
minutes: '分'
|
minutes: '分'
|
||||||
hour: '小时'
|
hour: '时'
|
||||||
hours: '小时'
|
hours: '时'
|
||||||
day: '天'
|
day: '天'
|
||||||
days: '天'
|
days: '天'
|
||||||
|
|
||||||
# Two-factor authentication
|
# Two-factor authentication
|
||||||
two_factor:
|
two_factor:
|
||||||
code_created: '&8[&6玩家系统&8] &a你的代码是 %code,你可以使用 %url 来进行扫描'
|
code_created: '&7您正在激活双重验证, 请打开 &a%url &7扫描二维码'
|
||||||
confirmation_required: '&8[&6玩家系统&8] &3请输入 &a/2fa confirm <验证码> &3来确认双重认证'
|
confirmation_required: '&7请输入“/totp confirm <验证码>”来确认激活双重验证'
|
||||||
code_required: '&8[&6玩家系统&8] &c请输入 &a/2fa code <验证码> &c来提交双重认证验证码'
|
code_required: '&c请输入“/totp code <验证码>”来提交验证码'
|
||||||
already_enabled: '&8[&6玩家系统&8] &a双重认证已在您的账号上启用'
|
already_enabled: '&a双重验证已启用'
|
||||||
enable_error_no_code: '&8[&6玩家系统&8] &c双重认证密钥不存在或已过期,请输入 &a/2fa add &c来添加'
|
enable_error_no_code: '&c验证码丢失'
|
||||||
enable_success: '&8[&6玩家系统&8] &a已成功启用双重认证'
|
enable_success: '&a已成功启用双重验证'
|
||||||
enable_error_wrong_code: '&8[&6玩家系统&8] &c双重认证代码错误或者已经过期,请重新执行 &a/2fa add'
|
enable_error_wrong_code: '&c验证码错误或者已经过期,请重新执行“/totp add”'
|
||||||
not_enabled_error: '&8[&6玩家系统&8] &c双重认证码未在您的账号上启用,请使用 &a/2fa add &c来启用'
|
not_enabled_error: '&c双重验证未在您的账号上启用,请使用“/totp add”来启用'
|
||||||
removed_success: '&8[&6玩家系统&8] &c双重认证码已从您的账号上删除'
|
removed_success: '&c双重验证已从您的账号上禁用'
|
||||||
invalid_code: '&8[&6玩家系统&8] &c无效的验证码'
|
invalid_code: '&c无效的验证码'
|
||||||
|
|||||||
126
src/main/resources/new_email.html
Normal file
126
src/main/resources/new_email.html
Normal file
@ -0,0 +1,126 @@
|
|||||||
|
<div class="mail">
|
||||||
|
<style>
|
||||||
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
font-size: 16px;
|
||||||
|
color: #718096;
|
||||||
|
}
|
||||||
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
color: #3d4852;
|
||||||
|
}
|
||||||
|
.mail .mail-content {
|
||||||
|
max-width: 100vw;
|
||||||
|
padding: 32px;
|
||||||
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">账户激活邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您的账户初始密码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><generatedpass /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>已将地址(<playerip />)进行记录.
|
||||||
|
<br/>
|
||||||
|
<br/>请妥善保存,在新地址上进行登录时,需提供该密码.
|
||||||
|
<br/>若非必要,请勿更换密码,否则将对您的账户安全构成威胁.
|
||||||
|
<br/>账户所绑定的邮箱地址已被永久存储,需要更换请联系管理员.
|
||||||
|
<br/>
|
||||||
|
<br/>更换密码: /changepassword <generatedpass /> [新密码]
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>账户将在激活后生效
|
||||||
|
<br/>欢迎您的加入~!
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 IrisCraft. All rights reserved.</p>
|
||||||
|
<a href="https://www.mcbbs.net/thread-1263385-1-1.html" target="_blank" style="text-decoration: none; font-size: 16px">iriscraft.work</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
@ -1,9 +1,119 @@
|
|||||||
<h1>Dear <playername />,</h1>
|
<div class="mail">
|
||||||
|
<style>
|
||||||
<p>
|
.mail td{
|
||||||
You have requested to reset your password on <servername />. To reset it,
|
font-family: "Segoe UI", sans-serif;
|
||||||
please use the recovery code <recoverycode />: /email code <recoverycode />.
|
text-align: center;
|
||||||
</p>
|
font-size: 16px;
|
||||||
<p>
|
color: #718096;
|
||||||
The code expires in <hoursvalid /> hours.
|
}
|
||||||
</p>
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
color: #3d4852;
|
||||||
|
}
|
||||||
|
.mail .mail-content {
|
||||||
|
max-width: 100vw;
|
||||||
|
padding: 32px;
|
||||||
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">代码验证邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您正在申请的验证码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><recoverycode /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>使用指令: /email code <recoverycode /> 来完成验证过程.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>验证码将在<hoursvalid />小时后失效
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 IrisCraft. All rights reserved.</p>
|
||||||
|
<a href="https://www.mcbbs.net/thread-1263385-1-1.html" target="_blank" style="text-decoration: none; font-size: 16px">iriscraft.work</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|||||||
117
src/main/resources/shutdown.html
Normal file
117
src/main/resources/shutdown.html
Normal file
@ -0,0 +1,117 @@
|
|||||||
|
<div class="mail">
|
||||||
|
<style>
|
||||||
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
font-size: 16px;
|
||||||
|
color: #718096;
|
||||||
|
}
|
||||||
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
color: #3d4852;
|
||||||
|
}
|
||||||
|
.mail .mail-content {
|
||||||
|
max-width: 100vw;
|
||||||
|
padding: 32px;
|
||||||
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">服务器关闭通知</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;color: #da1515;">
|
||||||
|
<br/>紧急通知</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>服务器当前已被关闭
|
||||||
|
<br/>
|
||||||
|
<br/>请及时检查服务器运行状态.
|
||||||
|
<br/>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>IrisCraft Team
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 IrisCraft. All rights reserved.</p>
|
||||||
|
<a href="https://www.mcbbs.net/thread-1263385-1-1.html" target="_blank" style="text-decoration: none; font-size: 16px">iriscraft.work</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
@ -1,20 +1,119 @@
|
|||||||
<h1>
|
<div class="mail">
|
||||||
Dear <playername />,
|
<style>
|
||||||
</h1>
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
<p>
|
text-align: center;
|
||||||
This is your temporary verification code for the server <servername />:
|
font-size: 16px;
|
||||||
</p>
|
color: #718096;
|
||||||
<p>
|
}
|
||||||
<generatedcode />
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
</p>
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
<p>
|
color: #3d4852;
|
||||||
This code will be valid for the next <minutesvalid /> mins!<br />
|
}
|
||||||
Use the command
|
.mail .mail-content {
|
||||||
/verification <generatedcode />
|
max-width: 100vw;
|
||||||
to complete the verification process.
|
padding: 32px;
|
||||||
</p>
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
<p>
|
}
|
||||||
See you on <servername />!
|
.mail div{
|
||||||
</p>
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">代码验证邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您正在申请的验证码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><generatedcode /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>使用指令: /verification <generatedcode /> 来完成验证过程.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>验证码将在30分钟后失效
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 IrisCraft. All rights reserved.</p>
|
||||||
|
<a href="https://www.mcbbs.net/thread-1263385-1-1.html" target="_blank" style="text-decoration: none; font-size: 16px">iriscraft.work</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|||||||
@ -1,145 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import ch.jalu.configme.resource.PropertyReader;
|
|
||||||
import ch.jalu.configme.resource.PropertyResource;
|
|
||||||
import ch.jalu.injector.Injector;
|
|
||||||
import ch.jalu.injector.InjectorBuilder;
|
|
||||||
import com.google.common.io.Files;
|
|
||||||
import fr.xephi.authme.api.v3.AuthMeApi;
|
|
||||||
import fr.xephi.authme.command.CommandHandler;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.initialization.DataFolder;
|
|
||||||
import fr.xephi.authme.listener.BlockListener;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.process.login.ProcessSyncPlayerLogin;
|
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeReceiver;
|
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
|
||||||
import org.bukkit.Bukkit;
|
|
||||||
import org.bukkit.Server;
|
|
||||||
import org.bukkit.plugin.PluginDescriptionFile;
|
|
||||||
import org.bukkit.plugin.PluginManager;
|
|
||||||
import org.bukkit.plugin.java.JavaPluginLoader;
|
|
||||||
import org.bukkit.scheduler.BukkitScheduler;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Rule;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.rules.TemporaryFolder;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.logging.Logger;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.settings.properties.AuthMeSettingsRetriever.buildConfigurationData;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.RETURNS_DEEP_STUBS;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Integration test verifying that all services can be initialized in {@link AuthMe}
|
|
||||||
* with the {@link Injector}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class AuthMeInitializationTest {
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Server server;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PluginManager pluginManager;
|
|
||||||
|
|
||||||
private AuthMe authMe;
|
|
||||||
private File dataFolder;
|
|
||||||
|
|
||||||
@Rule
|
|
||||||
public TemporaryFolder temporaryFolder = new TemporaryFolder();
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void initAuthMe() throws IOException {
|
|
||||||
dataFolder = temporaryFolder.newFolder();
|
|
||||||
File settingsFile = new File(dataFolder, "config.yml");
|
|
||||||
given(server.getLogger()).willReturn(Logger.getAnonymousLogger());
|
|
||||||
JavaPluginLoader pluginLoader = new JavaPluginLoader(server);
|
|
||||||
Files.copy(TestHelper.getJarFile(TestHelper.PROJECT_ROOT + "config.test.yml"), settingsFile);
|
|
||||||
|
|
||||||
// Mock / wire various Bukkit components
|
|
||||||
ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
|
|
||||||
given(server.getPluginManager()).willReturn(pluginManager);
|
|
||||||
|
|
||||||
// PluginDescriptionFile is final: need to create a sample one
|
|
||||||
PluginDescriptionFile descriptionFile = new PluginDescriptionFile(
|
|
||||||
"AuthMe", "N/A", AuthMe.class.getCanonicalName());
|
|
||||||
|
|
||||||
// Initialize AuthMe
|
|
||||||
authMe = new AuthMe(pluginLoader, descriptionFile, dataFolder, null);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInitializeAllServices() {
|
|
||||||
// given
|
|
||||||
PropertyReader reader = mock(PropertyReader.class);
|
|
||||||
PropertyResource resource = mock(PropertyResource.class);
|
|
||||||
given(resource.createReader()).willReturn(reader);
|
|
||||||
Settings settings = new Settings(dataFolder, resource, null, buildConfigurationData());
|
|
||||||
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
|
|
||||||
Injector injector = new InjectorBuilder()
|
|
||||||
.addDefaultHandlers("fr.xephi.authme")
|
|
||||||
.create();
|
|
||||||
injector.provide(DataFolder.class, dataFolder);
|
|
||||||
injector.register(Server.class, server);
|
|
||||||
injector.register(PluginManager.class, pluginManager);
|
|
||||||
|
|
||||||
injector.register(AuthMe.class, authMe);
|
|
||||||
injector.register(Settings.class, settings);
|
|
||||||
injector.register(DataSource.class, mock(DataSource.class));
|
|
||||||
injector.register(BukkitService.class, mock(BukkitService.class));
|
|
||||||
|
|
||||||
// when
|
|
||||||
authMe.instantiateServices(injector);
|
|
||||||
authMe.registerEventListeners(injector);
|
|
||||||
|
|
||||||
// then
|
|
||||||
// Take a few samples and ensure that they are not null
|
|
||||||
assertThat(injector.getIfAvailable(AuthMeApi.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(BlockListener.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(BungeeReceiver.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(BungeeSender.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(CommandHandler.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(Management.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(PasswordSecurity.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(PermissionsManager.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(ProcessSyncPlayerLogin.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(PurgeService.class), not(nullValue()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandlePrematureShutdownGracefully() {
|
|
||||||
// given
|
|
||||||
BukkitScheduler scheduler = mock(BukkitScheduler.class);
|
|
||||||
given(server.getScheduler()).willReturn(scheduler);
|
|
||||||
|
|
||||||
// Make sure ConsoleLogger has no logger reference since that may happen on unexpected stops
|
|
||||||
ReflectionTestUtils.setField(ConsoleLogger.class, null, "logger", null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
authMe.onDisable();
|
|
||||||
|
|
||||||
// then - no exceptions
|
|
||||||
verify(scheduler).getActiveWorkers(); // via TaskCloser
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,136 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
|
||||||
import org.hamcrest.Description;
|
|
||||||
import org.hamcrest.Matcher;
|
|
||||||
import org.hamcrest.TypeSafeMatcher;
|
|
||||||
|
|
||||||
import java.util.Objects;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Custom matchers for AuthMe entities.
|
|
||||||
*/
|
|
||||||
// Justification: Javadoc would be huge because of the many parameters
|
|
||||||
@SuppressWarnings("checkstyle:MissingJavadocMethod")
|
|
||||||
public final class AuthMeMatchers {
|
|
||||||
|
|
||||||
private AuthMeMatchers() {
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super HashedPassword> equalToHash(String hash) {
|
|
||||||
return equalToHash(new HashedPassword(hash));
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super HashedPassword> equalToHash(String hash, String salt) {
|
|
||||||
return equalToHash(new HashedPassword(hash, salt));
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super HashedPassword> equalToHash(HashedPassword hash) {
|
|
||||||
return new TypeSafeMatcher<HashedPassword>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(HashedPassword item) {
|
|
||||||
return Objects.equals(hash.getHash(), item.getHash())
|
|
||||||
&& Objects.equals(hash.getSalt(), item.getSalt());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
String representation = "'" + hash.getHash() + "'";
|
|
||||||
if (hash.getSalt() != null) {
|
|
||||||
representation += ", '" + hash.getSalt() + "'";
|
|
||||||
}
|
|
||||||
description.appendValue("HashedPassword(" + representation + ")");
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<PlayerAuth> hasAuthBasicData(String name, String realName,
|
|
||||||
String email, String lastIp) {
|
|
||||||
return new TypeSafeMatcher<PlayerAuth>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(PlayerAuth item) {
|
|
||||||
return Objects.equals(name, item.getNickname())
|
|
||||||
&& Objects.equals(realName, item.getRealName())
|
|
||||||
&& Objects.equals(email, item.getEmail())
|
|
||||||
&& Objects.equals(lastIp, item.getLastIp());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with name %s, realname %s, email %s, lastIp %s",
|
|
||||||
name, realName, email, lastIp));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeMismatchSafely(PlayerAuth item, Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with name %s, realname %s, email %s, lastIp %s",
|
|
||||||
item.getNickname(), item.getRealName(), item.getEmail(), item.getLastIp()));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super PlayerAuth> hasRegistrationInfo(String registrationIp, long registrationDate) {
|
|
||||||
return new TypeSafeMatcher<PlayerAuth>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(PlayerAuth item) {
|
|
||||||
return Objects.equals(registrationIp, item.getRegistrationIp())
|
|
||||||
&& Objects.equals(registrationDate, item.getRegistrationDate());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with reg. IP %s and reg date %d",
|
|
||||||
registrationIp, registrationDate));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeMismatchSafely(PlayerAuth item, Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with reg. IP %s and reg date %d",
|
|
||||||
item.getRegistrationIp(), item.getRegistrationDate()));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super PlayerAuth> hasAuthLocation(PlayerAuth auth) {
|
|
||||||
return hasAuthLocation(auth.getQuitLocX(), auth.getQuitLocY(), auth.getQuitLocZ(), auth.getWorld(),
|
|
||||||
auth.getYaw(), auth.getPitch());
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super PlayerAuth> hasAuthLocation(double x, double y, double z,
|
|
||||||
String world, float yaw, float pitch) {
|
|
||||||
return new TypeSafeMatcher<PlayerAuth>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(PlayerAuth item) {
|
|
||||||
return Objects.equals(x, item.getQuitLocX())
|
|
||||||
&& Objects.equals(y, item.getQuitLocY())
|
|
||||||
&& Objects.equals(z, item.getQuitLocZ())
|
|
||||||
&& Objects.equals(world, item.getWorld())
|
|
||||||
&& Objects.equals(yaw, item.getYaw())
|
|
||||||
&& Objects.equals(pitch, item.getPitch());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendValue(
|
|
||||||
String.format("PlayerAuth with quit location (x: %f, y: %f, z: %f, world: %s, yaw: %f, pitch: %f)",
|
|
||||||
x, y, z, world, yaw, pitch));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<String> stringWithLength(int length) {
|
|
||||||
return new TypeSafeMatcher<String>() {
|
|
||||||
@Override
|
|
||||||
protected boolean matchesSafely(String item) {
|
|
||||||
return item != null && item.length() == length;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendText("String with length " + length);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,165 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.function.Function;
|
|
||||||
import java.util.function.Predicate;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects available classes by walking through a source directory.
|
|
||||||
* <p>
|
|
||||||
* This is a naive, zero dependency collector that walks through a file directory
|
|
||||||
* and loads classes from the class loader based on the .java files it encounters.
|
|
||||||
* This is a very slow approach and should be avoided for production code.
|
|
||||||
* <p>
|
|
||||||
* For more performant approaches, see e.g. <a href="https://github.com/ronmamo/reflections">org.reflections</a>.
|
|
||||||
*/
|
|
||||||
public class ClassCollector {
|
|
||||||
|
|
||||||
private final String root;
|
|
||||||
private final String nonCodePath;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructor. The arguments make up the path from which the collector will start scanning.
|
|
||||||
*
|
|
||||||
* @param nonCodePath beginning of the starting path that are not Java packages, e.g. {@code src/main/java/}
|
|
||||||
* @param packagePath folders following {@code nonCodePath} that are packages, e.g. {@code com/project/app}
|
|
||||||
*/
|
|
||||||
public ClassCollector(String nonCodePath, String packagePath) {
|
|
||||||
if (!nonCodePath.endsWith("/") && !nonCodePath.endsWith("\\")) {
|
|
||||||
nonCodePath = nonCodePath.concat(File.separator);
|
|
||||||
}
|
|
||||||
this.root = nonCodePath + packagePath;
|
|
||||||
this.nonCodePath = nonCodePath;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects all classes from the parent folder and below.
|
|
||||||
*
|
|
||||||
* @return all classes
|
|
||||||
*/
|
|
||||||
public List<Class<?>> collectClasses() {
|
|
||||||
return collectClasses(x -> true);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects all classes from the parent folder and below which are of type {@link T}.
|
|
||||||
*
|
|
||||||
* @param parent the parent which classes need to extend (or be equal to) in order to be collected
|
|
||||||
* @param <T> the parent type
|
|
||||||
* @return list of matching classes
|
|
||||||
*/
|
|
||||||
@SuppressWarnings({ "unchecked", "rawtypes" })
|
|
||||||
public <T> List<Class<? extends T>> collectClasses(Class<T> parent) {
|
|
||||||
List<Class<?>> classes = collectClasses(parent::isAssignableFrom);
|
|
||||||
return new ArrayList<>((List) classes);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects all classes from the parent folder and below which match the given predicate.
|
|
||||||
*
|
|
||||||
* @param filter the predicate classes need to satisfy in order to be collected
|
|
||||||
* @return list of matching classes
|
|
||||||
*/
|
|
||||||
public List<Class<?>> collectClasses(Predicate<Class<?>> filter) {
|
|
||||||
File rootFolder = new File(root);
|
|
||||||
List<Class<?>> collection = new ArrayList<>();
|
|
||||||
gatherClassesFromFile(rootFolder, filter, collection);
|
|
||||||
return collection;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs an instance of all classes which are of the provided type {@code clazz}.
|
|
||||||
* This method assumes that every class has an accessible no-args constructor for creation.
|
|
||||||
*
|
|
||||||
* @param parent the parent which classes need to extend (or be equal to) in order to be instantiated
|
|
||||||
* @param <T> the parent type
|
|
||||||
* @return collection of created objects
|
|
||||||
*/
|
|
||||||
public <T> List<T> getInstancesOfType(Class<T> parent) {
|
|
||||||
return getInstancesOfType(parent, (clz) -> {
|
|
||||||
try {
|
|
||||||
return canInstantiate(clz) ? clz.newInstance() : null;
|
|
||||||
} catch (InstantiationException | IllegalAccessException e) {
|
|
||||||
throw new IllegalStateException(e);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs an instance of all classes which are of the provided type {@code clazz}
|
|
||||||
* with the provided {@code instantiator}.
|
|
||||||
*
|
|
||||||
* @param parent the parent which classes need to extend (or be equal to) in order to be instantiated
|
|
||||||
* @param instantiator function which returns an object of the given class, or null to skip the class
|
|
||||||
* @param <T> the parent type
|
|
||||||
* @return collection of created objects
|
|
||||||
*/
|
|
||||||
public <T> List<T> getInstancesOfType(Class<T> parent, Function<Class<? extends T>, T> instantiator) {
|
|
||||||
return collectClasses(parent)
|
|
||||||
.stream()
|
|
||||||
.map(instantiator)
|
|
||||||
.filter(o -> o != null)
|
|
||||||
.collect(Collectors.toList());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether the given class can be instantiated, i.e. if it is not abstract, an interface, etc.
|
|
||||||
*
|
|
||||||
* @param clazz the class to process
|
|
||||||
* @return true if the class can be instantiated, false otherwise
|
|
||||||
*/
|
|
||||||
public static boolean canInstantiate(Class<?> clazz) {
|
|
||||||
return clazz != null && !clazz.isEnum() && !clazz.isInterface()
|
|
||||||
&& !clazz.isArray() && !Modifier.isAbstract(clazz.getModifiers());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Recursively collects the classes based on the files in the directory and in its child directories.
|
|
||||||
*
|
|
||||||
* @param folder the folder to scan
|
|
||||||
* @param filter the class predicate
|
|
||||||
* @param collection collection to add classes to
|
|
||||||
*/
|
|
||||||
private void gatherClassesFromFile(File folder, Predicate<Class<?>> filter, List<Class<?>> collection) {
|
|
||||||
File[] files = folder.listFiles();
|
|
||||||
if (files == null) {
|
|
||||||
throw new IllegalStateException("Could not read files from '" + folder + "'");
|
|
||||||
}
|
|
||||||
for (File file : files) {
|
|
||||||
if (file.isDirectory()) {
|
|
||||||
gatherClassesFromFile(file, filter, collection);
|
|
||||||
} else if (file.isFile()) {
|
|
||||||
Class<?> clazz = loadTaskClassFromFile(file);
|
|
||||||
if (clazz != null && filter.test(clazz)) {
|
|
||||||
collection.add(clazz);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Loads a class from the class loader based on the given file.
|
|
||||||
*
|
|
||||||
* @param file the file whose corresponding Java class should be retrieved
|
|
||||||
* @return the corresponding class, or null if not applicable
|
|
||||||
*/
|
|
||||||
private Class<?> loadTaskClassFromFile(File file) {
|
|
||||||
if (!file.getName().endsWith(".java")) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
String filePath = file.getPath();
|
|
||||||
String className = filePath
|
|
||||||
.substring(nonCodePath.length(), filePath.length() - 5)
|
|
||||||
.replace(File.separator, ".");
|
|
||||||
try {
|
|
||||||
return Class.forName(className);
|
|
||||||
} catch (ClassNotFoundException e) {
|
|
||||||
throw new IllegalStateException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,173 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import ch.jalu.configme.properties.Property;
|
|
||||||
import com.google.common.collect.ImmutableList;
|
|
||||||
import com.google.common.collect.ImmutableMap;
|
|
||||||
import com.google.common.collect.ImmutableSet;
|
|
||||||
import fr.xephi.authme.data.captcha.CaptchaCodeStorage;
|
|
||||||
import fr.xephi.authme.datasource.AbstractSqlDataSource;
|
|
||||||
import fr.xephi.authme.datasource.Columns;
|
|
||||||
import fr.xephi.authme.datasource.columnshandler.DataSourceColumn;
|
|
||||||
import fr.xephi.authme.datasource.columnshandler.PlayerAuthColumn;
|
|
||||||
import fr.xephi.authme.datasource.mysqlextensions.MySqlExtension;
|
|
||||||
import fr.xephi.authme.initialization.HasCleanup;
|
|
||||||
import fr.xephi.authme.process.register.executors.RegistrationMethod;
|
|
||||||
import fr.xephi.authme.security.crypts.Whirlpool;
|
|
||||||
import fr.xephi.authme.util.expiring.ExpiringMap;
|
|
||||||
import fr.xephi.authme.util.expiring.ExpiringSet;
|
|
||||||
import fr.xephi.authme.util.expiring.TimedCounter;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.lang.reflect.Field;
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.nio.charset.Charset;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Set;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Contains consistency tests across all AuthMe classes.
|
|
||||||
*/
|
|
||||||
public class ClassesConsistencyTest {
|
|
||||||
|
|
||||||
/** Contains all production classes. */
|
|
||||||
private static final List<Class<?>> ALL_CLASSES =
|
|
||||||
new ClassCollector(TestHelper.SOURCES_FOLDER, TestHelper.PROJECT_ROOT).collectClasses();
|
|
||||||
|
|
||||||
/** Expiring structure types. */
|
|
||||||
private static final Set<Class<?>> EXPIRING_STRUCTURES = ImmutableSet.of(
|
|
||||||
ExpiringSet.class, ExpiringMap.class, TimedCounter.class, CaptchaCodeStorage.class);
|
|
||||||
|
|
||||||
/** Immutable types, which are allowed to be used in non-private constants. */
|
|
||||||
private static final Set<Class<?>> IMMUTABLE_TYPES = ImmutableSet.of(
|
|
||||||
/* JDK */
|
|
||||||
int.class, long.class, float.class, String.class, File.class, Enum.class, collectionsUnmodifiableList(),
|
|
||||||
Charset.class,
|
|
||||||
/* AuthMe */
|
|
||||||
Property.class, RegistrationMethod.class, DataSourceColumn.class, PlayerAuthColumn.class,
|
|
||||||
/* Guava */
|
|
||||||
ImmutableMap.class, ImmutableList.class);
|
|
||||||
|
|
||||||
/** Classes excluded from the field visibility test. */
|
|
||||||
private static final Set<Class<?>> CLASSES_EXCLUDED_FROM_VISIBILITY_TEST = ImmutableSet.of(
|
|
||||||
Whirlpool.class, // not our implementation, so we don't touch it
|
|
||||||
MySqlExtension.class, // has immutable protected fields used by all children
|
|
||||||
AbstractSqlDataSource.class, // protected members for inheritance
|
|
||||||
Columns.class // uses non-static String constants, which is safe
|
|
||||||
);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that there aren't two classes with the same name; this is confusing and should be avoided.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldNotHaveSameName() {
|
|
||||||
// given
|
|
||||||
Set<String> names = new HashSet<>();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
for (Class<?> clazz : ALL_CLASSES) {
|
|
||||||
if (!names.add(clazz.getSimpleName())) {
|
|
||||||
fail("Class with name '" + clazz.getSimpleName() + "' already encountered!");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that fields of classes are either private or static final fields of an immutable type.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldHaveNonPrivateConstantsOnly() {
|
|
||||||
// given / when
|
|
||||||
Set<String> invalidFields = ALL_CLASSES.stream()
|
|
||||||
.filter(clz -> !CLASSES_EXCLUDED_FROM_VISIBILITY_TEST.contains(clz))
|
|
||||||
.map(Class::getDeclaredFields)
|
|
||||||
.flatMap(Arrays::stream)
|
|
||||||
.filter(f -> !f.getName().contains("$"))
|
|
||||||
.filter(f -> hasIllegalFieldVisibility(f))
|
|
||||||
.map(f -> formatField(f))
|
|
||||||
.collect(Collectors.toSet());
|
|
||||||
|
|
||||||
// then
|
|
||||||
if (!invalidFields.isEmpty()) {
|
|
||||||
fail("Found " + invalidFields.size() + " fields with non-private, mutable fields:\n- "
|
|
||||||
+ String.join("\n- ", invalidFields));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static boolean hasIllegalFieldVisibility(Field field) {
|
|
||||||
final int modifiers = field.getModifiers();
|
|
||||||
if (Modifier.isPrivate(modifiers)) {
|
|
||||||
return false;
|
|
||||||
} else if (!Modifier.isStatic(modifiers) || !Modifier.isFinal(modifiers)) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Field is non-private, static and final
|
|
||||||
Class<?> valueType;
|
|
||||||
if (Collection.class.isAssignableFrom(field.getType()) || Map.class.isAssignableFrom(field.getType())) {
|
|
||||||
// For collections/maps, need to check the actual type to ensure it's an unmodifiable implementation
|
|
||||||
Object value = ReflectionTestUtils.getFieldValue(field, null);
|
|
||||||
valueType = value.getClass();
|
|
||||||
} else {
|
|
||||||
valueType = field.getType();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Field is static, final, and not private -> check that it is immutable type
|
|
||||||
return IMMUTABLE_TYPES.stream()
|
|
||||||
.noneMatch(immutableType -> immutableType.isAssignableFrom(valueType));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Prints out the field with its modifiers.
|
|
||||||
*
|
|
||||||
* @param field the field to format
|
|
||||||
* @return description of the field
|
|
||||||
*/
|
|
||||||
private static String formatField(Field field) {
|
|
||||||
String modifiersText = Modifier.toString(field.getModifiers());
|
|
||||||
return String.format("[%s] %s %s %s", field.getDeclaringClass().getSimpleName(), modifiersText.trim(),
|
|
||||||
field.getType().getSimpleName(), field.getName());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that classes with expiring collections (such as {@link ExpiringMap}) implement the {@link HasCleanup}
|
|
||||||
* interface to regularly clean up expired data.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldImplementHasCleanup() {
|
|
||||||
// given / when / then
|
|
||||||
for (Class<?> clazz : ALL_CLASSES) {
|
|
||||||
if (hasExpiringCollectionAsField(clazz) && !EXPIRING_STRUCTURES.contains(clazz)) {
|
|
||||||
assertThat("Class '" + clazz.getSimpleName() + "' has expiring collections, should implement HasCleanup",
|
|
||||||
HasCleanup.class.isAssignableFrom(clazz), equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static boolean hasExpiringCollectionAsField(Class<?> clazz) {
|
|
||||||
for (Field field : clazz.getDeclaredFields()) {
|
|
||||||
if (EXPIRING_STRUCTURES.stream().anyMatch(t -> t.isAssignableFrom(field.getType()))) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the concrete class of the unmodifiable list as returned by {@link Collections#unmodifiableList(List)}.
|
|
||||||
*/
|
|
||||||
private static Class<?> collectionsUnmodifiableList() {
|
|
||||||
return Collections.unmodifiableList(new ArrayList<>()).getClass();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,44 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import org.bukkit.configuration.file.FileConfiguration;
|
|
||||||
import org.bukkit.configuration.file.YamlConfiguration;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.empty;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Consistency test for the CodeClimate configuration file.
|
|
||||||
*/
|
|
||||||
public class CodeClimateConfigTest {
|
|
||||||
|
|
||||||
private static final String CONFIG_FILE = ".codeclimate.yml";
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveExistingClassesInExclusions() {
|
|
||||||
// given / when
|
|
||||||
FileConfiguration configuration = YamlConfiguration.loadConfiguration(new File(CONFIG_FILE));
|
|
||||||
List<String> excludePaths = configuration.getStringList("exclude_patterns");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(excludePaths, not(empty()));
|
|
||||||
removeTestsExclusionOrThrow(excludePaths);
|
|
||||||
for (String path : excludePaths) {
|
|
||||||
if (!new File(path).exists()) {
|
|
||||||
fail("Path '" + path + "' does not exist!");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void removeTestsExclusionOrThrow(List<String> excludePaths) {
|
|
||||||
boolean wasRemoved = excludePaths.removeIf("src/test/java/**/*Test.java"::equals);
|
|
||||||
assertThat("Expected an exclusion for test classes",
|
|
||||||
wasRemoved, equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,227 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.output.LogLevel;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.junit.After;
|
|
||||||
import org.junit.AfterClass;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Rule;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.rules.TemporaryFolder;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.FileWriter;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.nio.charset.StandardCharsets;
|
|
||||||
import java.nio.file.Files;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.logging.Logger;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.greaterThan;
|
|
||||||
import static org.hamcrest.Matchers.hasSize;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.doThrow;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ConsoleLogger}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ConsoleLoggerTest {
|
|
||||||
|
|
||||||
private ConsoleLogger consoleLogger;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Logger logger;
|
|
||||||
|
|
||||||
@Rule
|
|
||||||
public TemporaryFolder temporaryFolder = new TemporaryFolder();
|
|
||||||
|
|
||||||
private File logFile;
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void setMockLogger() throws IOException {
|
|
||||||
File folder = temporaryFolder.newFolder();
|
|
||||||
File logFile = new File(folder, "authme.log");
|
|
||||||
if (!logFile.createNewFile()) {
|
|
||||||
throw new IOException("Could not create file '" + logFile.getPath() + "'");
|
|
||||||
}
|
|
||||||
ConsoleLogger.initialize(logger, logFile);
|
|
||||||
this.logFile = logFile;
|
|
||||||
this.consoleLogger = new ConsoleLogger("test");
|
|
||||||
}
|
|
||||||
|
|
||||||
@After
|
|
||||||
public void closeFileHandlers() {
|
|
||||||
ConsoleLogger.closeFileWriter();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Resets the ConsoleLogger back to its defaults after running all tests. Especially important
|
|
||||||
* is that we no longer enable logging to a file as the log file we've supplied will no longer
|
|
||||||
* be around after this test class has finished.
|
|
||||||
*/
|
|
||||||
@AfterClass
|
|
||||||
public static void resetConsoleToDefault() {
|
|
||||||
ConsoleLogger.initializeSharedSettings(newSettings(false, LogLevel.INFO));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldLogToFile() throws IOException {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(true, LogLevel.FINE);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
consoleLogger.initializeSettings(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.fine("Logging a FINE message");
|
|
||||||
consoleLogger.debug("Logging a DEBUG message");
|
|
||||||
consoleLogger.info("This is an INFO message");
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger, times(2)).info(anyString());
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
List<String> loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
assertThat(loggedLines, hasSize(2));
|
|
||||||
assertThat(loggedLines.get(0), containsString("[FINE] Logging a FINE message"));
|
|
||||||
assertThat(loggedLines.get(1), containsString("[INFO] This is an INFO message"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotLogToFile() {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(false, LogLevel.DEBUG);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
consoleLogger.initializeSettings(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.debug("Created test");
|
|
||||||
consoleLogger.warning("Encountered a warning");
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger).info("[DEBUG] Created test");
|
|
||||||
verify(logger).warning("Encountered a warning");
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
assertThat(logFile.length(), equalTo(0L));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldLogStackTraceToFile() throws IOException {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(true, LogLevel.INFO);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
Exception e = new IllegalStateException("Test exception message");
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.info("Info text");
|
|
||||||
consoleLogger.debug("Debug message");
|
|
||||||
consoleLogger.fine("Fine-level message");
|
|
||||||
consoleLogger.logException("Exception occurred:", e);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger).info("Info text");
|
|
||||||
verify(logger).warning("Exception occurred: [IllegalStateException]: Test exception message");
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
List<String> loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
assertThat(loggedLines.size(), greaterThan(3));
|
|
||||||
assertThat(loggedLines.get(0), containsString("[INFO] Info text"));
|
|
||||||
assertThat(loggedLines.get(1),
|
|
||||||
containsString("[WARN] Exception occurred: [IllegalStateException]: Test exception message"));
|
|
||||||
// Check that we have this class' full name somewhere in the file -> stacktrace of Exception e
|
|
||||||
assertThat(String.join("", loggedLines), containsString(getClass().getCanonicalName()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSupportVariousDebugMethods() throws IOException {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(true, LogLevel.DEBUG);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
consoleLogger.initializeSettings(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.debug("Got {0} entries", 17);
|
|
||||||
consoleLogger.debug("Player `{0}` is in world `{1}`", "Bobby", new WorldDummy("world"));
|
|
||||||
consoleLogger.debug("{0} quick {1} jump over {2} lazy {3} (reason: {4})", 5, "foxes", 3, "dogs", null);
|
|
||||||
consoleLogger.debug(() -> "Too little too late");
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger).info("[DEBUG] Got 17 entries");
|
|
||||||
verify(logger).info("[DEBUG] Player `Bobby` is in world `w[world]`");
|
|
||||||
verify(logger).info("[DEBUG] 5 quick foxes jump over 3 lazy dogs (reason: null)");
|
|
||||||
verify(logger).info("[DEBUG] Too little too late");
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
|
|
||||||
List<String> loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
assertThat(loggedLines, contains(
|
|
||||||
containsString("[DEBUG] Got 17 entries"),
|
|
||||||
containsString("[DEBUG] Player `Bobby` is in world `w[world]`"),
|
|
||||||
containsString("[DEBUG] 5 quick foxes jump over 3 lazy dogs (reason: null)"),
|
|
||||||
containsString("[DEBUG] Too little too late")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCloseFileWriterDespiteExceptionOnFlush() throws IOException {
|
|
||||||
// given
|
|
||||||
FileWriter fileWriter = mock(FileWriter.class);
|
|
||||||
doThrow(new IOException("Error during flush")).when(fileWriter).flush();
|
|
||||||
ReflectionTestUtils.setField(ConsoleLogger.class, null, "fileWriter", fileWriter);
|
|
||||||
|
|
||||||
// when
|
|
||||||
ConsoleLogger.closeFileWriter();
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(fileWriter).flush();
|
|
||||||
verify(fileWriter).close();
|
|
||||||
assertThat(ReflectionTestUtils.getFieldValue(ConsoleLogger.class, null, "fileWriter"), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleExceptionOnFileWriterClose() throws IOException {
|
|
||||||
// given
|
|
||||||
FileWriter fileWriter = mock(FileWriter.class);
|
|
||||||
doThrow(new IOException("Cannot close")).when(fileWriter).close();
|
|
||||||
ReflectionTestUtils.setField(ConsoleLogger.class, null, "fileWriter", fileWriter);
|
|
||||||
|
|
||||||
// when
|
|
||||||
ConsoleLogger.closeFileWriter();
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(fileWriter).flush();
|
|
||||||
verify(fileWriter).close();
|
|
||||||
assertThat(ReflectionTestUtils.getFieldValue(ConsoleLogger.class, null, "fileWriter"), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Settings newSettings(boolean logToFile, LogLevel logLevel) {
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(SecuritySettings.USE_LOGGING)).willReturn(logToFile);
|
|
||||||
given(settings.getProperty(PluginSettings.LOG_LEVEL)).willReturn(logLevel);
|
|
||||||
return settings;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static final class WorldDummy {
|
|
||||||
private final String name;
|
|
||||||
|
|
||||||
WorldDummy(String name) {
|
|
||||||
this.name = name;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String toString() {
|
|
||||||
return "w[" + name + "]";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,91 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import org.hamcrest.Description;
|
|
||||||
import org.hamcrest.Matcher;
|
|
||||||
import org.hamcrest.TypeSafeMatcher;
|
|
||||||
|
|
||||||
import java.lang.reflect.Field;
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Objects;
|
|
||||||
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Matcher which checks with reflection that all fields have the same value.
|
|
||||||
* This matcher considers all non-static fields until the Object parent.
|
|
||||||
*/
|
|
||||||
public final class IsEqualByReflectionMatcher<T> extends TypeSafeMatcher<T> {
|
|
||||||
|
|
||||||
private final T expected;
|
|
||||||
|
|
||||||
private IsEqualByReflectionMatcher(T expected) {
|
|
||||||
this.expected = expected;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a matcher that checks if all fields are the same as on the {@code expected} object.
|
|
||||||
*
|
|
||||||
* @param expected the object to match
|
|
||||||
* @param <T> the object's type
|
|
||||||
* @return the matcher for the expected object
|
|
||||||
*/
|
|
||||||
public static <T> Matcher<T> hasEqualValuesOnAllFields(T expected) {
|
|
||||||
return new IsEqualByReflectionMatcher<>(expected);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected boolean matchesSafely(T item) {
|
|
||||||
return assertAreFieldsEqual(item);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendText("parameters " + expected);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that all fields of the given {@code item} are equal to the {@link #expected} object. Both objects must
|
|
||||||
* be exactly of the same type.
|
|
||||||
*
|
|
||||||
* @param item the object to check
|
|
||||||
* @return true if all fields are equal, false otherwise
|
|
||||||
*/
|
|
||||||
private boolean assertAreFieldsEqual(T item) {
|
|
||||||
if (expected.getClass() != item.getClass()) {
|
|
||||||
fail("Classes don't match, got " + expected.getClass().getSimpleName()
|
|
||||||
+ " and " + item.getClass().getSimpleName());
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
List<Field> fieldsToCheck = getAllFields(expected);
|
|
||||||
for (Field field : fieldsToCheck) {
|
|
||||||
Object lhsValue = ReflectionTestUtils.getFieldValue(field, expected);
|
|
||||||
Object rhsValue = ReflectionTestUtils.getFieldValue(field, item);
|
|
||||||
if (!Objects.equals(lhsValue, rhsValue)) {
|
|
||||||
fail("Field '" + field.getName() + "' does not have same value: '"
|
|
||||||
+ lhsValue + "' vs. '" + rhsValue + "'");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static List<Field> getAllFields(Object object) {
|
|
||||||
List<Field> fields = new ArrayList<>();
|
|
||||||
Class<?> currentClass = object.getClass();
|
|
||||||
while (currentClass != null) {
|
|
||||||
for (Field f : currentClass.getDeclaredFields()) {
|
|
||||||
if (!Modifier.isStatic(f.getModifiers()) && !f.isSynthetic()) {
|
|
||||||
fields.add(f);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (currentClass == Object.class) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
currentClass = currentClass.getSuperclass();
|
|
||||||
}
|
|
||||||
return fields;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,153 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import ch.jalu.injector.handlers.postconstruct.PostConstructMethodInvoker;
|
|
||||||
|
|
||||||
import java.lang.reflect.Constructor;
|
|
||||||
import java.lang.reflect.Field;
|
|
||||||
import java.lang.reflect.InvocationTargetException;
|
|
||||||
import java.lang.reflect.Method;
|
|
||||||
|
|
||||||
import static java.lang.String.format;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Offers reflection functionality to set up tests. Use only when absolutely necessary.
|
|
||||||
*/
|
|
||||||
public final class ReflectionTestUtils {
|
|
||||||
|
|
||||||
private ReflectionTestUtils() {
|
|
||||||
// Util class
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets the field of a given object to a new value with reflection.
|
|
||||||
*
|
|
||||||
* @param clazz the class declaring the field
|
|
||||||
* @param instance the instance to modify (pass null for static fields)
|
|
||||||
* @param fieldName the field name
|
|
||||||
* @param value the value to set the field to
|
|
||||||
* @param <T> the instance type
|
|
||||||
*/
|
|
||||||
public static <T> void setField(Class<? super T> clazz, T instance, String fieldName, Object value) {
|
|
||||||
try {
|
|
||||||
Field field = getField(clazz, fieldName);
|
|
||||||
field.set(instance, value);
|
|
||||||
} catch (IllegalAccessException e) {
|
|
||||||
throw new IllegalStateException(
|
|
||||||
format("Could not set value to field '%s' for instance '%s' of class '%s'",
|
|
||||||
fieldName, instance, clazz.getName()), e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets the field on the given instance to the new value.
|
|
||||||
*
|
|
||||||
* @param instance the instance to modify
|
|
||||||
* @param fieldName the field name
|
|
||||||
* @param value the value to set the field to
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public static void setField(Object instance, String fieldName, Object value) {
|
|
||||||
setField((Class) instance.getClass(), instance, fieldName, value);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static <T> Field getField(Class<T> clazz, String fieldName) {
|
|
||||||
try {
|
|
||||||
Field field = clazz.getDeclaredField(fieldName);
|
|
||||||
field.setAccessible(true);
|
|
||||||
return field;
|
|
||||||
} catch (NoSuchFieldException e) {
|
|
||||||
throw new IllegalStateException(format("Could not get field '%s' from class '%s'",
|
|
||||||
fieldName, clazz.getName()), e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public static <T, V> V getFieldValue(Class<T> clazz, T instance, String fieldName) {
|
|
||||||
Field field = getField(clazz, fieldName);
|
|
||||||
return getFieldValue(field, instance);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the value of the field on the given instance. Wraps exceptions into a runtime exception.
|
|
||||||
*
|
|
||||||
* @param field the field to read
|
|
||||||
* @param instance the instance to get the value from, null if field is static
|
|
||||||
* @param <V> type of the field
|
|
||||||
* @return value of the field
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public static <V> V getFieldValue(Field field, Object instance) {
|
|
||||||
field.setAccessible(true);
|
|
||||||
try {
|
|
||||||
return (V) field.get(instance);
|
|
||||||
} catch (IllegalAccessException e) {
|
|
||||||
throw new IllegalStateException("Could not get value of field '" + field.getName() + "'", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the method on the given class with the supplied parameter types.
|
|
||||||
*
|
|
||||||
* @param clazz the class to retrieve a method from
|
|
||||||
* @param methodName the name of the method
|
|
||||||
* @param parameterTypes the parameter types the method to retrieve has
|
|
||||||
* @return the method of the class, set to be accessible
|
|
||||||
*/
|
|
||||||
public static Method getMethod(Class<?> clazz, String methodName, Class<?>... parameterTypes) {
|
|
||||||
try {
|
|
||||||
Method method = clazz.getDeclaredMethod(methodName, parameterTypes);
|
|
||||||
method.setAccessible(true);
|
|
||||||
return method;
|
|
||||||
} catch (NoSuchMethodException e) {
|
|
||||||
throw new IllegalStateException("Could not retrieve method '" + methodName + "' from class '"
|
|
||||||
+ clazz.getName() + "'");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Invokes the given method on the provided instance with the given parameters.
|
|
||||||
*
|
|
||||||
* @param method the method to invoke
|
|
||||||
* @param instance the instance to invoke the method on (null for static methods)
|
|
||||||
* @param parameters the parameters to pass to the method
|
|
||||||
* @param <V> return value of the method
|
|
||||||
* @return method return value
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public static <V> V invokeMethod(Method method, Object instance, Object... parameters) {
|
|
||||||
method.setAccessible(true);
|
|
||||||
try {
|
|
||||||
return (V) method.invoke(instance, parameters);
|
|
||||||
} catch (InvocationTargetException | IllegalAccessException e) {
|
|
||||||
throw new IllegalStateException("Could not invoke method '" + method + "'", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Runs all methods annotated with {@link javax.annotation.PostConstruct} on the given instance
|
|
||||||
* (including such methods on superclasses).
|
|
||||||
*
|
|
||||||
* @param instance the instance to process
|
|
||||||
*/
|
|
||||||
public static void invokePostConstructMethods(Object instance) {
|
|
||||||
// Use the implementation of the injector to invoke all @PostConstruct methods the same way
|
|
||||||
new PostConstructMethodInvoker().postProcess(instance, null, null);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new instance of the given class, using a no-args constructor (which may be hidden).
|
|
||||||
*
|
|
||||||
* @param clazz the class to instantiate
|
|
||||||
* @param <T> the class' type
|
|
||||||
* @return the created instance
|
|
||||||
*/
|
|
||||||
public static <T> T newInstance(Class<T> clazz) {
|
|
||||||
try {
|
|
||||||
Constructor<T> constructor = clazz.getDeclaredConstructor();
|
|
||||||
constructor.setAccessible(true);
|
|
||||||
return constructor.newInstance();
|
|
||||||
} catch (ReflectiveOperationException e) {
|
|
||||||
throw new IllegalStateException("Could not invoke no-args constructor of class " + clazz, e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,121 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import ch.jalu.configme.properties.Property;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.mockito.Mockito;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.net.InetAddress;
|
|
||||||
import java.net.InetSocketAddress;
|
|
||||||
import java.net.URI;
|
|
||||||
import java.net.URISyntaxException;
|
|
||||||
import java.net.URL;
|
|
||||||
import java.net.UnknownHostException;
|
|
||||||
import java.nio.file.Path;
|
|
||||||
import java.nio.file.Paths;
|
|
||||||
import java.util.logging.Logger;
|
|
||||||
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* AuthMe test utilities.
|
|
||||||
*/
|
|
||||||
public final class TestHelper {
|
|
||||||
|
|
||||||
public static final String SOURCES_FOLDER = "src/main/java/";
|
|
||||||
public static final String TEST_SOURCES_FOLDER = "src/test/java/";
|
|
||||||
public static final String TEST_RESOURCES_FOLDER = "src/test/resources/";
|
|
||||||
public static final String PROJECT_ROOT = "/fr/xephi/authme/";
|
|
||||||
|
|
||||||
private TestHelper() {
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return a {@link File} to a file in the JAR's resources (main or test).
|
|
||||||
*
|
|
||||||
* @param path The absolute path to the file
|
|
||||||
* @return The project file
|
|
||||||
*/
|
|
||||||
public static File getJarFile(String path) {
|
|
||||||
URI uri = getUriOrThrow(path);
|
|
||||||
return new File(uri.getPath());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return a {@link Path} to a file in the JAR's resources (main or test).
|
|
||||||
*
|
|
||||||
* @param path The absolute path to the file
|
|
||||||
* @return The Path object to the file
|
|
||||||
*/
|
|
||||||
public static Path getJarPath(String path) {
|
|
||||||
String sqlFilePath = getUriOrThrow(path).getPath();
|
|
||||||
// Windows prepends the path with a '/' or '\', which Paths cannot handle
|
|
||||||
String appropriatePath = System.getProperty("os.name").contains("indow")
|
|
||||||
? sqlFilePath.substring(1)
|
|
||||||
: sqlFilePath;
|
|
||||||
return Paths.get(appropriatePath);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static URI getUriOrThrow(String path) {
|
|
||||||
URL url = TestHelper.class.getResource(path);
|
|
||||||
if (url == null) {
|
|
||||||
throw new IllegalStateException("File '" + path + "' could not be loaded");
|
|
||||||
}
|
|
||||||
try {
|
|
||||||
return new URI(url.toString());
|
|
||||||
} catch (URISyntaxException e) {
|
|
||||||
throw new IllegalStateException("File '" + path + "' cannot be converted to a URI");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Assign the necessary fields on ConsoleLogger with mocks.
|
|
||||||
*
|
|
||||||
* @return The logger mock used
|
|
||||||
*/
|
|
||||||
public static Logger setupLogger() {
|
|
||||||
Logger logger = Mockito.mock(Logger.class);
|
|
||||||
ConsoleLogger.initialize(logger, null);
|
|
||||||
return logger;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set ConsoleLogger to use a new real logger.
|
|
||||||
*
|
|
||||||
* @return The real logger used by ConsoleLogger
|
|
||||||
*/
|
|
||||||
public static Logger setRealLogger() {
|
|
||||||
Logger logger = Logger.getAnonymousLogger();
|
|
||||||
ConsoleLogger.initialize(logger, null);
|
|
||||||
return logger;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Configures the player mock to return the given IP address.
|
|
||||||
*
|
|
||||||
* @param player the player mock
|
|
||||||
* @param ip the ip address it should return
|
|
||||||
*/
|
|
||||||
public static void mockIpAddressToPlayer(Player player, String ip) {
|
|
||||||
try {
|
|
||||||
InetAddress inetAddress = InetAddress.getByName(ip);
|
|
||||||
InetSocketAddress inetSocketAddress = new InetSocketAddress(inetAddress, 8093);
|
|
||||||
given(player.getAddress()).willReturn(inetSocketAddress);
|
|
||||||
} catch (UnknownHostException e) {
|
|
||||||
throw new IllegalStateException("Invalid IP address: " + ip, e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Configures the Settings mock to return the property's default value for any given property.
|
|
||||||
*
|
|
||||||
* @param settings the settings mock
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public static void returnDefaultsForAllProperties(Settings settings) {
|
|
||||||
given(settings.getProperty(any(Property.class)))
|
|
||||||
.willAnswer(invocation -> ((Property<?>) invocation.getArgument(0)).getDefaultValue());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,558 +0,0 @@
|
|||||||
package fr.xephi.authme.api.v3;
|
|
||||||
|
|
||||||
import fr.xephi.authme.AuthMe;
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.process.register.executors.ApiPasswordRegisterParams;
|
|
||||||
import fr.xephi.authme.process.register.executors.RegistrationMethod;
|
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
|
||||||
import fr.xephi.authme.service.GeoIpService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import org.bukkit.Bukkit;
|
|
||||||
import org.bukkit.Location;
|
|
||||||
import org.bukkit.Server;
|
|
||||||
import org.bukkit.World;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.time.Instant;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Date;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.Optional;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.IsEqualByReflectionMatcher.hasEqualValuesOnAllFields;
|
|
||||||
import static org.hamcrest.MatcherAssert.assertThat;
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.hamcrest.Matchers.sameInstance;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link AuthMeApi}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class AuthMeApiTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private AuthMeApi api;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
@Mock
|
|
||||||
private PasswordSecurity passwordSecurity;
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
@Mock
|
|
||||||
private AuthMe authMe;
|
|
||||||
@Mock
|
|
||||||
private GeoIpService geoIpService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnInstanceOrNull() {
|
|
||||||
AuthMeApi result = AuthMeApi.getInstance();
|
|
||||||
assertThat(result, sameInstance(api));
|
|
||||||
|
|
||||||
ReflectionTestUtils.setField(AuthMeApi.class, null, "singleton", null);
|
|
||||||
assertThat(AuthMeApi.getInstance(), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnIfPlayerIsAuthenticated() {
|
|
||||||
// given
|
|
||||||
String name = "Bobby";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.isAuthenticated(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(playerCache).isAuthenticated(name);
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnIfPlayerIsNpc() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.hasMetadata("NPC")).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.isNpc(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
verify(player).hasMetadata("NPC");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnIfPlayerIsUnrestricted() {
|
|
||||||
// given
|
|
||||||
String name = "Tester";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(validationService.isUnrestricted(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.isUnrestricted(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).isUnrestricted(name);
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetLastLocation() {
|
|
||||||
// given
|
|
||||||
String name = "Gary";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name)
|
|
||||||
.locWorld("world")
|
|
||||||
.locX(12.4)
|
|
||||||
.locY(24.6)
|
|
||||||
.locZ(-438.2)
|
|
||||||
.locYaw(3.41f)
|
|
||||||
.locPitch(0.29f)
|
|
||||||
.build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
Server server = mock(Server.class);
|
|
||||||
ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
|
|
||||||
World world = mock(World.class);
|
|
||||||
given(server.getWorld(auth.getWorld())).willReturn(world);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Location result = api.getLastLocation(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, not(nullValue()));
|
|
||||||
assertThat(result.getX(), equalTo(auth.getQuitLocX()));
|
|
||||||
assertThat(result.getY(), equalTo(auth.getQuitLocY()));
|
|
||||||
assertThat(result.getZ(), equalTo(auth.getQuitLocZ()));
|
|
||||||
assertThat(result.getWorld(), equalTo(world));
|
|
||||||
assertThat(result.getYaw(), equalTo(auth.getYaw()));
|
|
||||||
assertThat(result.getPitch(), equalTo(auth.getPitch()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetLastIp() {
|
|
||||||
// given
|
|
||||||
String name = "Gabriel";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name)
|
|
||||||
.lastIp("93.23.44.55")
|
|
||||||
.build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
String result = api.getLastIp(player.getName());
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, not(nullValue()));
|
|
||||||
assertThat(result, equalTo("93.23.44.55"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnNullAsLastIpForUnknownUser() {
|
|
||||||
// given
|
|
||||||
String name = "Harrison";
|
|
||||||
given(playerCache.getAuth(name)).willReturn(null);
|
|
||||||
given(dataSource.getAuth(name)).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
String result = api.getLastIp(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, nullValue());
|
|
||||||
verify(playerCache).getAuth(name);
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetLastLogin() {
|
|
||||||
// given
|
|
||||||
String name = "David";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name)
|
|
||||||
.lastLogin(1501597979L)
|
|
||||||
.build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Date result = api.getLastLogin(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, not(nullValue()));
|
|
||||||
assertThat(result, equalTo(new Date(1501597979L)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullLastLogin() {
|
|
||||||
// given
|
|
||||||
String name = "John";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name)
|
|
||||||
.lastLogin(null)
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth(name)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Date result = api.getLastLogin(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, nullValue());
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetLastLoginTime() {
|
|
||||||
// given
|
|
||||||
String name = "David";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name)
|
|
||||||
.lastLogin(1501597979L)
|
|
||||||
.build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Instant result = api.getLastLoginTime(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, not(nullValue()));
|
|
||||||
assertThat(result, equalTo(Instant.ofEpochMilli(1501597979L)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testGetLastLoginMillis() {
|
|
||||||
AuthMeApi result = AuthMeApi.getInstance();
|
|
||||||
assertThat(result.getLastLoginTime("notAPlayer"), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullLastLoginTime() {
|
|
||||||
// given
|
|
||||||
String name = "John";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name)
|
|
||||||
.lastLogin(null)
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth(name)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Instant result = api.getLastLoginTime(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, nullValue());
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnNullForUnavailablePlayer() {
|
|
||||||
// given
|
|
||||||
String name = "Numan";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(playerCache.getAuth(name)).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Location result = api.getLastLocation(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCheckForRegisteredName() {
|
|
||||||
// given
|
|
||||||
String name = "toaster";
|
|
||||||
given(dataSource.isAuthAvailable(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.isRegistered(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCheckPassword() {
|
|
||||||
// given
|
|
||||||
String playerName = "Robert";
|
|
||||||
String password = "someSecretPhrase2983";
|
|
||||||
given(passwordSecurity.comparePassword(password, playerName)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.checkPassword(playerName, password);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(passwordSecurity).comparePassword(password, playerName);
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnAuthNames() {
|
|
||||||
// given
|
|
||||||
String[] names = {"bobby", "peter", "elisabeth", "craig"};
|
|
||||||
List<PlayerAuth> auths = Arrays.stream(names)
|
|
||||||
.map(name -> PlayerAuth.builder().name(name).build())
|
|
||||||
.collect(Collectors.toList());
|
|
||||||
given(dataSource.getAllAuths()).willReturn(auths);
|
|
||||||
|
|
||||||
// when
|
|
||||||
List<String> result = api.getRegisteredNames();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, contains(names));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnAuthRealNames() {
|
|
||||||
// given
|
|
||||||
String[] names = {"Bobby", "peter", "Elisabeth", "CRAIG"};
|
|
||||||
List<PlayerAuth> auths = Arrays.stream(names)
|
|
||||||
.map(name -> PlayerAuth.builder().name(name).realName(name).build())
|
|
||||||
.collect(Collectors.toList());
|
|
||||||
given(dataSource.getAllAuths()).willReturn(auths);
|
|
||||||
|
|
||||||
// when
|
|
||||||
List<String> result = api.getRegisteredRealNames();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, contains(names));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUnregisterPlayer() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String name = "Donald";
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.forceUnregister(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performUnregisterByAdmin(null, name, player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUnregisterPlayerByName() {
|
|
||||||
// given
|
|
||||||
Server server = mock(Server.class);
|
|
||||||
ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
|
|
||||||
String name = "tristan";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(server.getPlayer(name)).willReturn(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.forceUnregister(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performUnregisterByAdmin(null, name, player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldChangePassword() {
|
|
||||||
// given
|
|
||||||
String name = "Bobby12";
|
|
||||||
String password = "resetPw!";
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.changePassword(name, password);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performPasswordChangeAsAdmin(null, name, password);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnAuthMeInstance() {
|
|
||||||
// given / when
|
|
||||||
AuthMe result = api.getPlugin();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(authMe));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnVersion() {
|
|
||||||
// given / when
|
|
||||||
String result = api.getPluginVersion();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(AuthMe.getPluginVersion()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForceLogin() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.forceLogin(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).forceLogin(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForceLogout() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.forceLogout(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performLogout(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForceRegister() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String pass = "test235";
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.forceRegister(player, pass);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.API_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(ApiPasswordRegisterParams.of(player, pass, true))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForceRegisterAndNotAutoLogin() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String pass = "test235";
|
|
||||||
|
|
||||||
// when
|
|
||||||
api.forceRegister(player, pass, false);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.API_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(ApiPasswordRegisterParams.of(player, pass, false))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRegisterPlayer() {
|
|
||||||
// given
|
|
||||||
String name = "Marco";
|
|
||||||
String password = "myP4ss";
|
|
||||||
HashedPassword hashedPassword = new HashedPassword("0395872SLKDFJOWEIUTEJSD");
|
|
||||||
given(passwordSecurity.computeHash(password, name.toLowerCase(Locale.ROOT))).willReturn(hashedPassword);
|
|
||||||
given(dataSource.saveAuth(any(PlayerAuth.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.registerPlayer(name, password);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
verify(passwordSecurity).computeHash(password, name.toLowerCase(Locale.ROOT));
|
|
||||||
ArgumentCaptor<PlayerAuth> authCaptor = ArgumentCaptor.forClass(PlayerAuth.class);
|
|
||||||
verify(dataSource).saveAuth(authCaptor.capture());
|
|
||||||
assertThat(authCaptor.getValue().getNickname(), equalTo(name.toLowerCase(Locale.ROOT)));
|
|
||||||
assertThat(authCaptor.getValue().getRealName(), equalTo(name));
|
|
||||||
assertThat(authCaptor.getValue().getPassword(), equalTo(hashedPassword));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotRegisterAlreadyRegisteredPlayer() {
|
|
||||||
// given
|
|
||||||
String name = "jonah";
|
|
||||||
given(dataSource.isAuthAvailable(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = api.registerPlayer(name, "pass");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(false));
|
|
||||||
verify(dataSource, only()).isAuthAvailable(name);
|
|
||||||
verifyNoInteractions(management, passwordSecurity);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetNamesByIp() {
|
|
||||||
// given
|
|
||||||
String ip = "123.123.123.123";
|
|
||||||
List<String> names = Arrays.asList("Morgan", "Batista", "QUINN");
|
|
||||||
given(dataSource.getAllAuthsByIp(ip)).willReturn(names);
|
|
||||||
|
|
||||||
// when
|
|
||||||
List<String> result = api.getNamesByIp(ip);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(names));
|
|
||||||
verify(dataSource).getAllAuthsByIp(ip);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnGeoIpInfo() {
|
|
||||||
// given
|
|
||||||
String ip = "127.127.12.1";
|
|
||||||
given(geoIpService.getCountryCode(ip)).willReturn("XA");
|
|
||||||
given(geoIpService.getCountryName(ip)).willReturn("Syldavia");
|
|
||||||
|
|
||||||
// when
|
|
||||||
String countryCode = api.getCountryCode(ip);
|
|
||||||
String countryName = api.getCountryName(ip);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(countryCode, equalTo("XA"));
|
|
||||||
assertThat(countryName, equalTo("Syldavia"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnAuthMePlayerInfo() {
|
|
||||||
// given
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("bobb")
|
|
||||||
.realName("Bobb")
|
|
||||||
.registrationDate(1433166082000L)
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("bobb")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Optional<AuthMePlayer> result = api.getPlayerInfo("bobb");
|
|
||||||
|
|
||||||
// then
|
|
||||||
AuthMePlayer playerInfo = result.get();
|
|
||||||
assertThat(playerInfo.getName(), equalTo("Bobb"));
|
|
||||||
assertThat(playerInfo.getRegistrationDate(), equalTo(Instant.ofEpochMilli(1433166082000L)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnNullForNonExistentAuth() {
|
|
||||||
// given / when
|
|
||||||
Optional<AuthMePlayer> result = api.getPlayerInfo("doesNotExist");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.isPresent(), equalTo(false));
|
|
||||||
verify(playerCache).getAuth("doesNotExist");
|
|
||||||
verify(dataSource).getAuth("doesNotExist");
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,95 +0,0 @@
|
|||||||
package fr.xephi.authme.api.v3;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import org.hamcrest.Description;
|
|
||||||
import org.hamcrest.Matcher;
|
|
||||||
import org.hamcrest.TypeSafeMatcher;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.time.Instant;
|
|
||||||
import java.util.Optional;
|
|
||||||
import java.util.UUID;
|
|
||||||
|
|
||||||
import static org.hamcrest.MatcherAssert.assertThat;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link AuthMePlayerImpl}.
|
|
||||||
*/
|
|
||||||
public class AuthMePlayerImplTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldMapNullWithoutError() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(AuthMePlayerImpl.fromPlayerAuth(null), emptyOptional());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldMapFromPlayerAuth() {
|
|
||||||
// given
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("victor")
|
|
||||||
.realName("Victor")
|
|
||||||
.email("vic@example.com")
|
|
||||||
.registrationDate(1480075661000L)
|
|
||||||
.registrationIp("124.125.126.127")
|
|
||||||
.lastLogin(1542675632000L)
|
|
||||||
.lastIp("62.63.64.65")
|
|
||||||
.uuid(UUID.fromString("deadbeef-2417-4653-9026-feedbabeface"))
|
|
||||||
.build();
|
|
||||||
|
|
||||||
// when
|
|
||||||
Optional<AuthMePlayer> result = AuthMePlayerImpl.fromPlayerAuth(auth);
|
|
||||||
|
|
||||||
// then
|
|
||||||
AuthMePlayer playerInfo = result.get();
|
|
||||||
assertThat(playerInfo.getName(), equalTo("Victor"));
|
|
||||||
assertThat(playerInfo.getUuid().get(), equalTo(auth.getUuid()));
|
|
||||||
assertThat(playerInfo.getEmail().get(), equalTo(auth.getEmail()));
|
|
||||||
assertThat(playerInfo.getRegistrationDate(), equalTo(Instant.ofEpochMilli(auth.getRegistrationDate())));
|
|
||||||
assertThat(playerInfo.getRegistrationIpAddress().get(), equalTo(auth.getRegistrationIp()));
|
|
||||||
assertThat(playerInfo.getLastLoginDate().get(), equalTo(Instant.ofEpochMilli(auth.getLastLogin())));
|
|
||||||
assertThat(playerInfo.getLastLoginIpAddress().get(), equalTo(auth.getLastIp()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullAndDefaultValues() {
|
|
||||||
// given
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("victor")
|
|
||||||
.realName("Victor")
|
|
||||||
.email("your@email.com") // DB default
|
|
||||||
.registrationDate(1480075661000L)
|
|
||||||
.lastLogin(0L) // DB default
|
|
||||||
.lastIp("127.0.0.1") // DB default
|
|
||||||
.build();
|
|
||||||
|
|
||||||
// when
|
|
||||||
Optional<AuthMePlayer> result = AuthMePlayerImpl.fromPlayerAuth(auth);
|
|
||||||
|
|
||||||
// then
|
|
||||||
AuthMePlayer playerInfo = result.get();
|
|
||||||
assertThat(playerInfo.getName(), equalTo("Victor"));
|
|
||||||
assertThat(playerInfo.getUuid(), emptyOptional());
|
|
||||||
assertThat(playerInfo.getEmail(), emptyOptional());
|
|
||||||
assertThat(playerInfo.getRegistrationDate(), equalTo(Instant.ofEpochMilli(auth.getRegistrationDate())));
|
|
||||||
assertThat(playerInfo.getRegistrationIpAddress(), emptyOptional());
|
|
||||||
assertThat(playerInfo.getLastLoginDate(), emptyOptional());
|
|
||||||
assertThat(playerInfo.getLastLoginIpAddress(), emptyOptional());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static <T> Matcher<Optional<T>> emptyOptional() {
|
|
||||||
return new TypeSafeMatcher<Optional<T>>() {
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendText("an empty optional");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected boolean matchesSafely(Optional<T> item) {
|
|
||||||
return !item.isPresent();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,84 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import org.bukkit.configuration.MemorySection;
|
|
||||||
import org.bukkit.configuration.file.FileConfiguration;
|
|
||||||
import org.bukkit.configuration.file.YamlConfiguration;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.TestHelper.getJarFile;
|
|
||||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that the commands declared in plugin.yml correspond
|
|
||||||
* to the ones built by the {@link CommandInitializer}.
|
|
||||||
*/
|
|
||||||
public class CommandConsistencyTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveEqualDefinitions() {
|
|
||||||
// given
|
|
||||||
Collection<List<String>> initializedCommands = initializeCommands();
|
|
||||||
Map<String, List<String>> pluginFileLabels = getLabelsFromPluginFile();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
assertThat("number of base commands are equal in plugin.yml and CommandInitializer",
|
|
||||||
initializedCommands.size(), equalTo(pluginFileLabels.size()));
|
|
||||||
for (List<String> commandLabels : initializedCommands) {
|
|
||||||
List<String> pluginYmlLabels = pluginFileLabels.get(commandLabels.get(0));
|
|
||||||
// NB: the first label in CommandDescription needs to correspond to the key in plugin.yml
|
|
||||||
assertThat("plugin.yml contains definition for command '" + commandLabels.get(0) + "'",
|
|
||||||
pluginYmlLabels, not(nullValue()));
|
|
||||||
assertThat("plugin.yml and CommandDescription have same alternative labels for /" + commandLabels.get(0),
|
|
||||||
pluginYmlLabels, containsInAnyOrder(commandLabels.subList(1, commandLabels.size()).toArray()));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Gets the command definitions from CommandInitializer and returns the
|
|
||||||
* labels of all base commands.
|
|
||||||
*
|
|
||||||
* @return collection of all base command labels
|
|
||||||
*/
|
|
||||||
private static Collection<List<String>> initializeCommands() {
|
|
||||||
CommandInitializer initializer = new CommandInitializer();
|
|
||||||
Collection<List<String>> commandLabels = new ArrayList<>();
|
|
||||||
for (CommandDescription baseCommand : initializer.getCommands()) {
|
|
||||||
commandLabels.add(baseCommand.getLabels());
|
|
||||||
}
|
|
||||||
return commandLabels;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Reads plugin.yml and returns the defined commands by main label and aliases.
|
|
||||||
*
|
|
||||||
* @return collection of all labels and their aliases
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
private static Map<String, List<String>> getLabelsFromPluginFile() {
|
|
||||||
FileConfiguration pluginFile = YamlConfiguration.loadConfiguration(getJarFile("/plugin.yml"));
|
|
||||||
MemorySection commandList = (MemorySection) pluginFile.get("commands");
|
|
||||||
Map<String, Object> commandDefinitions = commandList.getValues(false);
|
|
||||||
|
|
||||||
Map<String, List<String>> commandLabels = new HashMap<>();
|
|
||||||
for (Map.Entry<String, Object> commandDefinition : commandDefinitions.entrySet()) {
|
|
||||||
MemorySection definition = (MemorySection) commandDefinition.getValue();
|
|
||||||
List<String> alternativeLabels = definition.get("aliases") == null
|
|
||||||
? Collections.EMPTY_LIST
|
|
||||||
: (List<String>) definition.get("aliases");
|
|
||||||
commandLabels.put(commandDefinition.getKey(), alternativeLabels);
|
|
||||||
}
|
|
||||||
return commandLabels;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,302 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import ch.jalu.injector.Injector;
|
|
||||||
import ch.jalu.injector.factory.Factory;
|
|
||||||
import com.google.common.collect.Sets;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil.TestLoginCommand;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil.TestRegisterCommand;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil.TestUnregisterCommand;
|
|
||||||
import fr.xephi.authme.command.help.HelpProvider;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.invocation.InvocationOnMock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
import org.mockito.stubbing.Answer;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.INCORRECT_ARGUMENTS;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.MISSING_BASE_COMMAND;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.NO_PERMISSION;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.SUCCESS;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.UNKNOWN_LABEL;
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyList;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeastOnce;
|
|
||||||
import static org.mockito.Mockito.doReturn;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link CommandHandler}.
|
|
||||||
*/
|
|
||||||
// Justification: It's more readable to use asList() everywhere in the test when we often generated two lists where one
|
|
||||||
// often consists of only one element, e.g. myMethod(asList("authme"), asList("my", "args"), ...)
|
|
||||||
@SuppressWarnings("ArraysAsListWithZeroOrOneArgument")
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class CommandHandlerTest {
|
|
||||||
|
|
||||||
private CommandHandler handler;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Factory<ExecutableCommand> commandFactory;
|
|
||||||
@Mock
|
|
||||||
private CommandMapper commandMapper;
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
@Mock
|
|
||||||
private HelpProvider helpProvider;
|
|
||||||
|
|
||||||
private Map<Class<? extends ExecutableCommand>, ExecutableCommand> mockedCommands = new HashMap<>();
|
|
||||||
|
|
||||||
@Before
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public void initializeCommandMapper() {
|
|
||||||
given(commandMapper.getCommandClasses()).willReturn(Sets.newHashSet(
|
|
||||||
ExecutableCommand.class, TestLoginCommand.class, TestRegisterCommand.class, TestUnregisterCommand.class));
|
|
||||||
setInjectorToMockExecutableCommandClasses();
|
|
||||||
|
|
||||||
handler = new CommandHandler(commandFactory, commandMapper, permissionsManager, messages, helpProvider);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Makes the injector return a mock when {@link Injector#newInstance(Class)} is invoked
|
|
||||||
* with (a child of) ExecutableCommand.class. The mocks the injector creates are stored in {@link #mockedCommands}.
|
|
||||||
* <p>
|
|
||||||
* The {@link CommandMapper} is mocked in {@link #initializeCommandMapper()} to return certain test classes.
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
private void setInjectorToMockExecutableCommandClasses() {
|
|
||||||
given(commandFactory.newInstance(any(Class.class))).willAnswer(new Answer<Object>() {
|
|
||||||
@Override
|
|
||||||
public Object answer(InvocationOnMock invocation) throws Throwable {
|
|
||||||
Class<?> clazz = invocation.getArgument(0);
|
|
||||||
if (ExecutableCommand.class.isAssignableFrom(clazz)) {
|
|
||||||
Class<? extends ExecutableCommand> commandClass = (Class<? extends ExecutableCommand>) clazz;
|
|
||||||
ExecutableCommand mock = mock(commandClass);
|
|
||||||
mockedCommands.put(commandClass, mock);
|
|
||||||
return mock;
|
|
||||||
}
|
|
||||||
throw new IllegalStateException("Unexpected class '" + clazz.getName()
|
|
||||||
+ "': Not a child of ExecutableCommand");
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCallMappedCommandWithArgs() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "Authme";
|
|
||||||
String[] bukkitArgs = {"Login", "myPass"};
|
|
||||||
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
doReturn(TestLoginCommand.class).when(command).getExecutableCommand();
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList()))
|
|
||||||
.willReturn(new FoundCommandResult(command, asList("Authme", "Login"), asList("myPass"), 0.0, SUCCESS));
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
ExecutableCommand executableCommand = mockedCommands.get(TestLoginCommand.class);
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("Authme", "Login", "myPass"));
|
|
||||||
verify(executableCommand).executeCommand(sender, asList("myPass"));
|
|
||||||
// Ensure that no error message was issued to the command sender
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCallExecutableCommandIfNoPermission() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList()))
|
|
||||||
.willReturn(new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 0.0, NO_PERMISSION));
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(command, never()).getExecutableCommand();
|
|
||||||
verify(messages).send(sender, MessageKey.NO_PERMISSION);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCallExecutableForWrongArguments() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(command.getExecutableCommand()).willReturn((Class) TestUnregisterCommand.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList())).willReturn(
|
|
||||||
new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 0.0, INCORRECT_ARGUMENTS));
|
|
||||||
given(permissionsManager.hasPermission(sender, command.getPermission())).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(sender, atLeastOnce()).sendMessage(argThat(containsString("Incorrect command arguments")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUseCustomMessageUponArgumentMismatch() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(command.getExecutableCommand()).willReturn((Class) TestUnregisterCommand.class);
|
|
||||||
given(mockedCommands.get(TestUnregisterCommand.class).getArgumentsMismatchMessage())
|
|
||||||
.willReturn(MessageKey.USAGE_RECOVER_EMAIL);
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList())).willReturn(
|
|
||||||
new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 0.0, INCORRECT_ARGUMENTS));
|
|
||||||
given(permissionsManager.hasPermission(sender, command.getPermission())).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(messages).send(sender, MessageKey.USAGE_RECOVER_EMAIL);
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCallExecutableForWrongArgumentsAndPermissionDenied() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList())).willReturn(
|
|
||||||
new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 0.0, INCORRECT_ARGUMENTS));
|
|
||||||
given(permissionsManager.hasPermission(sender, command.getPermission())).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(command, never()).getExecutableCommand();
|
|
||||||
verify(messages).send(sender, MessageKey.NO_PERMISSION);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCallExecutableForFailedParsing() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList())).willReturn(
|
|
||||||
new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 0.0, MISSING_BASE_COMMAND));
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(command, never()).getExecutableCommand();
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Failed to parse")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCallExecutableForUnknownLabelAndHaveSuggestion() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(command.getLabels()).willReturn(Collections.singletonList("test_cmd"));
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList())).willReturn(
|
|
||||||
new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 0.01, UNKNOWN_LABEL));
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(command, never()).getExecutableCommand();
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(3)).sendMessage(captor.capture());
|
|
||||||
assertThat(captor.getAllValues().get(0), containsString("Unknown command"));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("Did you mean"));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("/test_cmd"));
|
|
||||||
assertThat(captor.getAllValues().get(2), containsString("Use the command"));
|
|
||||||
assertThat(captor.getAllValues().get(2), containsString("to view help"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCallExecutableForUnknownLabelAndNotSuggestCommand() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "unreg";
|
|
||||||
String[] bukkitArgs = {"testPlayer"};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(any(CommandSender.class), anyList())).willReturn(
|
|
||||||
new FoundCommandResult(command, asList("unreg"), asList("testPlayer"), 1.0, UNKNOWN_LABEL));
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("unreg", "testPlayer"));
|
|
||||||
verify(command, never()).getExecutableCommand();
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(2)).sendMessage(captor.capture());
|
|
||||||
assertThat(captor.getAllValues().get(0), containsString("Unknown command"));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("Use the command"));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("to view help"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStripWhitespace() {
|
|
||||||
// given
|
|
||||||
String bukkitLabel = "AuthMe";
|
|
||||||
String[] bukkitArgs = {" ", "", "REGISTER", " ", "testArg", " "};
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
doReturn(TestRegisterCommand.class).when(command).getExecutableCommand();
|
|
||||||
given(commandMapper.mapPartsToCommand(eq(sender), anyList()))
|
|
||||||
.willReturn(new FoundCommandResult(command, asList("AuthMe", "REGISTER"), asList("testArg"), 0.0, SUCCESS));
|
|
||||||
|
|
||||||
// when
|
|
||||||
handler.processCommand(sender, bukkitLabel, bukkitArgs);
|
|
||||||
|
|
||||||
// then
|
|
||||||
ExecutableCommand executableCommand = mockedCommands.get(TestRegisterCommand.class);
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, asList("AuthMe", "REGISTER", "testArg"));
|
|
||||||
verify(executableCommand).executeCommand(sender, asList("testArg"));
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,283 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import fr.xephi.authme.util.StringUtils;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Set;
|
|
||||||
import java.util.function.BiConsumer;
|
|
||||||
import java.util.regex.Pattern;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.hasSize;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link CommandInitializer} to guarantee the integrity of the defined commands.
|
|
||||||
*/
|
|
||||||
public class CommandInitializerTest {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines the maximum allowed depths for nesting CommandDescription instances.
|
|
||||||
* Note that the depth starts at 0 (e.g. /authme), so a depth of 2 is something like /authme hello world
|
|
||||||
*/
|
|
||||||
private static int MAX_ALLOWED_DEPTH = 1;
|
|
||||||
|
|
||||||
private static Collection<CommandDescription> commands;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void initializeCommandCollection() {
|
|
||||||
CommandInitializer commandInitializer = new CommandInitializer();
|
|
||||||
commands = commandInitializer.getCommands();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInitializeCommands() {
|
|
||||||
// given/when/then
|
|
||||||
// It obviously doesn't make sense to test much of the concrete data
|
|
||||||
// that is being initialized; we just want to guarantee with this test
|
|
||||||
// that data is indeed being initialized and we take a few "probes"
|
|
||||||
assertThat(commands, hasSize(10));
|
|
||||||
assertThat(commandsIncludeLabel(commands, "authme"), equalTo(true));
|
|
||||||
assertThat(commandsIncludeLabel(commands, "register"), equalTo(true));
|
|
||||||
assertThat(commandsIncludeLabel(commands, "help"), equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotBeNestedExcessively() {
|
|
||||||
// given
|
|
||||||
BiConsumer<CommandDescription, Integer> descriptionTester =
|
|
||||||
(command, depth) -> assertThat(depth <= MAX_ALLOWED_DEPTH, equalTo(true));
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, descriptionTester);
|
|
||||||
}
|
|
||||||
|
|
||||||
/** Ensure that all children of a command stored the parent. */
|
|
||||||
@Test
|
|
||||||
public void shouldHaveConnectionBetweenParentAndChild() {
|
|
||||||
// given
|
|
||||||
BiConsumer<CommandDescription, Integer> connectionTester = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
if (!command.getChildren().isEmpty()) {
|
|
||||||
for (CommandDescription child : command.getChildren()) {
|
|
||||||
assertThat(command.equals(child.getParent()), equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// Checking that the parent has the current command as child is redundant as this is how we can traverse
|
|
||||||
// the "command tree" in the first place - if we're here, it's that the parent definitely has the
|
|
||||||
// command as child.
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, connectionTester);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUseProperLowerCaseLabels() {
|
|
||||||
// given
|
|
||||||
final Pattern invalidPattern = Pattern.compile("\\s");
|
|
||||||
BiConsumer<CommandDescription, Integer> labelFormatTester = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
for (String label : command.getLabels()) {
|
|
||||||
if (!label.equals(label.toLowerCase(Locale.ROOT))) {
|
|
||||||
fail("Label '" + label + "' should be lowercase");
|
|
||||||
} else if (invalidPattern.matcher(label).matches()) {
|
|
||||||
fail("Label '" + label + "' has whitespace");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, labelFormatTester);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotDefineSameLabelTwice() {
|
|
||||||
// given
|
|
||||||
final Set<String> commandMappings = new HashSet<>();
|
|
||||||
BiConsumer<CommandDescription, Integer> uniqueMappingTester = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
int initialSize = commandMappings.size();
|
|
||||||
List<String> newMappings = getAbsoluteLabels(command);
|
|
||||||
commandMappings.addAll(newMappings);
|
|
||||||
// Set only contains unique entries, so we just check after adding all new mappings that the size
|
|
||||||
// of the Set corresponds to our expectation
|
|
||||||
assertThat("All bindings are unique for command with bindings '" + newMappings + "'",
|
|
||||||
commandMappings.size() == initialSize + newMappings.size(), equalTo(true));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, uniqueMappingTester);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The description should provide a very short description of the command and shouldn't end in a ".", whereas the
|
|
||||||
* detailed description should be longer and end with a period.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldHaveProperDescription() {
|
|
||||||
// given
|
|
||||||
BiConsumer<CommandDescription, Integer> descriptionTester = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
String forCommandText = " for command with labels '" + command.getLabels() + "'";
|
|
||||||
|
|
||||||
assertThat("has description" + forCommandText,
|
|
||||||
StringUtils.isBlank(command.getDescription()), equalTo(false));
|
|
||||||
assertThat("short description doesn't end in '.'" + forCommandText,
|
|
||||||
command.getDescription().endsWith("."), equalTo(false));
|
|
||||||
assertThat("has detailed description" + forCommandText,
|
|
||||||
StringUtils.isBlank(command.getDetailedDescription()), equalTo(false));
|
|
||||||
assertThat("detailed description ends in '.'" + forCommandText,
|
|
||||||
command.getDetailedDescription().endsWith("."), equalTo(true));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, descriptionTester);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveOptionalArgumentsAfterMandatoryOnes() {
|
|
||||||
// given
|
|
||||||
BiConsumer<CommandDescription, Integer> argumentOrderTester = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
boolean encounteredOptionalArg = false;
|
|
||||||
for (CommandArgumentDescription argument : command.getArguments()) {
|
|
||||||
if (argument.isOptional()) {
|
|
||||||
encounteredOptionalArg = true;
|
|
||||||
} else if (encounteredOptionalArg) {
|
|
||||||
fail("Mandatory arguments should come before optional ones for command with labels '"
|
|
||||||
+ command.getLabels() + "'");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, argumentOrderTester);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Ensure that a command with children (i.e. a base command) doesn't define any arguments. This might otherwise
|
|
||||||
* clash with the label of the child.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldNotHaveArgumentsIfCommandHasChildren() {
|
|
||||||
// given
|
|
||||||
BiConsumer<CommandDescription, Integer> noArgumentForParentChecker = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
// Fail if the command has children and has arguments at the same time
|
|
||||||
// Exception: If the parent only has one child defining the help label, it is acceptable
|
|
||||||
if (!command.getChildren().isEmpty() && !command.getArguments().isEmpty()
|
|
||||||
&& (command.getChildren().size() != 1 || !command.getChildren().get(0).hasLabel("help"))) {
|
|
||||||
fail("Parent command (labels='" + command.getLabels() + "') should not have any arguments");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when/then
|
|
||||||
walkThroughCommands(commands, noArgumentForParentChecker);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Tests that multiple CommandDescription instances pointing to the same ExecutableCommand use the same
|
|
||||||
* count of arguments.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldPointToSameExecutableCommandWithConsistentArgumentCount() {
|
|
||||||
// given
|
|
||||||
final Map<Class<? extends ExecutableCommand>, Integer> mandatoryArguments = new HashMap<>();
|
|
||||||
final Map<Class<? extends ExecutableCommand>, Integer> totalArguments = new HashMap<>();
|
|
||||||
|
|
||||||
BiConsumer<CommandDescription, Integer> argChecker = new BiConsumer<CommandDescription, Integer>() {
|
|
||||||
@Override
|
|
||||||
public void accept(CommandDescription command, Integer depth) {
|
|
||||||
testCollectionForCommand(command, CommandUtils.getMinNumberOfArguments(command), mandatoryArguments);
|
|
||||||
testCollectionForCommand(command, CommandUtils.getMaxNumberOfArguments(command), totalArguments);
|
|
||||||
}
|
|
||||||
|
|
||||||
private void testCollectionForCommand(CommandDescription command, int argCount,
|
|
||||||
Map<Class<? extends ExecutableCommand>, Integer> collection) {
|
|
||||||
final Class<? extends ExecutableCommand> clazz = command.getExecutableCommand();
|
|
||||||
Integer existingCount = collection.get(clazz);
|
|
||||||
if (existingCount == null) {
|
|
||||||
collection.put(clazz, argCount);
|
|
||||||
} else {
|
|
||||||
String commandDescription = "Command with label '" + command.getLabels().get(0) + "' and parent '"
|
|
||||||
+ (command.getParent() == null ? "null" : command.getLabels().get(0)) + "' ";
|
|
||||||
assertThat(commandDescription + "should point to " + clazz + " with arguments consistent to others",
|
|
||||||
argCount, equalTo(existingCount));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
walkThroughCommands(commands, argChecker);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
// ------------
|
|
||||||
// Helper methods
|
|
||||||
// ------------
|
|
||||||
private static void walkThroughCommands(Collection<CommandDescription> commands,
|
|
||||||
BiConsumer<CommandDescription, Integer> consumer) {
|
|
||||||
walkThroughCommands(commands, consumer, 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void walkThroughCommands(Collection<CommandDescription> commands,
|
|
||||||
BiConsumer<CommandDescription, Integer> consumer, int depth) {
|
|
||||||
for (CommandDescription command : commands) {
|
|
||||||
consumer.accept(command, depth);
|
|
||||||
if (!command.getChildren().isEmpty()) {
|
|
||||||
walkThroughCommands(command.getChildren(), consumer, depth + 1);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static boolean commandsIncludeLabel(Iterable<CommandDescription> commands, String label) {
|
|
||||||
for (CommandDescription command : commands) {
|
|
||||||
if (command.getLabels().contains(label)) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get the absolute binding that a command defines. Note: Assumes that only the passed command can have
|
|
||||||
* multiple labels; only considering the first label for all of the command's parents.
|
|
||||||
*
|
|
||||||
* @param command The command to process
|
|
||||||
*
|
|
||||||
* @return List of all bindings that lead to the command
|
|
||||||
*/
|
|
||||||
private static List<String> getAbsoluteLabels(CommandDescription command) {
|
|
||||||
CommandDescription parent = command.getParent();
|
|
||||||
String parentPath = (parent == null) ? "" : parent.getLabels().get(0) + " ";
|
|
||||||
|
|
||||||
List<String> bindings = new ArrayList<>(command.getLabels().size());
|
|
||||||
for (String label : command.getLabels()) {
|
|
||||||
bindings.add(parentPath + label);
|
|
||||||
}
|
|
||||||
return bindings;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,319 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import ch.jalu.injector.testing.BeforeInjecting;
|
|
||||||
import ch.jalu.injector.testing.DelayedInjectionRunner;
|
|
||||||
import ch.jalu.injector.testing.InjectDelayed;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil.TestLoginCommand;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil.TestRegisterCommand;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil.TestUnregisterCommand;
|
|
||||||
import fr.xephi.authme.command.executable.HelpCommand;
|
|
||||||
import fr.xephi.authme.permission.PermissionNode;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.command.TestCommandsUtil.getCommandWithLabel;
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static java.util.Collections.singletonList;
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
|
||||||
import static org.hamcrest.Matchers.empty;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.ArgumentMatchers.isNull;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link CommandMapper}.
|
|
||||||
*/
|
|
||||||
@RunWith(DelayedInjectionRunner.class)
|
|
||||||
public class CommandMapperTest {
|
|
||||||
|
|
||||||
private static List<CommandDescription> commands;
|
|
||||||
|
|
||||||
@InjectDelayed
|
|
||||||
private CommandMapper mapper;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommandInitializer commandInitializer;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpCommandHandler() {
|
|
||||||
commands = TestCommandsUtil.generateCommands();
|
|
||||||
}
|
|
||||||
|
|
||||||
@BeforeInjecting
|
|
||||||
public void setUpMocks() {
|
|
||||||
given(commandInitializer.getCommands()).willReturn(commands);
|
|
||||||
}
|
|
||||||
|
|
||||||
// -----------
|
|
||||||
// mapPartsToCommand() tests
|
|
||||||
// -----------
|
|
||||||
@Test
|
|
||||||
public void shouldMapPartsToLoginChildCommand() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme", "login", "test1");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "authme", "login")));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.SUCCESS));
|
|
||||||
assertThat(result.getArguments(), contains("test1"));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts.subList(0, 2)));
|
|
||||||
assertThat(result.getArguments(), contains(parts.get(2)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldMapPartsToCommandWithNoCaseSensitivity() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("Authme", "REG", "arg1", "arg2");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "authme", "register")));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.SUCCESS));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts.subList(0, 2)));
|
|
||||||
assertThat(result.getArguments(), contains("arg1", "arg2"));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectCommandWithTooManyArguments() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme", "register", "pass123", "pass123", "pass123");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "authme", "register")));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.INCORRECT_ARGUMENTS));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts.subList(0, 2)));
|
|
||||||
assertThat(result.getArguments(), equalTo(parts.subList(2, 5)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectCommandWithTooFewArguments() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme", "Reg");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "authme", "register")));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.INCORRECT_ARGUMENTS));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts));
|
|
||||||
assertThat(result.getArguments(), empty());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSuggestCommandWithSimilarLabel() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme", "reh", "pass123", "pass123");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "authme", "register")));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.UNKNOWN_LABEL));
|
|
||||||
assertThat(result.getDifference() < 0.75, equalTo(true));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts.subList(0, 2)));
|
|
||||||
assertThat(result.getArguments(), contains("pass123", "pass123"));
|
|
||||||
}
|
|
||||||
|
|
||||||
/** In contrast to the previous test, we test a command request with a very apart label. */
|
|
||||||
@Test
|
|
||||||
public void shouldSuggestMostSimilarCommand() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme", "asdfawetawty4asdca");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), not(nullValue()));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.UNKNOWN_LABEL));
|
|
||||||
assertThat(result.getDifference() > 0.75, equalTo(true));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts));
|
|
||||||
assertThat(result.getArguments(), empty());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleBaseWithWrongArguments() {
|
|
||||||
// given
|
|
||||||
List<String> parts = singletonList("unregister");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.INCORRECT_ARGUMENTS));
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "unregister")));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getArguments(), empty());
|
|
||||||
assertThat(result.getLabels(), equalTo(parts));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnknownBase() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("bogus", "label1", "arg1");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.MISSING_BASE_COMMAND));
|
|
||||||
assertThat(result.getCommandDescription(), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullInput() {
|
|
||||||
// given / when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(mock(CommandSender.class), null);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.MISSING_BASE_COMMAND));
|
|
||||||
assertThat(result.getCommandDescription(), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldMapToBaseWithProperArguments() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("Unreg", "player1");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.SUCCESS));
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "unregister")));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getArguments(), contains("player1"));
|
|
||||||
assertThat(result.getLabels(), contains("Unreg"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnChildlessBaseCommandWithArgCountError() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("unregistER", "player1", "wrongArg");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.INCORRECT_ARGUMENTS));
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "unregister")));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getArguments(), contains("player1", "wrongArg"));
|
|
||||||
assertThat(result.getLabels(), contains("unregistER"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPassCommandPathAsArgumentsToHelpCommand() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("email", "helptest", "arg1");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), isNull())).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.SUCCESS));
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "email", "helptest")));
|
|
||||||
assertThat(result.getLabels(), contains("email", "helptest"));
|
|
||||||
assertThat(result.getArguments(), contains("email", "arg1"));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRecognizeMissingPermissionForCommand() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme", "login", "test1");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "authme", "login")));
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.NO_PERMISSION));
|
|
||||||
assertThat(result.getArguments(), contains("test1"));
|
|
||||||
assertThat(result.getDifference(), equalTo(0.0));
|
|
||||||
assertThat(result.getLabels(), equalTo(parts.subList(0, 2)));
|
|
||||||
assertThat(result.getArguments(), contains(parts.get(2)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSupportAuthMePrefix() {
|
|
||||||
// given
|
|
||||||
List<String> parts = asList("authme:unregister", "Betty");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
FoundCommandResult result = mapper.mapPartsToCommand(sender, parts);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result.getResultStatus(), equalTo(FoundResultStatus.SUCCESS));
|
|
||||||
assertThat(result.getCommandDescription(), equalTo(getCommandWithLabel(commands, "unregister")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
@Test
|
|
||||||
public void shouldReturnExecutableCommandClasses() {
|
|
||||||
// given / when
|
|
||||||
Set<Class<? extends ExecutableCommand>> commandClasses = mapper.getCommandClasses();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(commandClasses, containsInAnyOrder(ExecutableCommand.class, HelpCommand.class,
|
|
||||||
TestLoginCommand.class, TestRegisterCommand.class, TestUnregisterCommand.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,138 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import org.bukkit.ChatColor;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link CommandUtils}.
|
|
||||||
*/
|
|
||||||
public class CommandUtilsTest {
|
|
||||||
|
|
||||||
private static Collection<CommandDescription> commands;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpTestCommands() {
|
|
||||||
commands = Collections.unmodifiableCollection(TestCommandsUtil.generateCommands());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnCommandPath() {
|
|
||||||
// given
|
|
||||||
CommandDescription base = CommandDescription.builder()
|
|
||||||
.labels("authme", "auth")
|
|
||||||
.description("Base")
|
|
||||||
.detailedDescription("Test base command.")
|
|
||||||
.executableCommand(ExecutableCommand.class)
|
|
||||||
.register();
|
|
||||||
CommandDescription command = CommandDescription.builder()
|
|
||||||
.parent(base)
|
|
||||||
.labels("help", "h", "?")
|
|
||||||
.description("Child")
|
|
||||||
.detailedDescription("Test child command.")
|
|
||||||
.executableCommand(ExecutableCommand.class)
|
|
||||||
.register();
|
|
||||||
|
|
||||||
// when
|
|
||||||
String commandPath = CommandUtils.constructCommandPath(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(commandPath, equalTo("/authme help"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldComputeMinAndMaxOnEmptyCommand() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getBuilderForArgsTest().register();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
checkArgumentCount(command, 0, 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldComputeMinAndMaxOnCommandWithMandatoryArgs() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getBuilderForArgsTest()
|
|
||||||
.withArgument("Test", "Arg description", false)
|
|
||||||
.withArgument("Test22", "Arg description 2", false)
|
|
||||||
.register();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
checkArgumentCount(command, 2, 2);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldComputeMinAndMaxOnCommandIncludingOptionalArgs() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getBuilderForArgsTest()
|
|
||||||
.withArgument("arg1", "Arg description", false)
|
|
||||||
.withArgument("arg2", "Arg description 2", true)
|
|
||||||
.withArgument("arg3", "Arg description 3", true)
|
|
||||||
.register();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
checkArgumentCount(command, 1, 3);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFormatSimpleArgument() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = TestCommandsUtil.getCommandWithLabel(commands, "authme");
|
|
||||||
List<String> labels = Collections.singletonList("authme");
|
|
||||||
|
|
||||||
// when
|
|
||||||
String result = CommandUtils.buildSyntax(command, labels);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(ChatColor.WHITE + "/authme" + ChatColor.YELLOW));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFormatCommandWithMultipleArguments() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = TestCommandsUtil.getCommandWithLabel(commands, "authme", "register");
|
|
||||||
List<String> labels = Arrays.asList("authme", "reg");
|
|
||||||
|
|
||||||
// when
|
|
||||||
String result = CommandUtils.buildSyntax(command, labels);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(ChatColor.WHITE + "/authme" + ChatColor.YELLOW + " reg <password> <confirmation>"));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFormatCommandWithOptionalArgument() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = TestCommandsUtil.getCommandWithLabel(commands, "email");
|
|
||||||
List<String> labels = Collections.singletonList("email");
|
|
||||||
|
|
||||||
// when
|
|
||||||
String result = CommandUtils.buildSyntax(command, labels);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(ChatColor.WHITE + "/email" + ChatColor.YELLOW + " [player]"));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
private static void checkArgumentCount(CommandDescription command, int expectedMin, int expectedMax) {
|
|
||||||
assertThat(CommandUtils.getMinNumberOfArguments(command), equalTo(expectedMin));
|
|
||||||
assertThat(CommandUtils.getMaxNumberOfArguments(command), equalTo(expectedMax));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static CommandDescription.CommandBuilder getBuilderForArgsTest() {
|
|
||||||
return CommandDescription.builder()
|
|
||||||
.labels("authme", "auth")
|
|
||||||
.description("Base")
|
|
||||||
.detailedDescription("Test base command.")
|
|
||||||
.executableCommand(ExecutableCommand.class);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,81 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PlayerCommand}.
|
|
||||||
*/
|
|
||||||
public class PlayerCommandTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNonPlayerSender() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
PlayerCommandImpl command = new PlayerCommandImpl();
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("only for players")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCallRunCommandForPlayer() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
List<String> arguments = Arrays.asList("arg1", "testarg2");
|
|
||||||
PlayerCommandImpl command = new PlayerCommandImpl();
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player, times(1)).sendMessage("testarg2");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNonPlayerAndSendAlternative() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerCommandWithAlt command = new PlayerCommandWithAlt();
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender, times(1)).sendMessage(argThat(containsString("use /authme test <command> instead")));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
private static class PlayerCommandImpl extends PlayerCommand {
|
|
||||||
@Override
|
|
||||||
public void runCommand(Player player, List<String> arguments) {
|
|
||||||
player.sendMessage(arguments.get(1));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static class PlayerCommandWithAlt extends PlayerCommand {
|
|
||||||
@Override
|
|
||||||
public void runCommand(Player player, List<String> arguments) {
|
|
||||||
throw new IllegalStateException("Should not be called");
|
|
||||||
}
|
|
||||||
@Override
|
|
||||||
public String getAlternativeCommand() {
|
|
||||||
return "/authme test <command>";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,133 +0,0 @@
|
|||||||
package fr.xephi.authme.command;
|
|
||||||
|
|
||||||
import com.google.common.collect.ImmutableList;
|
|
||||||
import fr.xephi.authme.command.executable.HelpCommand;
|
|
||||||
import fr.xephi.authme.permission.AdminPermission;
|
|
||||||
import fr.xephi.authme.permission.PermissionNode;
|
|
||||||
import fr.xephi.authme.permission.PlayerPermission;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static java.util.Collections.singletonList;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Util class for generating and retrieving test commands.
|
|
||||||
*/
|
|
||||||
public final class TestCommandsUtil {
|
|
||||||
|
|
||||||
private TestCommandsUtil() {
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Generate the collection of test commands.
|
|
||||||
*
|
|
||||||
* @return The generated commands
|
|
||||||
*/
|
|
||||||
public static List<CommandDescription> generateCommands() {
|
|
||||||
// Register /authme
|
|
||||||
CommandDescription authMeBase = createCommand(null, null, singletonList("authme"), ExecutableCommand.class);
|
|
||||||
// Register /authme login <password>
|
|
||||||
createCommand(PlayerPermission.LOGIN, authMeBase, singletonList("login"),
|
|
||||||
TestLoginCommand.class, newArgument("password", false));
|
|
||||||
// Register /authme register <password> <confirmation>, aliases: /authme reg, /authme r
|
|
||||||
createCommand(PlayerPermission.LOGIN, authMeBase, asList("register", "reg", "r"), TestRegisterCommand.class,
|
|
||||||
newArgument("password", false), newArgument("confirmation", false));
|
|
||||||
|
|
||||||
// Register /email [player]
|
|
||||||
CommandDescription emailBase = createCommand(null, null, singletonList("email"), ExecutableCommand.class,
|
|
||||||
newArgument("player", true));
|
|
||||||
// Register /email helptest -- use only to test for help command arguments special case
|
|
||||||
CommandDescription.builder().parent(emailBase).labels("helptest").executableCommand(HelpCommand.class)
|
|
||||||
.description("test").detailedDescription("Test.").withArgument("Query", "", false).register();
|
|
||||||
|
|
||||||
// Register /unregister <player>, alias: /unreg
|
|
||||||
CommandDescription unregisterBase = createCommand(AdminPermission.UNREGISTER, null,
|
|
||||||
asList("unregister", "unreg"), TestUnregisterCommand.class, newArgument("player", false));
|
|
||||||
|
|
||||||
return ImmutableList.of(authMeBase, emailBase, unregisterBase);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Retrieve the command with the given label from the collection of commands.
|
|
||||||
* Example: <code>getCommandWithLabel(commands, "authme", "reg")</code> to find the command description
|
|
||||||
* which defines the command /authme reg.
|
|
||||||
*
|
|
||||||
* @param commands The commands to search in
|
|
||||||
* @param parentLabel The parent label to search for
|
|
||||||
* @param childLabel The child label to find
|
|
||||||
* @return The matched command, or throws an exception if no command could be found
|
|
||||||
*/
|
|
||||||
public static CommandDescription getCommandWithLabel(Collection<CommandDescription> commands, String parentLabel,
|
|
||||||
String childLabel) {
|
|
||||||
CommandDescription parent = getCommandWithLabel(commands, parentLabel);
|
|
||||||
return getCommandWithLabel(parent.getChildren(), childLabel);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Retrieve the command with the given label from the collection of commands.
|
|
||||||
*
|
|
||||||
* @param commands The commands to search in
|
|
||||||
* @param label The label to search for
|
|
||||||
* @return The matched command, or throws an exception if no command could be found
|
|
||||||
*/
|
|
||||||
public static CommandDescription getCommandWithLabel(Collection<CommandDescription> commands, String label) {
|
|
||||||
for (CommandDescription child : commands) {
|
|
||||||
if (child.hasLabel(label)) {
|
|
||||||
return child;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw new IllegalStateException("Could not find command with label '" + label + "'");
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Shortcut command to initialize a new test command. */
|
|
||||||
private static CommandDescription createCommand(PermissionNode permission, CommandDescription parent,
|
|
||||||
List<String> labels,
|
|
||||||
Class<? extends ExecutableCommand> commandClass,
|
|
||||||
CommandArgumentDescription... arguments) {
|
|
||||||
CommandDescription.CommandBuilder command = CommandDescription.builder()
|
|
||||||
.labels(labels)
|
|
||||||
.parent(parent)
|
|
||||||
.permission(permission)
|
|
||||||
.description(labels.get(0) + " cmd")
|
|
||||||
.detailedDescription("'" + labels.get(0) + "' test command")
|
|
||||||
.executableCommand(commandClass);
|
|
||||||
|
|
||||||
if (arguments != null && arguments.length > 0) {
|
|
||||||
for (CommandArgumentDescription argument : arguments) {
|
|
||||||
command.withArgument(argument.getName(), argument.getDescription(), argument.isOptional());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return command.register();
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Shortcut command to initialize a new argument description. */
|
|
||||||
private static CommandArgumentDescription newArgument(String label, boolean isOptional) {
|
|
||||||
return new CommandArgumentDescription(label, "'" + label + "' argument description", isOptional);
|
|
||||||
}
|
|
||||||
|
|
||||||
public static class TestLoginCommand implements ExecutableCommand {
|
|
||||||
@Override
|
|
||||||
public void executeCommand(CommandSender sender, List<String> arguments) {
|
|
||||||
// noop
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public static class TestRegisterCommand implements ExecutableCommand {
|
|
||||||
@Override
|
|
||||||
public void executeCommand(CommandSender sender, List<String> arguments) {
|
|
||||||
// noop
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public static class TestUnregisterCommand implements ExecutableCommand {
|
|
||||||
@Override
|
|
||||||
public void executeCommand(CommandSender sender, List<String> arguments) {
|
|
||||||
// noop
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,163 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable;
|
|
||||||
|
|
||||||
import fr.xephi.authme.command.CommandDescription;
|
|
||||||
import fr.xephi.authme.command.CommandMapper;
|
|
||||||
import fr.xephi.authme.command.FoundCommandResult;
|
|
||||||
import fr.xephi.authme.command.help.HelpProvider;
|
|
||||||
import org.bukkit.ChatColor;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.INCORRECT_ARGUMENTS;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.MISSING_BASE_COMMAND;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.SUCCESS;
|
|
||||||
import static fr.xephi.authme.command.FoundResultStatus.UNKNOWN_LABEL;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_ALTERNATIVES;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_CHILDREN;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_COMMAND;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_DESCRIPTION;
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static java.util.Collections.singletonList;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link HelpCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class HelpCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private HelpCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommandMapper commandMapper;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private HelpProvider helpProvider;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingBaseCommand() {
|
|
||||||
// given
|
|
||||||
List<String> arguments = asList("some", "command");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
FoundCommandResult foundCommandResult = new FoundCommandResult(null, null, null, 0.0, MISSING_BASE_COMMAND);
|
|
||||||
given(commandMapper.mapPartsToCommand(sender, arguments)).willReturn(foundCommandResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Could not get base command")));
|
|
||||||
verifyNoInteractions(helpProvider);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleWrongCommandWithSuggestion() {
|
|
||||||
// given
|
|
||||||
List<String> arguments = asList("authme", "ragister", "test");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription description = newCommandDescription("authme", "register");
|
|
||||||
FoundCommandResult foundCommandResult = new FoundCommandResult(description, asList("authme", "ragister"),
|
|
||||||
singletonList("test"), 0.1, UNKNOWN_LABEL);
|
|
||||||
given(commandMapper.mapPartsToCommand(sender, arguments)).willReturn(foundCommandResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender).sendMessage(captor.capture());
|
|
||||||
assertThat(removeColors(captor.getValue()), containsString("Assuming /authme register"));
|
|
||||||
verify(helpProvider).outputHelp(sender, foundCommandResult, HelpProvider.ALL_OPTIONS);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleWrongCommandWithoutSuggestion() {
|
|
||||||
List<String> arguments = asList("authme", "ragister", "test");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
FoundCommandResult foundCommandResult = new FoundCommandResult(null, asList("authme", "ragister"),
|
|
||||||
singletonList("test"), 0.4, UNKNOWN_LABEL);
|
|
||||||
given(commandMapper.mapPartsToCommand(sender, arguments)).willReturn(foundCommandResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender).sendMessage(captor.capture());
|
|
||||||
assertThat(removeColors(captor.getValue()), containsString("Unknown command"));
|
|
||||||
verifyNoInteractions(helpProvider);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowChildrenOfBaseCommand() {
|
|
||||||
List<String> arguments = singletonList("authme");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription commandDescription = mock(CommandDescription.class);
|
|
||||||
given(commandDescription.getLabelCount()).willReturn(1);
|
|
||||||
FoundCommandResult foundCommandResult = new FoundCommandResult(commandDescription, singletonList("authme"),
|
|
||||||
Collections.emptyList(), 0.0, SUCCESS);
|
|
||||||
given(commandMapper.mapPartsToCommand(sender, arguments)).willReturn(foundCommandResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
verify(helpProvider).outputHelp(sender, foundCommandResult,
|
|
||||||
SHOW_DESCRIPTION | SHOW_COMMAND | SHOW_CHILDREN | SHOW_ALTERNATIVES);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowDetailedHelpForChildCommand() {
|
|
||||||
List<String> arguments = asList("authme", "getpos");
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
CommandDescription commandDescription = mock(CommandDescription.class);
|
|
||||||
given(commandDescription.getLabelCount()).willReturn(2);
|
|
||||||
FoundCommandResult foundCommandResult = new FoundCommandResult(commandDescription, asList("authme", "getpos"),
|
|
||||||
Collections.emptyList(), 0.0, INCORRECT_ARGUMENTS);
|
|
||||||
given(commandMapper.mapPartsToCommand(sender, arguments)).willReturn(foundCommandResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
verify(helpProvider).outputHelp(sender, foundCommandResult, HelpProvider.ALL_OPTIONS);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static CommandDescription newCommandDescription(String... labels) {
|
|
||||||
CommandDescription parent = null;
|
|
||||||
// iterate through the labels backwards so we can set the parent
|
|
||||||
for (String label : labels) {
|
|
||||||
CommandDescription description = mock(CommandDescription.class);
|
|
||||||
given(description.getParent()).willReturn(parent);
|
|
||||||
given(description.getLabels()).willReturn(singletonList(label));
|
|
||||||
parent = description;
|
|
||||||
}
|
|
||||||
return parent;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static String removeColors(String str) {
|
|
||||||
for (ChatColor color : ChatColor.values()) {
|
|
||||||
str = str.replace(color.toString(), "");
|
|
||||||
}
|
|
||||||
return str;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,178 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskAsynchronously;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link AccountsCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class AccountsCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private AccountsCommand command;
|
|
||||||
@Mock
|
|
||||||
private CommonService service;
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetAccountsOfCurrentUser() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(sender.getName()).willReturn("Tester");
|
|
||||||
List<String> arguments = Collections.emptyList();
|
|
||||||
given(dataSource.getAuth("tester")).willReturn(authWithIp("123.45.67.89"));
|
|
||||||
given(dataSource.getAllAuthsByIp("123.45.67.89")).willReturn(Arrays.asList("Toaster", "Pester"));
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
String[] messages = getMessagesSentToSender(sender, 2);
|
|
||||||
assertThat(messages[0], containsString("2 accounts"));
|
|
||||||
assertThat(messages[1], containsString("Toaster, Pester"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnUnknownUserForNullAuth() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
List<String> arguments = Collections.singletonList("SomeUser");
|
|
||||||
given(dataSource.getAuth("someuser")).willReturn(null);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(service).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnUnregisteredMessageForEmptyAuthList() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
List<String> arguments = Collections.singletonList("SomeUser");
|
|
||||||
PlayerAuth auth = authWithIp("144.56.77.88");
|
|
||||||
given(dataSource.getAuth("someuser")).willReturn(auth);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(service).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnSingleAccountMessage() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
List<String> arguments = Collections.singletonList("SomeUser");
|
|
||||||
given(dataSource.getAuth("someuser")).willReturn(authWithIp("56.78.90.123"));
|
|
||||||
given(dataSource.getAllAuthsByIp("56.78.90.123")).willReturn(Collections.singletonList("SomeUser"));
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
String[] messages = getMessagesSentToSender(sender, 1);
|
|
||||||
assertThat(messages[0], containsString("single account"));
|
|
||||||
}
|
|
||||||
|
|
||||||
// -----
|
|
||||||
// Query by IP
|
|
||||||
// -----
|
|
||||||
@Test
|
|
||||||
public void shouldReturnIpUnknown() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
List<String> arguments = Collections.singletonList("123.45.67.89");
|
|
||||||
given(dataSource.getAllAuthsByIp("123.45.67.89")).willReturn(Collections.emptyList());
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
String[] messages = getMessagesSentToSender(sender, 1);
|
|
||||||
assertThat(messages[0], containsString("IP does not exist"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnSingleAccountForIpQuery() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
List<String> arguments = Collections.singletonList("24.24.48.48");
|
|
||||||
given(dataSource.getAllAuthsByIp("24.24.48.48")).willReturn(Collections.singletonList("SomeUser"));
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
String[] messages = getMessagesSentToSender(sender, 1);
|
|
||||||
assertThat(messages[0], containsString("single account"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnAccountListForIpQuery() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
List<String> arguments = Collections.singletonList("98.76.41.122");
|
|
||||||
given(dataSource.getAllAuthsByIp("98.76.41.122")).willReturn(Arrays.asList("Tester", "Lester", "Taster"));
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
String[] messages = getMessagesSentToSender(sender, 2);
|
|
||||||
assertThat(messages[0], containsString("3 accounts"));
|
|
||||||
assertThat(messages[1], containsString("Tester, Lester, Taster"));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static String[] getMessagesSentToSender(CommandSender sender, int expectedCount) {
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(expectedCount)).sendMessage(captor.capture());
|
|
||||||
return captor.getAllValues().toArray(new String[expectedCount]);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static PlayerAuth authWithIp(String ip) {
|
|
||||||
return PlayerAuth.builder()
|
|
||||||
.name("Test")
|
|
||||||
.lastIp(ip)
|
|
||||||
.build();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,36 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.command.ExecutableCommand;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link AuthMeCommand}.
|
|
||||||
*/
|
|
||||||
public class AuthMeCommandTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDisplayInformation() {
|
|
||||||
// given
|
|
||||||
ExecutableCommand command = new AuthMeCommand();
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> messagesCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(3)).sendMessage(messagesCaptor.capture());
|
|
||||||
assertThat(messagesCaptor.getAllValues().get(1), containsString("/authme help"));
|
|
||||||
assertThat(messagesCaptor.getAllValues().get(2), containsString("/authme about"));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,39 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.service.BackupService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link BackupCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class BackupCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private BackupCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BackupService backupService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStartBackup() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(backupService).doBackup(BackupService.BackupCause.COMMAND, sender);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,73 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import fr.xephi.authme.service.ValidationService.ValidationResult;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ChangePasswordAdminCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ChangePasswordAdminCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ChangePasswordAdminCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardRequestToManagement() {
|
|
||||||
// given
|
|
||||||
String name = "theUser";
|
|
||||||
String pass = "newPassword";
|
|
||||||
given(validationService.validatePassword(pass, name)).willReturn(new ValidationResult());
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(name, pass));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(pass, name);
|
|
||||||
verify(management).performPasswordChangeAsAdmin(sender, name, pass);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSendErrorToCommandSender() {
|
|
||||||
// given
|
|
||||||
String name = "theUser";
|
|
||||||
String pass = "newPassword";
|
|
||||||
given(validationService.validatePassword(pass, name)).willReturn(
|
|
||||||
new ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH, "7"));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(name, pass));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(pass, name);
|
|
||||||
verify(commonService).send(sender, MessageKey.INVALID_PASSWORD_LENGTH, "7");
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,149 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import ch.jalu.injector.factory.Factory;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.datasource.converter.Converter;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.util.StringUtils;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskAsynchronously;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.doThrow;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ConverterCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ConverterCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ConverterCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Factory<Converter> converterFactory;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void initLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnknownConversionType() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("invalid"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
String converters = String.join(", ", ConverterCommand.CONVERTERS.keySet());
|
|
||||||
verify(sender).sendMessage(argThat(containsString(converters)));
|
|
||||||
verifyNoInteractions(commonService, converterFactory, bukkitService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleCommandWithNoArgs() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
String converters = String.join(", ", ConverterCommand.CONVERTERS.keySet());
|
|
||||||
verify(sender).sendMessage(argThat(containsString(converters)));
|
|
||||||
verifyNoInteractions(commonService, converterFactory, bukkitService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveUniqueClassForEachConverter() {
|
|
||||||
// given
|
|
||||||
Set<Class<? extends Converter>> classes = new HashSet<>();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
for (Map.Entry<String, Class<? extends Converter>> entry : ConverterCommand.CONVERTERS.entrySet()) {
|
|
||||||
assertThat("Name is not null or empty",
|
|
||||||
StringUtils.isBlank(entry.getKey()), equalTo(false));
|
|
||||||
|
|
||||||
assertThat("Converter class is unique for each entry",
|
|
||||||
classes.add(entry.getValue()), equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldLaunchConverterForAllTypes() {
|
|
||||||
// given
|
|
||||||
String converterName = "rakamak";
|
|
||||||
Class<? extends Converter> converterClass = ConverterCommand.CONVERTERS.get(converterName);
|
|
||||||
Converter converter = createMockReturnedByInjector(converterClass);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(converterName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(converter).execute(sender);
|
|
||||||
verifyNoMoreInteractions(converter);
|
|
||||||
verify(converterFactory).newInstance(converterClass);
|
|
||||||
verifyNoMoreInteractions(converterFactory);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCatchExceptionInConverterAndInformSender() {
|
|
||||||
// given
|
|
||||||
String converterName = "vauth";
|
|
||||||
Class<? extends Converter> converterClass = ConverterCommand.CONVERTERS.get(converterName);
|
|
||||||
Converter converter = createMockReturnedByInjector(converterClass);
|
|
||||||
doThrow(IllegalStateException.class).when(converter).execute(any(CommandSender.class));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(converterName.toUpperCase(Locale.ROOT)));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(converter).execute(sender);
|
|
||||||
verifyNoMoreInteractions(converter);
|
|
||||||
verify(converterFactory).newInstance(converterClass);
|
|
||||||
verifyNoMoreInteractions(converterFactory);
|
|
||||||
verify(commonService).send(sender, MessageKey.ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
private <T extends Converter> T createMockReturnedByInjector(Class<T> clazz) {
|
|
||||||
T converter = mock(clazz);
|
|
||||||
given(converterFactory.newInstance(clazz)).willReturn(converter);
|
|
||||||
return converter;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,63 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
|
||||||
import org.bukkit.Location;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeastOnce;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link FirstSpawnCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class FirstSpawnCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private FirstSpawnCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SpawnLoader spawnLoader;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldTeleportToFirstSpawn() {
|
|
||||||
// given
|
|
||||||
Location firstSpawn = mock(Location.class);
|
|
||||||
given(spawnLoader.getFirstSpawn()).willReturn(firstSpawn);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player).teleport(firstSpawn);
|
|
||||||
verify(spawnLoader, atLeastOnce()).getFirstSpawn();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingFirstSpawn() {
|
|
||||||
// given
|
|
||||||
given(spawnLoader.getFirstSpawn()).willReturn(null);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player).sendMessage(argThat(containsString("spawn has failed")));
|
|
||||||
verify(player, never()).teleport(any(Location.class));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,133 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.permission.PlayerPermission;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ForceLoginCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ForceLoginCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ForceLoginCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectOfflinePlayer() {
|
|
||||||
// given
|
|
||||||
String playerName = "Bobby";
|
|
||||||
Player player = mockPlayer(false);
|
|
||||||
given(bukkitService.getPlayerExact(playerName)).willReturn(player);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(playerName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(playerName);
|
|
||||||
verify(sender).sendMessage("Player needs to be online!");
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInexistentPlayer() {
|
|
||||||
// given
|
|
||||||
String playerName = "us3rname01";
|
|
||||||
given(bukkitService.getPlayerExact(playerName)).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(playerName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(playerName);
|
|
||||||
verify(sender).sendMessage("Player needs to be online!");
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectPlayerWithMissingPermission() {
|
|
||||||
// given
|
|
||||||
String playerName = "testTest";
|
|
||||||
Player player = mockPlayer(true);
|
|
||||||
given(bukkitService.getPlayerExact(playerName)).willReturn(player);
|
|
||||||
given(permissionsManager.hasPermission(player, PlayerPermission.CAN_LOGIN_BE_FORCED)).willReturn(false);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(playerName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(playerName);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("You cannot force login the player")));
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForceLoginPlayer() {
|
|
||||||
// given
|
|
||||||
String playerName = "tester23";
|
|
||||||
Player player = mockPlayer(true);
|
|
||||||
given(bukkitService.getPlayerExact(playerName)).willReturn(player);
|
|
||||||
given(permissionsManager.hasPermission(player, PlayerPermission.CAN_LOGIN_BE_FORCED)).willReturn(true);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(playerName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(playerName);
|
|
||||||
verify(management).forceLogin(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForceLoginSenderSelf() {
|
|
||||||
// given
|
|
||||||
String senderName = "tester23";
|
|
||||||
Player player = mockPlayer(true);
|
|
||||||
given(bukkitService.getPlayerExact(senderName)).willReturn(player);
|
|
||||||
given(permissionsManager.hasPermission(player, PlayerPermission.CAN_LOGIN_BE_FORCED)).willReturn(true);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(sender.getName()).willReturn(senderName);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(senderName);
|
|
||||||
verify(management).forceLogin(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayer(boolean isOnline) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.isOnline()).willReturn(isOnline);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,65 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import ch.jalu.datasourcecolumns.data.DataSourceValueImpl;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link GetEmailCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class GetEmailCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private GetEmailCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService service;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReportUnknownUser() {
|
|
||||||
// given
|
|
||||||
String user = "myTestUser";
|
|
||||||
given(dataSource.getEmail(user)).willReturn(DataSourceValueImpl.unknownRow());
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(user));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(service).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnEmail() {
|
|
||||||
// given
|
|
||||||
String user = "userToView";
|
|
||||||
String email = "user.email@example.org";
|
|
||||||
given(dataSource.getEmail(user)).willReturn(DataSourceValueImpl.of(email));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(user));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString(email)));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,106 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.both;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link GetIpCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class GetIpCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private GetIpCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetIpOfPlayer() {
|
|
||||||
// given
|
|
||||||
given(bukkitService.getPlayerExact(anyString())).willReturn(null);
|
|
||||||
given(dataSource.getAuth(anyString())).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
String name = "Testt";
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(name));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(name);
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
verify(sender, only()).sendMessage(argThat(containsString("not registered")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnIpAddressOfPlayer() {
|
|
||||||
// given
|
|
||||||
String playerName = "charlie";
|
|
||||||
String ip = "123.34.56.88";
|
|
||||||
Player player = mockPlayer(playerName, ip);
|
|
||||||
given(bukkitService.getPlayerExact(playerName)).willReturn(player);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name("t").lastIp("44.33.22.11").registrationIp("77.11.44.88").build();
|
|
||||||
given(dataSource.getAuth(playerName)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(playerName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(playerName);
|
|
||||||
verify(dataSource).getAuth(playerName);
|
|
||||||
verify(sender).sendMessage(argThat(both(containsString(playerName)).and(containsString(ip))));
|
|
||||||
verify(sender).sendMessage(argThat(both(containsString("44.33.22.11")).and(containsString("77.11.44.88"))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnregisteredOnlinePlayer() {
|
|
||||||
// given
|
|
||||||
String playerName = "Test";
|
|
||||||
String ip = "44.111.22.33";
|
|
||||||
Player player = mockPlayer(playerName, ip);
|
|
||||||
given(bukkitService.getPlayerExact(playerName)).willReturn(player);
|
|
||||||
given(dataSource.getAuth(anyString())).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(playerName));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(playerName);
|
|
||||||
verify(dataSource).getAuth(playerName);
|
|
||||||
verify(sender).sendMessage(argThat(both(containsString(playerName)).and(containsString(ip))));
|
|
||||||
verify(sender).sendMessage(argThat(containsString("not registered")));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayer(String name, String ip) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
TestHelper.mockIpAddressToPlayer(player, ip);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,135 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Date;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.allOf;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link LastLoginCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class LastLoginCommandTest {
|
|
||||||
|
|
||||||
private static final long HOUR_IN_MSEC = 3600 * 1000;
|
|
||||||
private static final long DAY_IN_MSEC = 24 * HOUR_IN_MSEC;
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private LastLoginCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService service;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNonExistentUser() {
|
|
||||||
// given
|
|
||||||
String player = "tester";
|
|
||||||
given(dataSource.getAuth(player)).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(player));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(player);
|
|
||||||
verify(service).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDisplayLastLoginOfUser() {
|
|
||||||
// given
|
|
||||||
String player = "SomePlayer";
|
|
||||||
long lastLogin = System.currentTimeMillis() -
|
|
||||||
(412 * DAY_IN_MSEC + 10 * HOUR_IN_MSEC - 9000);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(auth.getLastLogin()).willReturn(lastLogin);
|
|
||||||
given(auth.getLastIp()).willReturn("123.45.66.77");
|
|
||||||
given(dataSource.getAuth(player)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(player));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(player);
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(3)).sendMessage(captor.capture());
|
|
||||||
String lastLoginString = new Date(lastLogin).toString();
|
|
||||||
assertThat(captor.getAllValues().get(0),
|
|
||||||
allOf(containsString(player), containsString(lastLoginString)));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("412 days 9 hours"));
|
|
||||||
assertThat(captor.getAllValues().get(2), containsString("123.45.66.77"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDisplayLastLoginOfCommandSender() {
|
|
||||||
// given
|
|
||||||
String name = "CommandSender";
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
|
|
||||||
long lastLogin = System.currentTimeMillis()
|
|
||||||
- (412 * DAY_IN_MSEC + 10 * HOUR_IN_MSEC - 9000);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(auth.getLastLogin()).willReturn(lastLogin);
|
|
||||||
given(auth.getLastIp()).willReturn("123.45.66.77");
|
|
||||||
given(dataSource.getAuth(name)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(3)).sendMessage(captor.capture());
|
|
||||||
String lastLoginString = new Date(lastLogin).toString();
|
|
||||||
assertThat(captor.getAllValues().get(0),
|
|
||||||
allOf(containsString(name), containsString(lastLoginString)));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("412 days 9 hours"));
|
|
||||||
assertThat(captor.getAllValues().get(2), containsString("123.45.66.77"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullLastLoginDate() {
|
|
||||||
// given
|
|
||||||
String name = "player";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name(name)
|
|
||||||
.lastIp("123.45.67.89")
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth(name)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(name));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(2)).sendMessage(captor.capture());
|
|
||||||
assertThat(captor.getAllValues().get(0), allOf(containsString(name), containsString("never")));
|
|
||||||
assertThat(captor.getAllValues().get(1), containsString("123.45.67.89"));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,75 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
|
||||||
import org.bukkit.OfflinePlayer;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import static com.google.common.collect.Sets.newHashSet;
|
|
||||||
import static org.hamcrest.Matchers.arrayContainingInAnyOrder;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PurgeBannedPlayersCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class PurgeBannedPlayersCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private PurgeBannedPlayersCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PurgeService purgeService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardRequestToService() {
|
|
||||||
// given
|
|
||||||
String[] names = {"bannedPlayer", "other_banned", "evilplayer", "Someone"};
|
|
||||||
OfflinePlayer[] players = offlinePlayersWithNames(names);
|
|
||||||
given(bukkitService.getBannedPlayers()).willReturn(newHashSet(players));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getBannedPlayers();
|
|
||||||
verify(purgeService).purgePlayers(eq(sender), eq(asLowerCaseSet(names)),
|
|
||||||
argThat(arrayContainingInAnyOrder(players)));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static OfflinePlayer[] offlinePlayersWithNames(String... names) {
|
|
||||||
OfflinePlayer[] players = new OfflinePlayer[names.length];
|
|
||||||
for (int i = 0; i < names.length; ++i) {
|
|
||||||
OfflinePlayer player = mock(OfflinePlayer.class);
|
|
||||||
given(player.getName()).willReturn(names[i]);
|
|
||||||
players[i] = player;
|
|
||||||
}
|
|
||||||
return players;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Set<String> asLowerCaseSet(String... items) {
|
|
||||||
Set<String> result = new HashSet<>(items.length);
|
|
||||||
for (String item : items) {
|
|
||||||
result.add(item.toLowerCase(Locale.ROOT));
|
|
||||||
}
|
|
||||||
return result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,89 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Calendar;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.greaterThan;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PurgeCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class PurgeCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private PurgeCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PurgeService purgeService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleInvalidNumber() {
|
|
||||||
// given
|
|
||||||
String interval = "invalid";
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(interval));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("The value you've entered is invalid")));
|
|
||||||
verifyNoInteractions(purgeService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectTooSmallInterval() {
|
|
||||||
// given
|
|
||||||
String interval = "29";
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(interval));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("You can only purge data older than 30 days")));
|
|
||||||
verifyNoInteractions(purgeService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardToService() {
|
|
||||||
// given
|
|
||||||
String interval = "45";
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(interval));
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<Long> captor = ArgumentCaptor.forClass(Long.class);
|
|
||||||
verify(purgeService).runPurge(eq(sender), captor.capture());
|
|
||||||
|
|
||||||
// Check the timestamp with a certain tolerance
|
|
||||||
int toleranceMillis = 100;
|
|
||||||
Calendar calendar = Calendar.getInstance();
|
|
||||||
calendar.add(Calendar.DATE, -Integer.valueOf(interval));
|
|
||||||
assertIsCloseTo(captor.getValue(), calendar.getTimeInMillis(), toleranceMillis);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void assertIsCloseTo(long value1, long value2, long tolerance) {
|
|
||||||
assertThat(Math.abs(value1 - value2), not(greaterThan(tolerance)));
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,118 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PurgeLastPositionCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class PurgeLastPositionCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private PurgeLastPositionCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService service;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BungeeSender bungeeSender;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPurgeLastPosOfUser() {
|
|
||||||
// given
|
|
||||||
String player = "_Bobby";
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAuth(player)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(player));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(player);
|
|
||||||
verifyPositionWasReset(auth);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("last position location is now reset")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPurgePositionOfCommandSender() {
|
|
||||||
// given
|
|
||||||
String player = "_Bobby";
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(sender.getName()).willReturn(player);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAuth(player)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(player);
|
|
||||||
verifyPositionWasReset(auth);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("position location is now reset")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNonExistentUser() {
|
|
||||||
// given
|
|
||||||
String name = "invalidPlayer";
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(name));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth(name);
|
|
||||||
verify(service).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldResetAllLastPositions() {
|
|
||||||
// given
|
|
||||||
PlayerAuth auth1 = mock(PlayerAuth.class);
|
|
||||||
PlayerAuth auth2 = mock(PlayerAuth.class);
|
|
||||||
PlayerAuth auth3 = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAllAuths()).willReturn(Arrays.asList(auth1, auth2, auth3));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("*"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAllAuths();
|
|
||||||
verifyPositionWasReset(auth1);
|
|
||||||
verifyPositionWasReset(auth2);
|
|
||||||
verifyPositionWasReset(auth3);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("last position locations are now reset")));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
private static void verifyPositionWasReset(PlayerAuth auth) {
|
|
||||||
verify(auth).setQuitLocX(0);
|
|
||||||
verify(auth).setQuitLocY(0);
|
|
||||||
verify(auth).setQuitLocZ(0);
|
|
||||||
verify(auth).setWorld("world");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,94 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.task.purge.PurgeExecutor;
|
|
||||||
import org.bukkit.OfflinePlayer;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Locale;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskAsynchronously;
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskOptionallyAsync;
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static java.util.Collections.singletonList;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PurgePlayerCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class PurgePlayerCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private PurgePlayerCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PurgeExecutor purgeExecutor;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotExecutePurgeForRegisteredPlayer() {
|
|
||||||
// given
|
|
||||||
String name = "Bobby";
|
|
||||||
given(dataSource.isAuthAvailable(name)).willReturn(true);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, singletonList(name));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("This player is still registered")));
|
|
||||||
verifyNoInteractions(purgeExecutor);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldExecutePurge() {
|
|
||||||
// given
|
|
||||||
String name = "Frank";
|
|
||||||
given(dataSource.isAuthAvailable(name)).willReturn(false);
|
|
||||||
OfflinePlayer player = mock(OfflinePlayer.class);
|
|
||||||
given(bukkitService.getOfflinePlayer(name)).willReturn(player);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, singletonList(name));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).isAuthAvailable(name);
|
|
||||||
verify(purgeExecutor).executePurge(singletonList(player), singletonList(name.toLowerCase(Locale.ROOT)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldExecutePurgeOfRegisteredPlayer() {
|
|
||||||
// given
|
|
||||||
String name = "GhiJKlmn7";
|
|
||||||
OfflinePlayer player = mock(OfflinePlayer.class);
|
|
||||||
given(bukkitService.getOfflinePlayer(name)).willReturn(player);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, asList(name, "force"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(purgeExecutor).executePurge(singletonList(player), singletonList(name.toLowerCase(Locale.ROOT)));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,87 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.Spy;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.time.ZoneId;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalToIgnoringCase;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.doReturn;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link RecentPlayersCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class RecentPlayersCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
@Spy
|
|
||||||
private RecentPlayersCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowRecentPlayers() {
|
|
||||||
// given
|
|
||||||
PlayerAuth auth1 = PlayerAuth.builder()
|
|
||||||
.name("hannah").realName("Hannah").lastIp("11.11.11.11")
|
|
||||||
.lastLogin(1510387755000L) // 11/11/2017 @ 8:09am
|
|
||||||
.build();
|
|
||||||
PlayerAuth auth2 = PlayerAuth.builder()
|
|
||||||
.name("matt").realName("MATT").lastIp("22.11.22.33")
|
|
||||||
.lastLogin(1510269301000L) // 11/09/2017 @ 11:15pm
|
|
||||||
.build();
|
|
||||||
doReturn(ZoneId.of("UTC")).when(command).getZoneId();
|
|
||||||
given(dataSource.getRecentlyLoggedInPlayers()).willReturn(Arrays.asList(auth1, auth2));
|
|
||||||
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Recently logged in players")));
|
|
||||||
verify(sender).sendMessage(argThat(equalToIgnoringCase("- Hannah (08:09 AM, 11 Nov with IP 11.11.11.11)")));
|
|
||||||
verify(sender).sendMessage(argThat(equalToIgnoringCase("- MATT (11:15 PM, 09 Nov with IP 22.11.22.33)")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandlePlayerWithNullLastLogin() {
|
|
||||||
// given
|
|
||||||
PlayerAuth auth1 = PlayerAuth.builder()
|
|
||||||
.name("xephren").realName("Xephren").lastIp("11.11.11.11")
|
|
||||||
.lastLogin(null)
|
|
||||||
.build();
|
|
||||||
PlayerAuth auth2 = PlayerAuth.builder()
|
|
||||||
.name("silvah777").realName("silvah777").lastIp("22.11.22.33")
|
|
||||||
.lastLogin(1510269301000L) // 11/09/2017 @ 11:15pm
|
|
||||||
.build();
|
|
||||||
doReturn(ZoneId.of("UTC")).when(command).getZoneId();
|
|
||||||
given(dataSource.getRecentlyLoggedInPlayers()).willReturn(Arrays.asList(auth1, auth2));
|
|
||||||
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Recently logged in players")));
|
|
||||||
verify(sender).sendMessage(argThat(equalToIgnoringCase("- Xephren (never with IP 11.11.11.11)")));
|
|
||||||
verify(sender).sendMessage(argThat(equalToIgnoringCase("- silvah777 (11:15 PM, 09 Nov with IP 22.11.22.33)")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,186 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import fr.xephi.authme.service.ValidationService.ValidationResult;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Locale;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskOptionallyAsync;
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToScheduleSyncTaskFromOptionallyAsyncTask;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link RegisterAdminCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class RegisterAdminCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private RegisterAdminCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PasswordSecurity passwordSecurity;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commandService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidPassword() {
|
|
||||||
// given
|
|
||||||
String user = "tester";
|
|
||||||
String password = "myPassword";
|
|
||||||
given(validationService.validatePassword(password, user))
|
|
||||||
.willReturn(new ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, user);
|
|
||||||
verify(commandService).send(sender, MessageKey.INVALID_PASSWORD_LENGTH, new String[0]);
|
|
||||||
verify(bukkitService, never()).runTaskAsynchronously(any(Runnable.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectAlreadyRegisteredAccount() {
|
|
||||||
// given
|
|
||||||
String user = "my_name55";
|
|
||||||
String password = "@some-pass@";
|
|
||||||
given(validationService.validatePassword(password, user)).willReturn(new ValidationResult());
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(true);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, user);
|
|
||||||
verify(commandService).send(sender, MessageKey.NAME_ALREADY_REGISTERED);
|
|
||||||
verify(dataSource, never()).saveAuth(any(PlayerAuth.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleSavingError() {
|
|
||||||
// given
|
|
||||||
String user = "test-test";
|
|
||||||
String password = "afdjhfkt";
|
|
||||||
given(validationService.validatePassword(password, user)).willReturn(new ValidationResult());
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(false);
|
|
||||||
given(dataSource.saveAuth(any(PlayerAuth.class))).willReturn(false);
|
|
||||||
HashedPassword hashedPassword = new HashedPassword("235sdf4w5udsgf");
|
|
||||||
given(passwordSecurity.computeHash(password, user)).willReturn(hashedPassword);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, user);
|
|
||||||
verify(commandService).send(sender, MessageKey.ERROR);
|
|
||||||
ArgumentCaptor<PlayerAuth> captor = ArgumentCaptor.forClass(PlayerAuth.class);
|
|
||||||
verify(dataSource).saveAuth(captor.capture());
|
|
||||||
assertAuthHasInfo(captor.getValue(), user, hashedPassword);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRegisterOfflinePlayer() {
|
|
||||||
// given
|
|
||||||
String user = "someone";
|
|
||||||
String password = "Al1O3P49S5%";
|
|
||||||
given(validationService.validatePassword(password, user)).willReturn(new ValidationResult());
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(false);
|
|
||||||
given(dataSource.saveAuth(any(PlayerAuth.class))).willReturn(true);
|
|
||||||
HashedPassword hashedPassword = new HashedPassword("$aea2345EW235dfsa@#R%987048");
|
|
||||||
given(passwordSecurity.computeHash(password, user)).willReturn(hashedPassword);
|
|
||||||
given(bukkitService.getPlayerExact(user)).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, user);
|
|
||||||
verify(commandService).send(sender, MessageKey.REGISTER_SUCCESS);
|
|
||||||
ArgumentCaptor<PlayerAuth> captor = ArgumentCaptor.forClass(PlayerAuth.class);
|
|
||||||
verify(dataSource).saveAuth(captor.capture());
|
|
||||||
assertAuthHasInfo(captor.getValue(), user, hashedPassword);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRegisterOnlinePlayer() {
|
|
||||||
// given
|
|
||||||
String user = "someone";
|
|
||||||
String password = "Al1O3P49S5%";
|
|
||||||
given(validationService.validatePassword(password, user)).willReturn(new ValidationResult());
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(false);
|
|
||||||
given(dataSource.saveAuth(any(PlayerAuth.class))).willReturn(true);
|
|
||||||
HashedPassword hashedPassword = new HashedPassword("$aea2345EW235dfsa@#R%987048");
|
|
||||||
given(passwordSecurity.computeHash(password, user)).willReturn(hashedPassword);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(bukkitService.getPlayerExact(user)).willReturn(player);
|
|
||||||
String kickForAdminRegister = "Admin registered you -- log in again";
|
|
||||||
given(commandService.retrieveSingleMessage(player, MessageKey.KICK_FOR_ADMIN_REGISTER)).willReturn(kickForAdminRegister);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToScheduleSyncTaskFromOptionallyAsyncTask(bukkitService);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, user);
|
|
||||||
verify(commandService).send(sender, MessageKey.REGISTER_SUCCESS);
|
|
||||||
ArgumentCaptor<PlayerAuth> captor = ArgumentCaptor.forClass(PlayerAuth.class);
|
|
||||||
verify(dataSource).saveAuth(captor.capture());
|
|
||||||
assertAuthHasInfo(captor.getValue(), user, hashedPassword);
|
|
||||||
verify(player).kickPlayer(kickForAdminRegister);
|
|
||||||
}
|
|
||||||
|
|
||||||
private void assertAuthHasInfo(PlayerAuth auth, String name, HashedPassword hashedPassword) {
|
|
||||||
assertThat(auth.getRealName(), equalTo(name));
|
|
||||||
assertThat(auth.getNickname(), equalTo(name.toLowerCase(Locale.ROOT)));
|
|
||||||
assertThat(auth.getPassword(), equalTo(hashedPassword));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,148 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import ch.jalu.injector.factory.SingletonStore;
|
|
||||||
import fr.xephi.authme.AuthMe;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.datasource.DataSourceType;
|
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
|
||||||
import fr.xephi.authme.initialization.SettingsDependent;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.output.LogLevel;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.SettingsWarner;
|
|
||||||
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.doThrow;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ReloadCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ReloadCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ReloadCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private AuthMe authMe;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Settings settings;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commandService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SettingsWarner settingsWarner;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SingletonStore<Reloadable> reloadableStore;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SingletonStore<SettingsDependent> settingsDependentStore;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void setDefaultSettings() {
|
|
||||||
// Mock properties retrieved by ConsoleLogger
|
|
||||||
given(settings.getProperty(PluginSettings.LOG_LEVEL)).willReturn(LogLevel.INFO);
|
|
||||||
given(settings.getProperty(SecuritySettings.USE_LOGGING)).willReturn(false);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReload() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(settings.getProperty(DatabaseSettings.BACKEND)).willReturn(DataSourceType.MYSQL);
|
|
||||||
given(dataSource.getType()).willReturn(DataSourceType.MYSQL);
|
|
||||||
List<Reloadable> reloadables = Arrays.asList(
|
|
||||||
mock(Reloadable.class), mock(Reloadable.class), mock(Reloadable.class));
|
|
||||||
List<SettingsDependent> dependents = Arrays.asList(
|
|
||||||
mock(SettingsDependent.class), mock(SettingsDependent.class));
|
|
||||||
given(reloadableStore.retrieveAllOfType()).willReturn(reloadables);
|
|
||||||
given(settingsDependentStore.retrieveAllOfType()).willReturn(dependents);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(settings).reload();
|
|
||||||
verifyReloadingCalls(reloadables, dependents);
|
|
||||||
verify(commandService).send(sender, MessageKey.CONFIG_RELOAD_SUCCESS);
|
|
||||||
verify(settingsWarner).logWarningsForMisconfigurations();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleReloadError() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
doThrow(IllegalStateException.class).when(reloadableStore).retrieveAllOfType();
|
|
||||||
given(settings.getProperty(DatabaseSettings.BACKEND)).willReturn(DataSourceType.MYSQL);
|
|
||||||
given(dataSource.getType()).willReturn(DataSourceType.MYSQL);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(settings).reload();
|
|
||||||
verify(reloadableStore).retrieveAllOfType();
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Error occurred")));
|
|
||||||
verify(authMe).stopOrUnload();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldIssueWarningForChangedDataSourceSetting() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(settings.getProperty(DatabaseSettings.BACKEND)).willReturn(DataSourceType.MYSQL);
|
|
||||||
given(dataSource.getType()).willReturn(DataSourceType.SQLITE);
|
|
||||||
given(reloadableStore.retrieveAllOfType()).willReturn(Collections.emptyList());
|
|
||||||
given(settingsDependentStore.retrieveAllOfType()).willReturn(Collections.emptyList());
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(settings).reload();
|
|
||||||
verify(reloadableStore).retrieveAllOfType();
|
|
||||||
verify(settingsDependentStore).retrieveAllOfType();
|
|
||||||
verify(sender).sendMessage(argThat(containsString("cannot change database type")));
|
|
||||||
}
|
|
||||||
|
|
||||||
private void verifyReloadingCalls(List<Reloadable> reloadables, List<SettingsDependent> dependents) {
|
|
||||||
for (Reloadable reloadable : reloadables) {
|
|
||||||
verify(reloadable).reload();
|
|
||||||
}
|
|
||||||
for (SettingsDependent dependent : dependents) {
|
|
||||||
verify(dependent).reload(settings);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,192 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskOptionallyAsync;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link SetEmailCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class SetEmailCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private SetEmailCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commandService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidMail() {
|
|
||||||
// given
|
|
||||||
String user = "somebody";
|
|
||||||
String email = "some.test@example.org";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(false);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(commandService).send(sender, MessageKey.INVALID_EMAIL);
|
|
||||||
verifyNoInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnknownUser() {
|
|
||||||
// given
|
|
||||||
String user = "nonexistent";
|
|
||||||
String email = "mail@example.com";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(true);
|
|
||||||
given(dataSource.getAuth(user)).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(dataSource).getAuth(user);
|
|
||||||
verify(commandService).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleAlreadyTakenEmail() {
|
|
||||||
// given
|
|
||||||
String user = "someone";
|
|
||||||
String email = "mail@example.com";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(true);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAuth(user)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(validationService.isEmailFreeForRegistration(email, sender)).willReturn(false);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(dataSource).getAuth(user);
|
|
||||||
verify(validationService).isEmailFreeForRegistration(email, sender);
|
|
||||||
verify(commandService).send(sender, MessageKey.EMAIL_ALREADY_USED_ERROR);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
verifyNoInteractions(auth);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandlePersistenceError() {
|
|
||||||
// given
|
|
||||||
String user = "Bobby";
|
|
||||||
String email = "new-addr@example.org";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(true);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAuth(user)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(validationService.isEmailFreeForRegistration(email, sender)).willReturn(true);
|
|
||||||
given(dataSource.updateEmail(auth)).willReturn(false);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(dataSource).getAuth(user);
|
|
||||||
verify(validationService).isEmailFreeForRegistration(email, sender);
|
|
||||||
verify(commandService).send(sender, MessageKey.ERROR);
|
|
||||||
verify(dataSource).updateEmail(auth);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUpdateEmail() {
|
|
||||||
// given
|
|
||||||
String user = "Bobby";
|
|
||||||
String email = "new-addr@example.org";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(true);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAuth(user)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(validationService.isEmailFreeForRegistration(email, sender)).willReturn(true);
|
|
||||||
given(dataSource.updateEmail(auth)).willReturn(true);
|
|
||||||
given(playerCache.getAuth(user)).willReturn(null);
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(dataSource).getAuth(user);
|
|
||||||
verify(validationService).isEmailFreeForRegistration(email, sender);
|
|
||||||
verify(commandService).send(sender, MessageKey.EMAIL_CHANGED_SUCCESS);
|
|
||||||
verify(dataSource).updateEmail(auth);
|
|
||||||
verify(playerCache, never()).updatePlayer(any(PlayerAuth.class));
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUpdateEmailAndPlayerCache() {
|
|
||||||
// given
|
|
||||||
String user = "Bobby";
|
|
||||||
String email = "new-addr@example.org";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(true);
|
|
||||||
PlayerAuth auth = mock(PlayerAuth.class);
|
|
||||||
given(dataSource.getAuth(user)).willReturn(auth);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(validationService.isEmailFreeForRegistration(email, sender)).willReturn(true);
|
|
||||||
given(dataSource.updateEmail(auth)).willReturn(true);
|
|
||||||
given(playerCache.getAuth(user)).willReturn(mock(PlayerAuth.class));
|
|
||||||
setBukkitServiceToRunTaskOptionallyAsync(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(user, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(dataSource).getAuth(user);
|
|
||||||
verify(validationService).isEmailFreeForRegistration(email, sender);
|
|
||||||
verify(commandService).send(sender, MessageKey.EMAIL_CHANGED_SUCCESS);
|
|
||||||
verify(dataSource).updateEmail(auth);
|
|
||||||
verify(playerCache).updatePlayer(auth);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,64 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
|
||||||
import org.bukkit.Location;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link SetFirstSpawnCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class SetFirstSpawnCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private SetFirstSpawnCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SpawnLoader spawnLoader;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSetFirstSpawn() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
Location location = mock(Location.class);
|
|
||||||
given(player.getLocation()).willReturn(location);
|
|
||||||
given(spawnLoader.setFirstSpawn(location)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(spawnLoader).setFirstSpawn(location);
|
|
||||||
verify(player).sendMessage(argThat(containsString("defined new first spawn")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleError() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
Location location = mock(Location.class);
|
|
||||||
given(player.getLocation()).willReturn(location);
|
|
||||||
given(spawnLoader.setFirstSpawn(location)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(spawnLoader).setFirstSpawn(location);
|
|
||||||
verify(player).sendMessage(argThat(containsString("has failed")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,64 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
|
||||||
import org.bukkit.Location;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link SetSpawnCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class SetSpawnCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private SetSpawnCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SpawnLoader spawnLoader;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSetSpawn() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
Location location = mock(Location.class);
|
|
||||||
given(player.getLocation()).willReturn(location);
|
|
||||||
given(spawnLoader.setSpawn(location)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(spawnLoader).setSpawn(location);
|
|
||||||
verify(player).sendMessage(argThat(containsString("defined new spawn")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleError() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
Location location = mock(Location.class);
|
|
||||||
given(player.getLocation()).willReturn(location);
|
|
||||||
given(spawnLoader.setSpawn(location)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(spawnLoader).setSpawn(location);
|
|
||||||
verify(player).sendMessage(argThat(containsString("has failed")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,64 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
|
||||||
import org.bukkit.Location;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeastOnce;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link SpawnCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class SpawnCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private SpawnCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private SpawnLoader spawnLoader;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldTeleportToSpawn() {
|
|
||||||
// given
|
|
||||||
Location spawn = mock(Location.class);
|
|
||||||
given(spawnLoader.getSpawn()).willReturn(spawn);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player).teleport(spawn);
|
|
||||||
verify(spawnLoader, atLeastOnce()).getSpawn();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingSpawn() {
|
|
||||||
// given
|
|
||||||
given(spawnLoader.getSpawn()).willReturn(null);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player).sendMessage(argThat(containsString("Spawn has failed")));
|
|
||||||
verify(player, never()).teleport(any(Location.class));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,97 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.command.CommandMapper;
|
|
||||||
import fr.xephi.authme.command.FoundCommandResult;
|
|
||||||
import fr.xephi.authme.command.help.HelpProvider;
|
|
||||||
import fr.xephi.authme.service.AntiBotService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyBoolean;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link SwitchAntiBotCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class SwitchAntiBotCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private SwitchAntiBotCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private AntiBotService antiBot;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommandMapper commandMapper;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private HelpProvider helpProvider;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnAntiBotState() {
|
|
||||||
// given
|
|
||||||
given(antiBot.getAntiBotStatus()).willReturn(AntiBotService.AntiBotStatus.ACTIVE);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("status: ACTIVE")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldActivateAntiBot() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("on"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(antiBot).overrideAntiBotStatus(true);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("enabled")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDeactivateAntiBot() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("Off"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(antiBot).overrideAntiBotStatus(false);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("disabled")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowHelpForUnknownState() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
FoundCommandResult foundCommandResult = mock(FoundCommandResult.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(sender, asList("authme", "antibot"))).willReturn(foundCommandResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("wrong"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(antiBot, never()).overrideAntiBotStatus(anyBoolean());
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Invalid")));
|
|
||||||
verify(helpProvider).outputHelp(sender, foundCommandResult, HelpProvider.SHOW_ARGUMENTS);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,120 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link TotpDisableAdminCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class TotpDisableAdminCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private TotpDisableAdminCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void initLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnknownUser() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(dataSource.getAuth("user")).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("user"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(messages).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
verify(dataSource, only()).getAuth("user");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUserWithNoTotpEnabled() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("billy")
|
|
||||||
.totpKey(null)
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("Billy")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("Billy"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("'Billy' does not have two-factor auth enabled")));
|
|
||||||
verify(dataSource, only()).getAuth("Billy");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRemoveTotpFromUser() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("Bobby")
|
|
||||||
.totpKey("56484998")
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("Bobby")).willReturn(auth);
|
|
||||||
given(dataSource.removeTotpKey("Bobby")).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(bukkitService.getPlayerExact("Bobby")).willReturn(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("Bobby"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Disabled two-factor authentication successfully")));
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_REMOVED_SUCCESS);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleErrorWhileRemovingTotp() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("Bobby")
|
|
||||||
.totpKey("321654")
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("Bobby")).willReturn(auth);
|
|
||||||
given(dataSource.removeTotpKey("Bobby")).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("Bobby"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(messages).send(sender, MessageKey.ERROR);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,92 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link TotpViewStatusCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class TotpViewStatusCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private TotpViewStatusCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void initLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnknownUser() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(dataSource.getAuth("user")).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("user"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(messages).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
verify(dataSource, only()).getAuth("user");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInformForUserWithoutTotp() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("billy")
|
|
||||||
.totpKey(null)
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("Billy")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("Billy"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("'Billy' does NOT have two-factor auth enabled")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInformForUserWithTotpEnabled() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("billy")
|
|
||||||
.totpKey("92841575")
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("Billy")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("Billy"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("'Billy' has enabled two-factor authentication")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,94 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link UnregisterAdminCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class UnregisterAdminCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private UnregisterAdminCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commandService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnknownPlayer() {
|
|
||||||
// given
|
|
||||||
String user = "bobby";
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(false);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(user));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource, only()).isAuthAvailable(user);
|
|
||||||
verify(commandService).send(sender, MessageKey.UNKNOWN_USER);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInvokeUnregisterProcess() {
|
|
||||||
// given
|
|
||||||
String user = "personaNonGrata";
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(bukkitService.getPlayerExact(user)).willReturn(player);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(user));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource, only()).isAuthAvailable(user);
|
|
||||||
verify(bukkitService).getPlayerExact(user);
|
|
||||||
verify(management).performUnregisterByAdmin(sender, user, player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInvokeUnregisterProcessWithNullPlayer() {
|
|
||||||
// given
|
|
||||||
String user = "personaNonGrata";
|
|
||||||
given(dataSource.isAuthAvailable(user)).willReturn(true);
|
|
||||||
given(bukkitService.getPlayerExact(user)).willReturn(null);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(user));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource, only()).isAuthAvailable(user);
|
|
||||||
verify(bukkitService).getPlayerExact(user);
|
|
||||||
verify(management).performUnregisterByAdmin(sender, user, null);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,70 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.command.help.HelpMessagesService;
|
|
||||||
import fr.xephi.authme.service.HelpTranslationGenerator;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link UpdateHelpMessagesCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class UpdateHelpMessagesCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private UpdateHelpMessagesCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private HelpTranslationGenerator helpTranslationGenerator;
|
|
||||||
@Mock
|
|
||||||
private HelpMessagesService helpMessagesService;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUpdateHelpMessage() throws IOException {
|
|
||||||
// given
|
|
||||||
File updatedFile = new File("some/path/help_xx.yml");
|
|
||||||
given(helpTranslationGenerator.updateHelpFile()).willReturn(updatedFile);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(helpMessagesService).reloadMessagesFile();
|
|
||||||
verify(sender).sendMessage("Successfully updated the help file 'help_xx.yml'");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCatchAndReportException() throws IOException {
|
|
||||||
// given
|
|
||||||
given(helpTranslationGenerator.updateHelpFile()).willThrow(new IOException("Couldn't do the thing"));
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage("Could not update help file: Couldn't do the thing");
|
|
||||||
verifyNoInteractions(helpMessagesService);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,121 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import ch.jalu.injector.factory.SingletonStore;
|
|
||||||
import com.google.common.cache.LoadingCache;
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.data.limbo.LimboPlayer;
|
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
|
||||||
import fr.xephi.authme.datasource.CacheDataSource;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.initialization.HasCleanup;
|
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
|
||||||
import fr.xephi.authme.initialization.SettingsDependent;
|
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import org.bukkit.ChatColor;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Optional;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
|
||||||
import static org.hamcrest.Matchers.hasItem;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeastOnce;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link DataStatistics}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class DataStatisticsTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private DataStatistics dataStatistics;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
@Mock
|
|
||||||
private LimboService limboService;
|
|
||||||
@Mock
|
|
||||||
private SingletonStore<Object> singletonStore;
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void setUpLimboCacheMap() {
|
|
||||||
Map<String, LimboPlayer> limboMap = new HashMap<>();
|
|
||||||
limboMap.put("test", mock(LimboPlayer.class));
|
|
||||||
ReflectionTestUtils.setField(LimboService.class, limboService, "entries", limboMap);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldOutputStatistics() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(singletonStore.retrieveAllOfType()).willReturn(mockListOfSize(Object.class, 7));
|
|
||||||
given(singletonStore.retrieveAllOfType(Reloadable.class)).willReturn(mockListOfSize(Reloadable.class, 4));
|
|
||||||
given(singletonStore.retrieveAllOfType(SettingsDependent.class)).willReturn(mockListOfSize(SettingsDependent.class, 3));
|
|
||||||
given(singletonStore.retrieveAllOfType(HasCleanup.class)).willReturn(mockListOfSize(HasCleanup.class, 2));
|
|
||||||
given(dataSource.getAccountsRegistered()).willReturn(219);
|
|
||||||
given(playerCache.getLogged()).willReturn(12);
|
|
||||||
|
|
||||||
// Clear any loggers that might exist and trigger the generation of two loggers
|
|
||||||
Map loggers = ReflectionTestUtils.getFieldValue(ConsoleLoggerFactory.class, null, "consoleLoggers");
|
|
||||||
loggers.clear();
|
|
||||||
ConsoleLoggerFactory.get(String.class);
|
|
||||||
ConsoleLoggerFactory.get(Integer.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
dataStatistics.execute(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> stringCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, atLeastOnce()).sendMessage(stringCaptor.capture());
|
|
||||||
assertThat(stringCaptor.getAllValues(), containsInAnyOrder(
|
|
||||||
ChatColor.BLUE + "AuthMe statistics",
|
|
||||||
"Singleton Java classes: 7",
|
|
||||||
"(Reloadable: 4 / SettingsDependent: 3 / HasCleanup: 2)",
|
|
||||||
"LimboPlayers in memory: 1",
|
|
||||||
"Total players in DB: 219",
|
|
||||||
"PlayerCache size: 12 (= logged in players)",
|
|
||||||
"Total logger instances: 2"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldOutputCachedDataSourceStatistics() {
|
|
||||||
// given
|
|
||||||
CacheDataSource cacheDataSource = mock(CacheDataSource.class);
|
|
||||||
LoadingCache<String, Optional<PlayerAuth>> cache = mock(LoadingCache.class);
|
|
||||||
given(cache.size()).willReturn(11L);
|
|
||||||
given(cacheDataSource.getCachedAuths()).willReturn(cache);
|
|
||||||
ReflectionTestUtils.setField(DataStatistics.class, dataStatistics, "dataSource", cacheDataSource);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
dataStatistics.execute(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> stringCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, atLeastOnce()).sendMessage(stringCaptor.capture());
|
|
||||||
assertThat(stringCaptor.getAllValues(), hasItem("Cached PlayerAuth objects: 11"));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static <T> List<T> mockListOfSize(Class<T> mockClass, int size) {
|
|
||||||
T mock = mock(mockClass);
|
|
||||||
return Collections.nCopies(size, mock);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,158 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import ch.jalu.injector.factory.Factory;
|
|
||||||
import fr.xephi.authme.permission.DebugSectionPermissions;
|
|
||||||
import fr.xephi.authme.permission.PermissionNode;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import org.bukkit.ChatColor;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Locale;
|
|
||||||
|
|
||||||
import static com.google.common.base.Preconditions.checkArgument;
|
|
||||||
import static java.util.Collections.emptyList;
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyList;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeast;
|
|
||||||
import static org.mockito.Mockito.doNothing;
|
|
||||||
import static org.mockito.Mockito.doReturn;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.spy;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link DebugCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class DebugCommandTest {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Number we test against if we expect an action to have been performed for each debug section.
|
|
||||||
* This is a minimum number so tests don't fail each time a new debug section is added; however,
|
|
||||||
* it should be close to the total.
|
|
||||||
*/
|
|
||||||
private static final int MIN_DEBUG_SECTIONS = 9;
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private DebugCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Factory<DebugSection> debugSectionFactory;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
|
|
||||||
@Before
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public void initFactory() {
|
|
||||||
given(debugSectionFactory.newInstance(any(Class.class))).willAnswer(
|
|
||||||
invocation -> {
|
|
||||||
Class<?> classArgument = invocation.getArgument(0);
|
|
||||||
checkArgument(DebugSection.class.isAssignableFrom(classArgument));
|
|
||||||
return spy(classArgument);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldListAllAvailableDebugSections() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(false);
|
|
||||||
given(permissionsManager.hasPermission(sender, DebugSectionPermissions.INPUT_VALIDATOR)).willReturn(true);
|
|
||||||
given(permissionsManager.hasPermission(sender, DebugSectionPermissions.DATA_STATISTICS)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(debugSectionFactory, atLeast(MIN_DEBUG_SECTIONS)).newInstance(any(Class.class));
|
|
||||||
verify(permissionsManager, atLeast(MIN_DEBUG_SECTIONS)).hasPermission(eq(sender), any(DebugSectionPermissions.class));
|
|
||||||
|
|
||||||
ArgumentCaptor<String> strCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(4)).sendMessage(strCaptor.capture());
|
|
||||||
assertThat(strCaptor.getAllValues(), contains(
|
|
||||||
equalTo(ChatColor.BLUE + "AuthMe debug utils"),
|
|
||||||
equalTo("Sections available to you:"),
|
|
||||||
containsString("stats: Outputs general data statistics"),
|
|
||||||
containsString("valid: Checks if your config.yml allows a password / email")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotListAnyDebugSection() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(eq(sender), any(PermissionNode.class))).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(debugSectionFactory, atLeast(MIN_DEBUG_SECTIONS)).newInstance(any(Class.class));
|
|
||||||
verify(permissionsManager, atLeast(MIN_DEBUG_SECTIONS)).hasPermission(eq(sender), any(DebugSectionPermissions.class));
|
|
||||||
|
|
||||||
ArgumentCaptor<String> strCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, times(3)).sendMessage(strCaptor.capture());
|
|
||||||
assertThat(strCaptor.getAllValues(), contains(
|
|
||||||
equalTo(ChatColor.BLUE + "AuthMe debug utils"),
|
|
||||||
equalTo("Sections available to you:"),
|
|
||||||
containsString("You don't have permission to view any debug section")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRunSection() {
|
|
||||||
// given
|
|
||||||
DebugSection section = spy(InputValidator.class);
|
|
||||||
doNothing().when(section).execute(any(CommandSender.class), anyList());
|
|
||||||
// Mockito throws a runtime error if below we use the usual "given(factory.newInstance(...)).willReturn(...)"
|
|
||||||
doReturn(section).when(debugSectionFactory).newInstance(InputValidator.class);
|
|
||||||
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(sender, section.getRequiredPermission())).willReturn(true);
|
|
||||||
List<String> arguments = Arrays.asList(section.getName().toUpperCase(Locale.ROOT), "test", "toast");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(permissionsManager).hasPermission(sender, section.getRequiredPermission());
|
|
||||||
verify(section).execute(sender, Arrays.asList("test", "toast"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotRunSectionForMissingPermission() {
|
|
||||||
// given
|
|
||||||
DebugSection section = spy(InputValidator.class);
|
|
||||||
// Mockito throws a runtime error if below we use the usual "given(factory.newInstance(...)).willReturn(...)"
|
|
||||||
doReturn(section).when(debugSectionFactory).newInstance(InputValidator.class);
|
|
||||||
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
given(permissionsManager.hasPermission(sender, section.getRequiredPermission())).willReturn(false);
|
|
||||||
List<String> arguments = Arrays.asList(section.getName().toUpperCase(Locale.ROOT), "test");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, arguments);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(permissionsManager).hasPermission(sender, section.getRequiredPermission());
|
|
||||||
verify(section, never()).execute(any(CommandSender.class), anyList());
|
|
||||||
verify(sender).sendMessage(argThat(containsString("You don't have permission")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,72 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ClassCollector;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Consistency tests for {@link DebugSection} implementors.
|
|
||||||
*/
|
|
||||||
public class DebugSectionConsistencyTest {
|
|
||||||
|
|
||||||
private static List<Class<?>> debugClasses;
|
|
||||||
private static List<DebugSection> debugSections;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void collectClasses() {
|
|
||||||
// TODO ljacqu 20171021: Improve ClassCollector (pass pkg by class, improve #getInstancesOfType's instantiation)
|
|
||||||
ClassCollector classCollector = new ClassCollector(
|
|
||||||
TestHelper.SOURCES_FOLDER, TestHelper.PROJECT_ROOT + "command/executable/authme/debug");
|
|
||||||
|
|
||||||
debugClasses = classCollector.collectClasses();
|
|
||||||
debugSections = classCollector.getInstancesOfType(DebugSection.class, clz -> instantiate(clz));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAllBePackagePrivate() {
|
|
||||||
for (Class<?> clazz : debugClasses) {
|
|
||||||
if (clazz != DebugCommand.class) {
|
|
||||||
assertThat(clazz + " should be package-private",
|
|
||||||
Modifier.isPublic(clazz.getModifiers()), equalTo(false));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveDifferentSubcommandName() throws IllegalAccessException, InstantiationException {
|
|
||||||
Set<String> names = new HashSet<>();
|
|
||||||
for (DebugSection debugSection : debugSections) {
|
|
||||||
if (!names.add(debugSection.getName())) {
|
|
||||||
fail("Encountered name '" + debugSection.getName() + "' a second time in " + debugSection.getClass());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAllHaveDescription() {
|
|
||||||
for (DebugSection debugSection : debugSections) {
|
|
||||||
assertThat("Description of '" + debugSection.getClass() + "' may not be null",
|
|
||||||
debugSection.getDescription(), not(nullValue()));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static DebugSection instantiate(Class<? extends DebugSection> clazz) {
|
|
||||||
try {
|
|
||||||
return ClassCollector.canInstantiate(clazz) ? clazz.newInstance() : null;
|
|
||||||
} catch (InstantiationException | IllegalAccessException e) {
|
|
||||||
throw new IllegalStateException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,125 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.data.limbo.LimboPlayer;
|
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
|
||||||
import fr.xephi.authme.datasource.CacheDataSource;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import org.bukkit.Location;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.function.Function;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.hamcrest.Matchers.sameInstance;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link DebugSectionUtils}.
|
|
||||||
*/
|
|
||||||
public class DebugSectionUtilsTest {
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void initMockLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFormatLocation() {
|
|
||||||
// given / when
|
|
||||||
String result = DebugSectionUtils.formatLocation(0.0, 10.248592, -18934.2349023, "Main");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo("(0, 10.25, -18934.23) in 'Main'"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullWorld() {
|
|
||||||
// given
|
|
||||||
Location location = new Location(null, 3.7777, 2.14156, 1);
|
|
||||||
|
|
||||||
// when
|
|
||||||
String result = DebugSectionUtils.formatLocation(location);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo("(3.78, 2.14, 1) in 'null'"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNullLocation() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(DebugSectionUtils.formatLocation(null), equalTo("null"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFetchMapInLimboService() {
|
|
||||||
// given
|
|
||||||
LimboService limboService = mock(LimboService.class);
|
|
||||||
Map<String, LimboPlayer> limboMap = new HashMap<>();
|
|
||||||
ReflectionTestUtils.setField(LimboService.class, limboService, "entries", limboMap);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Map map = DebugSectionUtils.applyToLimboPlayersMap(limboService, Function.identity());
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(map, sameInstance(limboMap));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleErrorGracefully() {
|
|
||||||
// given
|
|
||||||
LimboService limboService = mock(LimboService.class);
|
|
||||||
Map<String, LimboPlayer> limboMap = new HashMap<>();
|
|
||||||
ReflectionTestUtils.setField(LimboService.class, limboService, "entries", limboMap);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Object result = DebugSectionUtils.applyToLimboPlayersMap(limboService, map -> {
|
|
||||||
throw new IllegalStateException();
|
|
||||||
});
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnSameDataSourceInstance() {
|
|
||||||
// given
|
|
||||||
DataSource dataSource = mock(DataSource.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
DataSource result = DebugSectionUtils.unwrapSourceFromCacheDataSource(dataSource);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(dataSource));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldUnwrapCacheDataSource() {
|
|
||||||
// given
|
|
||||||
DataSource source = mock(DataSource.class);
|
|
||||||
PlayerCache playerCache = mock(PlayerCache.class);
|
|
||||||
CacheDataSource cacheDataSource = new CacheDataSource(source, playerCache);
|
|
||||||
|
|
||||||
// when
|
|
||||||
DataSource result = DebugSectionUtils.unwrapSourceFromCacheDataSource(cacheDataSource);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(source));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCastOrReturnNull() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(DebugSectionUtils.castToTypeOrNull("test", String.class), equalTo("test"));
|
|
||||||
assertThat(DebugSectionUtils.castToTypeOrNull("test", Integer.class), nullValue());
|
|
||||||
assertThat(DebugSectionUtils.castToTypeOrNull(5, String.class), nullValue());
|
|
||||||
assertThat(DebugSectionUtils.castToTypeOrNull(5, Integer.class), equalTo(5));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,96 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ClassCollector;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.permission.AdminPermission;
|
|
||||||
import fr.xephi.authme.permission.PermissionNode;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
import static java.util.Collections.emptyList;
|
|
||||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeast;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link HasPermissionChecker}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class HasPermissionCheckerTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private HasPermissionChecker hasPermissionChecker;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldListAllPermissionNodeClasses() {
|
|
||||||
// given
|
|
||||||
List<Class<? extends PermissionNode>> permissionClasses =
|
|
||||||
new ClassCollector(TestHelper.SOURCES_FOLDER, TestHelper.PROJECT_ROOT)
|
|
||||||
.collectClasses(PermissionNode.class).stream()
|
|
||||||
.filter(clz -> !clz.isInterface())
|
|
||||||
.collect(Collectors.toList());
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
assertThat(HasPermissionChecker.PERMISSION_NODE_CLASSES, containsInAnyOrder(permissionClasses.toArray()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowUsageInfo() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
hasPermissionChecker.execute(sender, emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> msgCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, atLeast(2)).sendMessage(msgCaptor.capture());
|
|
||||||
assertThat(
|
|
||||||
msgCaptor.getAllValues().stream().anyMatch(msg -> msg.contains("/authme debug perm bobby my.perm.node")),
|
|
||||||
equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowSuccessfulTestWithRegularPlayer() {
|
|
||||||
// given
|
|
||||||
String name = "Chuck";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(bukkitService.getPlayerExact(name)).willReturn(player);
|
|
||||||
PermissionNode permission = AdminPermission.CHANGE_EMAIL;
|
|
||||||
given(permissionsManager.hasPermission(player, permission)).willReturn(true);
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
hasPermissionChecker.execute(sender, asList(name, permission.getNode()));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).getPlayerExact(name);
|
|
||||||
verify(permissionsManager).hasPermission(player, permission);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Success: player '" + player.getName()
|
|
||||||
+ "' has permission '" + permission.getNode() + "'")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,69 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Consistency test for {@link MySqlDefaultChanger.Columns} enum.
|
|
||||||
*/
|
|
||||||
public class MySqlDefaultChangerColumnsTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAllHaveDifferentNameProperty() {
|
|
||||||
// given
|
|
||||||
Set<String> properties = new HashSet<>();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
for (MySqlDefaultChanger.Columns col : MySqlDefaultChanger.Columns.values()) {
|
|
||||||
if (!properties.add(col.getColumnNameProperty().getPath())) {
|
|
||||||
fail("Column '" + col + "' has a column name property path that was already encountered: "
|
|
||||||
+ col.getColumnNameProperty().getPath());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveMatchingNullableAndNotNullDefinition() {
|
|
||||||
for (MySqlDefaultChanger.Columns col : MySqlDefaultChanger.Columns.values()) {
|
|
||||||
verifyHasCorrespondingColumnDefinitions(col);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveMatchingDefaultValueInNotNullDefinition() {
|
|
||||||
for (MySqlDefaultChanger.Columns col : MySqlDefaultChanger.Columns.values()) {
|
|
||||||
verifyHasSameDefaultValueInNotNullDefinition(col);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private void verifyHasCorrespondingColumnDefinitions(MySqlDefaultChanger.Columns column) {
|
|
||||||
// given / when
|
|
||||||
String nullable = column.getNullableDefinition();
|
|
||||||
String notNull = column.getNotNullDefinition();
|
|
||||||
|
|
||||||
// then
|
|
||||||
String expectedNotNull = nullable + " NOT NULL DEFAULT ";
|
|
||||||
assertThat(column.name(), notNull.startsWith(expectedNotNull), equalTo(true));
|
|
||||||
// Check that `notNull` length is bigger because we expect a value after DEFAULT
|
|
||||||
assertThat(column.name(), notNull.length() > expectedNotNull.length(), equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
private void verifyHasSameDefaultValueInNotNullDefinition(MySqlDefaultChanger.Columns column) {
|
|
||||||
// given / when
|
|
||||||
String notNull = column.getNotNullDefinition();
|
|
||||||
Object defaultValue = column.getDefaultValue();
|
|
||||||
|
|
||||||
// then
|
|
||||||
String defaultValueAsString = String.valueOf(defaultValue);
|
|
||||||
if (!notNull.endsWith("DEFAULT " + defaultValueAsString)
|
|
||||||
&& !notNull.endsWith("DEFAULT '" + defaultValueAsString + "'")) {
|
|
||||||
fail("Expected '" + column + "' not-null definition to contain DEFAULT " + defaultValueAsString);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,98 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import com.zaxxer.hikari.HikariDataSource;
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.datasource.CacheDataSource;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.datasource.MySQL;
|
|
||||||
import fr.xephi.authme.datasource.SqlDataSourceTestUtil;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.sql.Connection;
|
|
||||||
import java.sql.SQLException;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.hamcrest.Matchers.sameInstance;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link MySqlDefaultChanger}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class MySqlDefaultChangerTest {
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Settings settings;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnMySqlConnection() throws SQLException {
|
|
||||||
// given
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
TestHelper.returnDefaultsForAllProperties(settings);
|
|
||||||
HikariDataSource dataSource = mock(HikariDataSource.class);
|
|
||||||
Connection connection = mock(Connection.class);
|
|
||||||
given(dataSource.getConnection()).willReturn(connection);
|
|
||||||
MySQL mySQL = SqlDataSourceTestUtil.createMySql(settings, dataSource);
|
|
||||||
MySqlDefaultChanger defaultChanger = createDefaultChanger(mySQL);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Connection result = defaultChanger.getConnection(mySQL);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(connection));
|
|
||||||
verify(dataSource).getConnection();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSetMySqlFieldOnInitialization() {
|
|
||||||
// given
|
|
||||||
MySQL mySql = mock(MySQL.class);
|
|
||||||
MySqlDefaultChanger defaultChanger = createDefaultChanger(mySql);
|
|
||||||
|
|
||||||
// when
|
|
||||||
defaultChanger.setMySqlField();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(ReflectionTestUtils.getFieldValue(MySqlDefaultChanger.class, defaultChanger, "mySql"),
|
|
||||||
sameInstance(mySql));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldLeaveMySqlFieldToNullOnInitialization() {
|
|
||||||
// given
|
|
||||||
DataSource dataSource = mock(DataSource.class);
|
|
||||||
PlayerCache playerCache = mock(PlayerCache.class);
|
|
||||||
CacheDataSource cacheDataSource = new CacheDataSource(dataSource, playerCache);
|
|
||||||
MySqlDefaultChanger defaultChanger = createDefaultChanger(cacheDataSource);
|
|
||||||
|
|
||||||
// when
|
|
||||||
defaultChanger.setMySqlField();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(ReflectionTestUtils.getFieldValue(MySqlDefaultChanger.class, defaultChanger, "mySql"),
|
|
||||||
nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
private MySqlDefaultChanger createDefaultChanger(DataSource dataSource) {
|
|
||||||
MySqlDefaultChanger defaultChanger = new MySqlDefaultChanger();
|
|
||||||
ReflectionTestUtils.setField(defaultChanger, "dataSource", dataSource);
|
|
||||||
ReflectionTestUtils.setField(defaultChanger, "settings", settings);
|
|
||||||
return defaultChanger;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,106 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.authme.debug;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.hasItem;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeastOnce;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PlayerAuthViewer}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class PlayerAuthViewerTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private PlayerAuthViewer authViewer;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldMakeExample() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
authViewer.execute(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Example: /authme debug db Bobby")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingPlayer() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
authViewer.execute(sender, Collections.singletonList("bogus"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).getAuth("bogus");
|
|
||||||
verify(sender).sendMessage(argThat(containsString("No record exists for 'bogus'")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDisplayAuthInfo() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name("george").realName("George")
|
|
||||||
.password("abcdefghijkl", "mnopqrst")
|
|
||||||
.lastIp("127.1.2.7").registrationDate(1111140000000L)
|
|
||||||
.totpKey("SECRET1321")
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("George")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
authViewer.execute(sender, Collections.singletonList("George"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> textCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, atLeastOnce()).sendMessage(textCaptor.capture());
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Player george / George")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Registration: 2005-03-18T")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Hash / salt (partial): 'abcdef...' / 'mnop...'")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("TOTP code (partial): 'SEC...'")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleCornerCases() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name("tar")
|
|
||||||
.password("abcd", null)
|
|
||||||
.lastIp("127.1.2.7").registrationDate(0L)
|
|
||||||
.build();
|
|
||||||
given(dataSource.getAuth("Tar")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
authViewer.execute(sender, Collections.singletonList("Tar"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
ArgumentCaptor<String> textCaptor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, atLeastOnce()).sendMessage(textCaptor.capture());
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Player tar / Player")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Registration: Not available (0)")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Last login: Not available (null)")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("Hash / salt (partial): 'ab...' / ''")));
|
|
||||||
assertThat(textCaptor.getAllValues(), hasItem(containsString("TOTP code (partial): ''")));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,190 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.captcha;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.data.captcha.LoginCaptchaManager;
|
|
||||||
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
|
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link CaptchaCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class CaptchaCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private CaptchaCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private LoginCaptchaManager loginCaptchaManager;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private RegistrationCaptchaManager registrationCaptchaManager;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private LimboService limboService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDetectIfPlayerIsLoggedIn() {
|
|
||||||
// given
|
|
||||||
String name = "creeper011";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("123"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.ALREADY_LOGGED_IN_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowLoginUsageIfCaptchaIsNotRequired() {
|
|
||||||
// given
|
|
||||||
String name = "bobby";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
given(loginCaptchaManager.isCaptchaRequired(name)).willReturn(false);
|
|
||||||
given(dataSource.isAuthAvailable(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("1234"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.USAGE_LOGIN);
|
|
||||||
verify(loginCaptchaManager).isCaptchaRequired(name);
|
|
||||||
verifyNoMoreInteractions(loginCaptchaManager, registrationCaptchaManager);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleCorrectCaptchaInput() {
|
|
||||||
// given
|
|
||||||
String name = "smith";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
given(loginCaptchaManager.isCaptchaRequired(name)).willReturn(true);
|
|
||||||
String captchaCode = "3991";
|
|
||||||
given(loginCaptchaManager.checkCode(player, captchaCode)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(captchaCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(loginCaptchaManager).isCaptchaRequired(name);
|
|
||||||
verify(loginCaptchaManager).checkCode(player, captchaCode);
|
|
||||||
verifyNoMoreInteractions(loginCaptchaManager);
|
|
||||||
verify(commonService).send(player, MessageKey.CAPTCHA_SUCCESS);
|
|
||||||
verify(commonService).send(player, MessageKey.LOGIN_MESSAGE);
|
|
||||||
verify(limboService).unmuteMessageTask(player);
|
|
||||||
verifyNoMoreInteractions(commonService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleWrongCaptchaInput() {
|
|
||||||
// given
|
|
||||||
String name = "smith";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
given(loginCaptchaManager.isCaptchaRequired(name)).willReturn(true);
|
|
||||||
String captchaCode = "2468";
|
|
||||||
given(loginCaptchaManager.checkCode(player, captchaCode)).willReturn(false);
|
|
||||||
String newCode = "1337";
|
|
||||||
given(loginCaptchaManager.getCaptchaCodeOrGenerateNew(name)).willReturn(newCode);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(captchaCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(loginCaptchaManager).isCaptchaRequired(name);
|
|
||||||
verify(loginCaptchaManager).checkCode(player, captchaCode);
|
|
||||||
verify(loginCaptchaManager).getCaptchaCodeOrGenerateNew(name);
|
|
||||||
verifyNoMoreInteractions(loginCaptchaManager);
|
|
||||||
verify(commonService).send(player, MessageKey.CAPTCHA_WRONG_ERROR, newCode);
|
|
||||||
verifyNoMoreInteractions(commonService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldVerifyWithRegisterCaptchaManager() {
|
|
||||||
// given
|
|
||||||
String name = "john";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(loginCaptchaManager.isCaptchaRequired(name)).willReturn(false);
|
|
||||||
given(registrationCaptchaManager.isCaptchaRequired(name)).willReturn(true);
|
|
||||||
String captchaCode = "A89Y3";
|
|
||||||
given(registrationCaptchaManager.checkCode(player, captchaCode)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(captchaCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).checkCode(player, captchaCode);
|
|
||||||
verify(loginCaptchaManager, only()).isCaptchaRequired(name);
|
|
||||||
verify(commonService).send(player, MessageKey.REGISTER_CAPTCHA_SUCCESS);
|
|
||||||
verify(commonService).send(player, MessageKey.REGISTER_MESSAGE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleFailedRegisterCaptcha() {
|
|
||||||
// given
|
|
||||||
String name = "asfd";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(registrationCaptchaManager.isCaptchaRequired(name)).willReturn(true);
|
|
||||||
String captchaCode = "SFL3";
|
|
||||||
given(registrationCaptchaManager.checkCode(player, captchaCode)).willReturn(false);
|
|
||||||
given(registrationCaptchaManager.getCaptchaCodeOrGenerateNew(name)).willReturn("new code");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(captchaCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).checkCode(player, captchaCode);
|
|
||||||
verify(registrationCaptchaManager).getCaptchaCodeOrGenerateNew(name);
|
|
||||||
verify(commonService).send(player, MessageKey.CAPTCHA_WRONG_ERROR, "new code");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowRegisterUsageWhenRegistrationCaptchaIsSolved() {
|
|
||||||
// given
|
|
||||||
String name = "alice";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(registrationCaptchaManager.isCaptchaRequired(name)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("test"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager, only()).isCaptchaRequired(name);
|
|
||||||
verify(commonService).send(player, MessageKey.USAGE_REGISTER);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,130 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.changepassword;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.VerificationCodeManager;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import fr.xephi.authme.service.ValidationService.ValidationResult;
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.any;
|
|
||||||
import static org.mockito.Mockito.eq;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.when;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ChangePasswordCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ChangePasswordCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ChangePasswordCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private VerificationCodeManager codeManager;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNonPlayerSender() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("use /authme password <playername> <password> instead")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNotLoggedInPlayer() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = initPlayerWithName("name", false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList("pass", "pass"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.NOT_LOGGED_IN);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidPassword() {
|
|
||||||
// given
|
|
||||||
Player sender = initPlayerWithName("abc12", true);
|
|
||||||
String password = "newPW";
|
|
||||||
given(validationService.validatePassword(password, "abc12")).willReturn(new ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH));
|
|
||||||
given(codeManager.isVerificationRequired(sender)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList("tester", password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, "abc12");
|
|
||||||
verify(commonService).send(sender, MessageKey.INVALID_PASSWORD_LENGTH, new String[0]);
|
|
||||||
verify(codeManager).isVerificationRequired(sender);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardTheDataForValidPassword() {
|
|
||||||
// given
|
|
||||||
String oldPass = "oldpass";
|
|
||||||
String newPass = "abc123";
|
|
||||||
Player player = initPlayerWithName("parker", true);
|
|
||||||
given(validationService.validatePassword("abc123", "parker")).willReturn(new ValidationResult());
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList(oldPass, newPass));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(newPass, "parker");
|
|
||||||
verify(commonService, never()).send(eq(player), any(MessageKey.class));
|
|
||||||
verify(management).performPasswordChange(player, oldPass, newPass);
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_CHANGE_PASSWORD));
|
|
||||||
}
|
|
||||||
|
|
||||||
private Player initPlayerWithName(String name, boolean loggedIn) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
when(player.getName()).thenReturn(name);
|
|
||||||
when(playerCache.isAuthenticated(name)).thenReturn(loggedIn);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,83 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link AddEmailCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class AddEmailCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private AddEmailCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commandService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNonPlayerSender() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardData() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
String email = "mail@example";
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(email, email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performAddEmail(sender, email);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFailForConfirmationMismatch() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
String email = "asdfasdf@example.com";
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList(email, "wrongConf"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
verify(commandService).send(sender, MessageKey.CONFIRM_EMAIL_MESSAGE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_ADD_EMAIL));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,99 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.VerificationCodeManager;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.Mockito.when;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ChangeEmailCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ChangeEmailCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ChangeEmailCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private VerificationCodeManager codeManager;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectNonPlayerSender() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopIfVerificationIsRequired() {
|
|
||||||
// given
|
|
||||||
String name = "Testeroni";
|
|
||||||
Player player = initPlayerWithName(name);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList("mail@example.org", "otherMail@example.com"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(codeManager).codeExistOrGenerateNew(name);
|
|
||||||
verify(commonService).send(player, MessageKey.VERIFICATION_CODE_REQUIRED);
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardData() {
|
|
||||||
// given
|
|
||||||
Player sender = initPlayerWithName("AmATest");
|
|
||||||
given(codeManager.isVerificationRequired(sender)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Arrays.asList("new.mail@example.org", "old_mail@example.org"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performChangeEmail(sender, "new.mail@example.org", "old_mail@example.org");
|
|
||||||
verify(codeManager).isVerificationRequired(sender);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_CHANGE_EMAIL));
|
|
||||||
}
|
|
||||||
|
|
||||||
private Player initPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
when(player.getName()).thenReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,49 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import fr.xephi.authme.command.CommandMapper;
|
|
||||||
import fr.xephi.authme.command.FoundCommandResult;
|
|
||||||
import fr.xephi.authme.command.help.HelpProvider;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.ArgumentMatchers.anyList;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link EmailBaseCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class EmailBaseCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private EmailBaseCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private HelpProvider helpProvider;
|
|
||||||
@Mock
|
|
||||||
private CommandMapper commandMapper;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDisplayHelp() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
FoundCommandResult result = mock(FoundCommandResult.class);
|
|
||||||
given(commandMapper.mapPartsToCommand(eq(sender), anyList())).willReturn(result);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commandMapper).mapPartsToCommand(sender, Collections.singletonList("email"));
|
|
||||||
verify(helpProvider).outputHelp(sender, result, HelpProvider.SHOW_CHILDREN);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,108 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.PasswordRecoveryService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Tests for {@link EmailSetPasswordCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class EmailSetPasswordCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private EmailSetPasswordCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PasswordRecoveryService recoveryService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PasswordSecurity passwordSecurity;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldChangePassword() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String name = "Jerry";
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
given(recoveryService.canChangePassword(player)).willReturn(true);
|
|
||||||
HashedPassword hashedPassword = passwordSecurity.computeHash("abc123", name);
|
|
||||||
given(passwordSecurity.computeHash("abc123", name)).willReturn(hashedPassword);
|
|
||||||
given(validationService.validatePassword("abc123", name))
|
|
||||||
.willReturn(new ValidationService.ValidationResult());
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList("abc123"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword("abc123", name);
|
|
||||||
verify(dataSource).updatePassword(name, hashedPassword);
|
|
||||||
verify(recoveryService).removeFromSuccessfulRecovery(player);
|
|
||||||
verify(commonService).send(player, MessageKey.PASSWORD_CHANGED_SUCCESS);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidPassword() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String name = "Morgan";
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
String password = "newPW";
|
|
||||||
given(validationService.validatePassword(password, name))
|
|
||||||
.willReturn(new ValidationService.ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH));
|
|
||||||
given(recoveryService.canChangePassword(player)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validatePassword(password, name);
|
|
||||||
verify(commonService).send(player, MessageKey.INVALID_PASSWORD_LENGTH, new String[0]);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDoNothingCantChangePass() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList("abc123"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(validationService, dataSource);
|
|
||||||
verify(commonService).send(player, MessageKey.CHANGE_PASSWORD_EXPIRED);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,92 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.PasswordRecoveryService;
|
|
||||||
import fr.xephi.authme.service.RecoveryCodeService;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Tests for {@link ProcessCodeCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ProcessCodeCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ProcessCodeCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private RecoveryCodeService codeService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PasswordRecoveryService recoveryService;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSendErrorForInvalidRecoveryCode() {
|
|
||||||
// given
|
|
||||||
String name = "Vultur3";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(codeService.hasTriesLeft(name)).willReturn(true);
|
|
||||||
given(codeService.isCodeValid(name, "bogus")).willReturn(false);
|
|
||||||
given(codeService.getTriesLeft(name)).willReturn(2);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("bogus"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.INCORRECT_RECOVERY_CODE, "2");
|
|
||||||
verifyNoMoreInteractions(recoveryService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSendErrorForNoMoreTries() {
|
|
||||||
// given
|
|
||||||
String name = "BobbY";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(codeService.hasTriesLeft(name)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("bogus"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.RECOVERY_TRIES_EXCEEDED);
|
|
||||||
verify(codeService).removeCode(name);
|
|
||||||
verifyNoMoreInteractions(recoveryService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldProcessCorrectCode() {
|
|
||||||
// given
|
|
||||||
String name = "Dwight";
|
|
||||||
String code = "chickenDinner";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(codeService.hasTriesLeft(name)).willReturn(true);
|
|
||||||
given(codeService.isCodeValid(name, code)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(sender, Collections.singletonList(code));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.RECOVERY_CODE_CORRECT);
|
|
||||||
verify(recoveryService).addSuccessfulRecovery(sender);
|
|
||||||
verify(codeService).removeCode(name);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,227 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import ch.jalu.datasourcecolumns.data.DataSourceValueImpl;
|
|
||||||
import ch.jalu.injector.testing.BeforeInjecting;
|
|
||||||
import ch.jalu.injector.testing.DelayedInjectionRunner;
|
|
||||||
import ch.jalu.injector.testing.InjectDelayed;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.PasswordRecoveryService;
|
|
||||||
import fr.xephi.authme.service.RecoveryCodeService;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Locale;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToRunTaskAsynchronously;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link RecoverEmailCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(DelayedInjectionRunner.class)
|
|
||||||
public class RecoverEmailCommandTest {
|
|
||||||
|
|
||||||
private static final String DEFAULT_EMAIL = "your@email.com";
|
|
||||||
|
|
||||||
@InjectDelayed
|
|
||||||
private RecoverEmailCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PasswordSecurity passwordSecurity;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private EmailService emailService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PasswordRecoveryService recoveryService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private RecoveryCodeService recoveryCodeService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void initLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@BeforeInjecting
|
|
||||||
public void initSettings() {
|
|
||||||
given(commonService.getProperty(SecuritySettings.EMAIL_RECOVERY_COOLDOWN_SECONDS)).willReturn(40);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingMailProperties() {
|
|
||||||
// given
|
|
||||||
given(emailService.hasAllInformation()).willReturn(false);
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("some@email.tld"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.INCOMPLETE_EMAIL_SETTINGS);
|
|
||||||
verifyNoInteractions(dataSource, passwordSecurity);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowErrorForAuthenticatedUser() {
|
|
||||||
// given
|
|
||||||
String name = "Bobby";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("bobby@example.org"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verifyNoInteractions(dataSource);
|
|
||||||
verify(commonService).send(sender, MessageKey.ALREADY_LOGGED_IN_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowRegisterMessageForUnregisteredPlayer() {
|
|
||||||
// given
|
|
||||||
String name = "Player123";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
given(dataSource.getEmail(name)).willReturn(DataSourceValueImpl.unknownRow());
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("someone@example.com"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verify(dataSource).getEmail(name);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
verify(commonService).send(sender, MessageKey.USAGE_REGISTER);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleDefaultEmail() {
|
|
||||||
// given
|
|
||||||
String name = "Tract0r";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
given(dataSource.getEmail(name)).willReturn(DataSourceValueImpl.of(DEFAULT_EMAIL));
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(DEFAULT_EMAIL));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verify(dataSource).getEmail(name);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
verify(commonService).send(sender, MessageKey.INVALID_EMAIL);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleInvalidEmailInput() {
|
|
||||||
// given
|
|
||||||
String name = "Rapt0r";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
given(dataSource.getEmail(name)).willReturn(DataSourceValueImpl.of("raptor@example.org"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("wrong-email@example.com"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verify(dataSource).getEmail(name);
|
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
verify(commonService).send(sender, MessageKey.INVALID_EMAIL);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGenerateRecoveryCode() {
|
|
||||||
// given
|
|
||||||
String name = "Vultur3";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(emailService.sendRecoveryCode(anyString(), anyString(), anyString())).willReturn(true);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
String email = "v@example.com";
|
|
||||||
given(dataSource.getEmail(name)).willReturn(DataSourceValueImpl.of(email));
|
|
||||||
String code = "a94f37";
|
|
||||||
given(recoveryCodeService.isRecoveryCodeNeeded()).willReturn(true);
|
|
||||||
given(recoveryCodeService.generateCode(name)).willReturn(code);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(email.toUpperCase(Locale.ROOT)));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verify(dataSource).getEmail(name);
|
|
||||||
verify(recoveryService).createAndSendRecoveryCode(sender, email);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGenerateNewPasswordWithoutRecoveryCode() {
|
|
||||||
// given
|
|
||||||
String name = "Vultur3";
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(name);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(emailService.sendPasswordMail(anyString(), anyString(), anyString())).willReturn(true);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
String email = "vulture@example.com";
|
|
||||||
given(dataSource.getEmail(name)).willReturn(DataSourceValueImpl.of(email));
|
|
||||||
given(recoveryCodeService.isRecoveryCodeNeeded()).willReturn(false);
|
|
||||||
setBukkitServiceToRunTaskAsynchronously(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList(email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verify(dataSource).getEmail(name);
|
|
||||||
verify(recoveryService).generateAndSendNewPassword(sender, email);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_RECOVER_EMAIL));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,95 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.email;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ShowEmailCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ShowEmailCommandTest {
|
|
||||||
|
|
||||||
private static final String CURRENT_EMAIL = "my.email@example.com";
|
|
||||||
private static final String USERNAME = "name";
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ShowEmailCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowCurrentEmailMessage() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(USERNAME);
|
|
||||||
given(playerCache.getAuth(USERNAME)).willReturn(newAuthWithEmail(CURRENT_EMAIL));
|
|
||||||
given(commonService.getProperty(SecuritySettings.USE_EMAIL_MASKING)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.EMAIL_SHOW, CURRENT_EMAIL);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowHiddenEmailMessage() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(USERNAME);
|
|
||||||
given(playerCache.getAuth(USERNAME)).willReturn(newAuthWithEmail(CURRENT_EMAIL));
|
|
||||||
given(commonService.getProperty(SecuritySettings.USE_EMAIL_MASKING)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.EMAIL_SHOW, "my.***@***mple.com");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnNoEmailMessage() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
given(sender.getName()).willReturn(USERNAME);
|
|
||||||
given(playerCache.getAuth(USERNAME)).willReturn(newAuthWithNoEmail());
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(sender, MessageKey.SHOW_NO_EMAIL);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static PlayerAuth newAuthWithEmail(String email) {
|
|
||||||
return PlayerAuth.builder()
|
|
||||||
.name(USERNAME)
|
|
||||||
.email(email)
|
|
||||||
.build();
|
|
||||||
}
|
|
||||||
|
|
||||||
private static PlayerAuth newAuthWithNoEmail() {
|
|
||||||
return PlayerAuth.builder()
|
|
||||||
.name(USERNAME)
|
|
||||||
.build();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,67 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.login;
|
|
||||||
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link LoginCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class LoginCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private LoginCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopIfSenderIsNotAPlayer() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("/authme forcelogin <player>")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCallManagementForPlayerCaller() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("password"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performLogin(sender, "password" );
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_LOGIN));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,60 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.logout;
|
|
||||||
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link LogoutCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class LogoutCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private LogoutCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopIfSenderIsNotAPlayer() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, new ArrayList<String>());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("only for players")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCallManagementForPlayerCaller() {
|
|
||||||
// given
|
|
||||||
Player sender = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("password"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(management).performLogout(sender);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,332 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.register;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.process.register.RegisterSecondaryArgument;
|
|
||||||
import fr.xephi.authme.process.register.RegistrationType;
|
|
||||||
import fr.xephi.authme.process.register.executors.EmailRegisterParams;
|
|
||||||
import fr.xephi.authme.process.register.executors.PasswordRegisterParams;
|
|
||||||
import fr.xephi.authme.process.register.executors.RegistrationMethod;
|
|
||||||
import fr.xephi.authme.process.register.executors.TwoFactorRegisterParams;
|
|
||||||
import fr.xephi.authme.security.HashAlgorithm;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.ValidationService;
|
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.bukkit.command.BlockCommandSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.IsEqualByReflectionMatcher.hasEqualValuesOnAllFields;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link RegisterCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class RegisterCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private RegisterCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private EmailService emailService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private ValidationService validationService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private RegistrationCaptchaManager registrationCaptchaManager;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setup() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void linkMocksAndProvideSettingDefaults() {
|
|
||||||
given(commonService.getProperty(SecuritySettings.PASSWORD_HASH)).willReturn(HashAlgorithm.BCRYPT);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.PASSWORD);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.NONE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotRunForNonPlayerSender() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(BlockCommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender).sendMessage(argThat(containsString("Player only!")));
|
|
||||||
verifyNoInteractions(management, emailService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardToManagementForTwoFactor() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(SecuritySettings.PASSWORD_HASH)).willReturn(HashAlgorithm.TWO_FACTOR);
|
|
||||||
Player player = mockPlayerWithName("test2");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).isCaptchaRequired("test2");
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.TWO_FACTOR_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(TwoFactorRegisterParams.of(player))));
|
|
||||||
verifyNoInteractions(emailService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnErrorForEmptyArguments() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.USAGE_REGISTER);
|
|
||||||
verifyNoInteractions(management, emailService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnErrorForMissingConfirmation() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.PASSWORD);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.CONFIRMATION);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("arrrr"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.USAGE_REGISTER);
|
|
||||||
verifyNoInteractions(management, emailService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnErrorForMissingEmailConfirmation() {
|
|
||||||
// given
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.EMAIL);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.EMAIL_MANDATORY);
|
|
||||||
given(validationService.validateEmail(anyString())).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("test@example.org"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.USAGE_REGISTER);
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldThrowErrorForMissingEmailConfiguration() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.EMAIL);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(false);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("myMail@example.tld"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.INCOMPLETE_EMAIL_SETTINGS);
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidEmail() {
|
|
||||||
// given
|
|
||||||
String playerMail = "player@example.org";
|
|
||||||
given(validationService.validateEmail(playerMail)).willReturn(false);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.EMAIL);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList(playerMail, playerMail));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(playerMail);
|
|
||||||
verify(commonService).send(player, MessageKey.INVALID_EMAIL);
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidEmailConfirmation() {
|
|
||||||
// given
|
|
||||||
String playerMail = "bobber@bobby.org";
|
|
||||||
given(validationService.validateEmail(playerMail)).willReturn(true);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.EMAIL);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.CONFIRMATION);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList(playerMail, "invalid"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.USAGE_REGISTER);
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPerformEmailRegistration() {
|
|
||||||
// given
|
|
||||||
String playerMail = "asfd@lakjgre.lds";
|
|
||||||
given(validationService.validateEmail(playerMail)).willReturn(true);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.EMAIL);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.CONFIRMATION);
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
Player player = mockPlayerWithName("brett");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList(playerMail, playerMail));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).isCaptchaRequired("brett");
|
|
||||||
verify(validationService).validateEmail(playerMail);
|
|
||||||
verify(emailService).hasAllInformation();
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.EMAIL_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(EmailRegisterParams.of(player, playerMail))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectInvalidPasswordConfirmation() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.PASSWORD);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.CONFIRMATION);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList("myPass", "mypass"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.PASSWORD_MATCH_ERROR);
|
|
||||||
verifyNoInteractions(management, emailService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPerformPasswordRegistration() {
|
|
||||||
// given
|
|
||||||
Player player = mockPlayerWithName("newPlayer");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("myPass"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).isCaptchaRequired("newPlayer");
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.PASSWORD_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(PasswordRegisterParams.of(player, "myPass", null))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPerformMailValidationForPasswordWithEmail() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.PASSWORD);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.EMAIL_MANDATORY);
|
|
||||||
String email = "email@example.org";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList("myPass", email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.PASSWORD_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(PasswordRegisterParams.of(player, "myPass", email))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopForInvalidEmail() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.PASSWORD);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.EMAIL_OPTIONAL);
|
|
||||||
String email = "email@example.org";
|
|
||||||
given(validationService.validateEmail(email)).willReturn(false);
|
|
||||||
Player player = mockPlayerWithName("Waaa");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList("myPass", email));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).isCaptchaRequired("Waaa");
|
|
||||||
verify(validationService).validateEmail(email);
|
|
||||||
verify(commonService).send(player, MessageKey.INVALID_EMAIL);
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPerformNormalPasswordRegisterForOneArgument() {
|
|
||||||
// given
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTRATION_TYPE)).willReturn(RegistrationType.PASSWORD);
|
|
||||||
given(commonService.getProperty(RegistrationSettings.REGISTER_SECOND_ARGUMENT)).willReturn(RegisterSecondaryArgument.EMAIL_OPTIONAL);
|
|
||||||
Player player = mockPlayerWithName("Doa");
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("myPass"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).isCaptchaRequired("Doa");
|
|
||||||
verify(management).performRegister(eq(RegistrationMethod.PASSWORD_REGISTRATION),
|
|
||||||
argThat(hasEqualValuesOnAllFields(PasswordRegisterParams.of(player, "myPass", null))));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRequestCaptcha() {
|
|
||||||
// given
|
|
||||||
given(registrationCaptchaManager.isCaptchaRequired(anyString())).willReturn(true);
|
|
||||||
String name = "Brian";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
String captcha = "AB923C";
|
|
||||||
given(registrationCaptchaManager.getCaptchaCodeOrGenerateNew(name)).willReturn(captcha);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Arrays.asList("myPass", "myPass"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(registrationCaptchaManager).isCaptchaRequired(name);
|
|
||||||
verify(commonService).send(player, MessageKey.CAPTCHA_FOR_REGISTRATION_REQUIRED, captcha);
|
|
||||||
verifyNoInteractions(management, validationService);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,93 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.totp;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import fr.xephi.authme.security.totp.GenerateTotpService;
|
|
||||||
import fr.xephi.authme.security.totp.TotpAuthenticator.TotpGenerationResult;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link AddTotpCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class AddTotpCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private AddTotpCommand addTotpCommand;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private GenerateTotpService generateTotpService;
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNonLoggedInUser() {
|
|
||||||
// given
|
|
||||||
Player player = mockPlayerWithName("bob");
|
|
||||||
given(playerCache.getAuth("bob")).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
addTotpCommand.runCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(messages).send(player, MessageKey.NOT_LOGGED_IN);
|
|
||||||
verifyNoInteractions(generateTotpService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotAddCodeForAlreadyExistingTotp() {
|
|
||||||
// given
|
|
||||||
Player player = mockPlayerWithName("arend");
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name("arend")
|
|
||||||
.totpKey("TOTP2345").build();
|
|
||||||
given(playerCache.getAuth("arend")).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
addTotpCommand.runCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_ALREADY_ENABLED);
|
|
||||||
verifyNoInteractions(generateTotpService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGenerateTotpCode() {
|
|
||||||
// given
|
|
||||||
Player player = mockPlayerWithName("charles");
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name("charles").build();
|
|
||||||
given(playerCache.getAuth("charles")).willReturn(auth);
|
|
||||||
|
|
||||||
TotpGenerationResult generationResult = new TotpGenerationResult(
|
|
||||||
"777Key214", "http://example.org/qr-code/link");
|
|
||||||
given(generateTotpService.generateTotpKey(player)).willReturn(generationResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
addTotpCommand.runCommand(player, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_CREATE, generationResult.getTotpKey(), generationResult.getAuthenticatorQrCodeUrl());
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_CREATE_CONFIRMATION_REQUIRED);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,158 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.totp;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import fr.xephi.authme.security.totp.GenerateTotpService;
|
|
||||||
import fr.xephi.authme.security.totp.TotpAuthenticator.TotpGenerationResult;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ConfirmTotpCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ConfirmTotpCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private ConfirmTotpCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private GenerateTotpService generateTotpService;
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAddTotpCodeToUserAfterSuccessfulConfirmation() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String playerName = "George";
|
|
||||||
given(player.getName()).willReturn(playerName);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(playerName).build();
|
|
||||||
given(playerCache.getAuth(playerName)).willReturn(auth);
|
|
||||||
String generatedTotpKey = "totp-key";
|
|
||||||
given(generateTotpService.getGeneratedTotpKey(player)).willReturn(new TotpGenerationResult(generatedTotpKey, "url-not-relevant"));
|
|
||||||
String totpCode = "954321";
|
|
||||||
given(generateTotpService.isTotpCodeCorrectForGeneratedTotpKey(player, totpCode)).willReturn(true);
|
|
||||||
given(dataSource.setTotpKey(anyString(), anyString())).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList(totpCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(generateTotpService).isTotpCodeCorrectForGeneratedTotpKey(player, totpCode);
|
|
||||||
verify(generateTotpService).removeGenerateTotpKey(player);
|
|
||||||
verify(dataSource).setTotpKey(playerName, generatedTotpKey);
|
|
||||||
verify(playerCache).updatePlayer(auth);
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_ENABLE_SUCCESS);
|
|
||||||
assertThat(auth.getTotpKey(), equalTo(generatedTotpKey));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleWrongTotpCode() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String playerName = "George";
|
|
||||||
given(player.getName()).willReturn(playerName);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(playerName).build();
|
|
||||||
given(playerCache.getAuth(playerName)).willReturn(auth);
|
|
||||||
given(generateTotpService.getGeneratedTotpKey(player)).willReturn(new TotpGenerationResult("totp-key", "url-not-relevant"));
|
|
||||||
String totpCode = "754321";
|
|
||||||
given(generateTotpService.isTotpCodeCorrectForGeneratedTotpKey(player, totpCode)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList(totpCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(generateTotpService).isTotpCodeCorrectForGeneratedTotpKey(player, totpCode);
|
|
||||||
verify(generateTotpService, never()).removeGenerateTotpKey(any(Player.class));
|
|
||||||
verify(playerCache, only()).getAuth(playerName);
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_ENABLE_ERROR_WRONG_CODE);
|
|
||||||
verifyNoInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingTotpKey() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String playerName = "George";
|
|
||||||
given(player.getName()).willReturn(playerName);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(playerName).build();
|
|
||||||
given(playerCache.getAuth(playerName)).willReturn(auth);
|
|
||||||
given(generateTotpService.getGeneratedTotpKey(player)).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList("871634"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(generateTotpService, only()).getGeneratedTotpKey(player);
|
|
||||||
verify(playerCache, only()).getAuth(playerName);
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_ENABLE_ERROR_NO_CODE);
|
|
||||||
verifyNoInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopForAlreadyExistingTotpKeyOnAccount() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String playerName = "George";
|
|
||||||
given(player.getName()).willReturn(playerName);
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(playerName).totpKey("A987234").build();
|
|
||||||
given(playerCache.getAuth(playerName)).willReturn(auth);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList("871634"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(playerCache, only()).getAuth(playerName);
|
|
||||||
verifyNoInteractions(generateTotpService, dataSource);
|
|
||||||
verify(messages).send(player, MessageKey.TWO_FACTOR_ALREADY_ENABLED);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleMissingAuthAccount() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String playerName = "George";
|
|
||||||
given(player.getName()).willReturn(playerName);
|
|
||||||
given(playerCache.getAuth(playerName)).willReturn(null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, Collections.singletonList("984685"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(playerCache, only()).getAuth(playerName);
|
|
||||||
verifyNoInteractions(generateTotpService, dataSource);
|
|
||||||
verify(messages).send(player, MessageKey.NOT_LOGGED_IN);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,149 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.totp;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import fr.xephi.authme.security.totp.TotpAuthenticator;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import static java.util.Collections.singletonList;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link RemoveTotpCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class RemoveTotpCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private RemoveTotpCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
@Mock
|
|
||||||
private TotpAuthenticator totpAuthenticator;
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRemoveTotpKey() {
|
|
||||||
// given
|
|
||||||
String name = "aws";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name).totpKey("some-totp-key").build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
String inputCode = "93847";
|
|
||||||
given(totpAuthenticator.checkCode(auth, inputCode)).willReturn(true);
|
|
||||||
given(dataSource.removeTotpKey(name)).willReturn(true);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, singletonList(inputCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).removeTotpKey(name);
|
|
||||||
verify(messages, only()).send(player, MessageKey.TWO_FACTOR_REMOVED_SUCCESS);
|
|
||||||
verify(playerCache).updatePlayer(auth);
|
|
||||||
assertThat(auth.getTotpKey(), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleDatabaseError() {
|
|
||||||
// given
|
|
||||||
String name = "aws";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name).totpKey("some-totp-key").build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
String inputCode = "93847";
|
|
||||||
given(totpAuthenticator.checkCode(auth, inputCode)).willReturn(true);
|
|
||||||
given(dataSource.removeTotpKey(name)).willReturn(false);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, singletonList(inputCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(dataSource).removeTotpKey(name);
|
|
||||||
verify(messages, only()).send(player, MessageKey.ERROR);
|
|
||||||
verify(playerCache, only()).getAuth(name);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleInvalidCode() {
|
|
||||||
// given
|
|
||||||
String name = "cesar";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name).totpKey("some-totp-key").build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
String inputCode = "93847";
|
|
||||||
given(totpAuthenticator.checkCode(auth, inputCode)).willReturn(false);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, singletonList(inputCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(dataSource);
|
|
||||||
verify(messages, only()).send(player, MessageKey.TWO_FACTOR_INVALID_CODE);
|
|
||||||
verify(playerCache, only()).getAuth(name);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUserWithoutTotpKey() {
|
|
||||||
// given
|
|
||||||
String name = "cesar";
|
|
||||||
PlayerAuth auth = PlayerAuth.builder().name(name).build();
|
|
||||||
given(playerCache.getAuth(name)).willReturn(auth);
|
|
||||||
String inputCode = "654684";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, singletonList(inputCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(dataSource, totpAuthenticator);
|
|
||||||
verify(messages, only()).send(player, MessageKey.TWO_FACTOR_NOT_ENABLED_ERROR);
|
|
||||||
verify(playerCache, only()).getAuth(name);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleNonLoggedInUser() {
|
|
||||||
// given
|
|
||||||
String name = "cesar";
|
|
||||||
given(playerCache.getAuth(name)).willReturn(null);
|
|
||||||
String inputCode = "654684";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.runCommand(player, singletonList(inputCode));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(dataSource, totpAuthenticator);
|
|
||||||
verify(messages, only()).send(player, MessageKey.NOT_LOGGED_IN);
|
|
||||||
verify(playerCache, only()).getAuth(name);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,47 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.totp;
|
|
||||||
|
|
||||||
import fr.xephi.authme.command.CommandMapper;
|
|
||||||
import fr.xephi.authme.command.FoundCommandResult;
|
|
||||||
import fr.xephi.authme.command.help.HelpProvider;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link TotpBaseCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class TotpBaseCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private TotpBaseCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommandMapper mapper;
|
|
||||||
@Mock
|
|
||||||
private HelpProvider helpProvider;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldOutputHelp() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
FoundCommandResult mappingResult = mock(FoundCommandResult.class);
|
|
||||||
given(mapper.mapPartsToCommand(sender, Collections.singletonList("totp"))).willReturn(mappingResult);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.emptyList());
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(mapper).mapPartsToCommand(sender, Collections.singletonList("totp"));
|
|
||||||
verify(helpProvider).outputHelp(sender, mappingResult, HelpProvider.SHOW_CHILDREN);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,122 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.unregister;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.VerificationCodeManager;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
import static org.mockito.hamcrest.MockitoHamcrest.argThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link UnregisterCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class UnregisterCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private UnregisterCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Management management;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private VerificationCodeManager codeManager;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCatchUnauthenticatedUser() {
|
|
||||||
// given
|
|
||||||
String password = "mySecret123";
|
|
||||||
String name = "player77";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(playerCache).isAuthenticated(name);
|
|
||||||
verify(commonService).send(player, MessageKey.NOT_LOGGED_IN);
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopForMissingVerificationCode() {
|
|
||||||
// given
|
|
||||||
String name = "asldjf";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("blergh"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(playerCache).isAuthenticated(name);
|
|
||||||
verify(codeManager).codeExistOrGenerateNew(name);
|
|
||||||
verify(commonService).send(player, MessageKey.VERIFICATION_CODE_REQUIRED);
|
|
||||||
verifyNoInteractions(management);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldForwardDataToAsyncTask() {
|
|
||||||
// given
|
|
||||||
String password = "p@ssw0rD";
|
|
||||||
String name = "jas0n_";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
given(playerCache.isAuthenticated(name)).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(password));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(playerCache).isAuthenticated(name);
|
|
||||||
verify(management).performUnregister(player, password);
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldStopIfSenderIsNotPlayer() {
|
|
||||||
// given
|
|
||||||
CommandSender sender = mock(CommandSender.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(sender, Collections.singletonList("password"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(playerCache, management);
|
|
||||||
verify(sender).sendMessage(argThat(containsString("/authme unregister <player>")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_UNREGISTER));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,168 +0,0 @@
|
|||||||
package fr.xephi.authme.command.executable.verification;
|
|
||||||
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.data.VerificationCodeManager;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.InjectMocks;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link VerificationCommand}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class VerificationCommandTest {
|
|
||||||
|
|
||||||
@InjectMocks
|
|
||||||
private VerificationCommand command;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private CommonService commonService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private VerificationCodeManager codeManager;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpLogger() {
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDetectIfMailHasASetup() {
|
|
||||||
// given
|
|
||||||
String name = "Alligator";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(codeManager.canSendMail()).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList("code"));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(commonService).send(player, MessageKey.INCOMPLETE_EMAIL_SETTINGS);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRequireAndAcceptCode() {
|
|
||||||
// given
|
|
||||||
String name = "Duck";
|
|
||||||
String code = "123932";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(codeManager.canSendMail()).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(true);
|
|
||||||
given(codeManager.isCodeRequired(name)).willReturn(true);
|
|
||||||
given(codeManager.checkCode(name, code)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(code));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
verify(codeManager).isCodeRequired(name);
|
|
||||||
verify(codeManager).checkCode(name, code);
|
|
||||||
verify(commonService).send(player, MessageKey.VERIFICATION_CODE_VERIFIED);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectCode() {
|
|
||||||
// given
|
|
||||||
String name = "Spider";
|
|
||||||
String code = "98345222"; // more than 6 digits
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(codeManager.canSendMail()).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(true);
|
|
||||||
given(codeManager.isCodeRequired(name)).willReturn(true);
|
|
||||||
given(codeManager.checkCode(name, code)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(code));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
verify(codeManager).isCodeRequired(name);
|
|
||||||
verify(codeManager).checkCode(name, code);
|
|
||||||
verify(commonService).send(player, MessageKey.INCORRECT_VERIFICATION_CODE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectVerificationDueToExpiration() {
|
|
||||||
// given
|
|
||||||
String name = "Dog";
|
|
||||||
String code = "131552";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(codeManager.canSendMail()).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(true);
|
|
||||||
given(codeManager.isCodeRequired(name)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(code));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
verify(codeManager).isCodeRequired(name);
|
|
||||||
verify(commonService).send(player, MessageKey.VERIFICATION_CODE_EXPIRED);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectVerificationDueToVerifiedIdentity() {
|
|
||||||
// given
|
|
||||||
String name = "Cow";
|
|
||||||
String code = "973583";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(codeManager.canSendMail()).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(false);
|
|
||||||
given(codeManager.hasEmail(name)).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(code));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
verify(codeManager).hasEmail(name);
|
|
||||||
verify(commonService).send(player, MessageKey.VERIFICATION_CODE_ALREADY_VERIFIED);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRejectVerificationDueToUndefinedEmail() {
|
|
||||||
// given
|
|
||||||
String name = "Frog";
|
|
||||||
String code = "774543";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(codeManager.canSendMail()).willReturn(true);
|
|
||||||
given(codeManager.isVerificationRequired(player)).willReturn(false);
|
|
||||||
given(codeManager.hasEmail(name)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
command.executeCommand(player, Collections.singletonList(code));
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(codeManager).isVerificationRequired(player);
|
|
||||||
verify(codeManager).hasEmail(name);
|
|
||||||
verify(commonService).send(player, MessageKey.VERIFICATION_CODE_EMAIL_NEEDED);
|
|
||||||
verify(commonService).send(player, MessageKey.ADD_EMAIL_MESSAGE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDefineArgumentMismatchMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(command.getArgumentsMismatchMessage(), equalTo(MessageKey.USAGE_VERIFICATION_CODE));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,39 +0,0 @@
|
|||||||
package fr.xephi.authme.command.help;
|
|
||||||
|
|
||||||
import fr.xephi.authme.util.StringUtils;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for enums {@link HelpMessage} and {@link HelpSection}.
|
|
||||||
*/
|
|
||||||
public class HelpMessageAndHelpSectionConsistencyTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveUniqueNonEmptyKeys() {
|
|
||||||
// given
|
|
||||||
Set<String> keys = new HashSet<>();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
for (HelpMessage message : HelpMessage.values()) {
|
|
||||||
assertThat("Key for message '" + message + "' is empty",
|
|
||||||
StringUtils.isBlank(message.getKey()), equalTo(false));
|
|
||||||
if (!keys.add(message.getKey())) {
|
|
||||||
fail("Key for message '" + message + "' is already used elsewhere");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for (HelpSection section : HelpSection.values()) {
|
|
||||||
assertThat("Key for section '" + section + "' is empty",
|
|
||||||
StringUtils.isBlank(section.getKey()), equalTo(false));
|
|
||||||
if (!keys.add(section.getKey())) {
|
|
||||||
fail("Key for section '" + section + "' is already used elsewhere");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,97 +0,0 @@
|
|||||||
package fr.xephi.authme.command.help;
|
|
||||||
|
|
||||||
import ch.jalu.configme.resource.PropertyReader;
|
|
||||||
import ch.jalu.configme.resource.YamlFileReader;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.command.CommandDescription;
|
|
||||||
import fr.xephi.authme.command.CommandInitializer;
|
|
||||||
import fr.xephi.authme.message.MessagePathHelper;
|
|
||||||
import org.bukkit.configuration.MemorySection;
|
|
||||||
import org.bukkit.configuration.file.FileConfiguration;
|
|
||||||
import org.bukkit.configuration.file.YamlConfiguration;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.instanceOf;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Tests that /messages/help_en.yml contains texts that correspond
|
|
||||||
* to the texts provided in the CommandDescription.
|
|
||||||
*/
|
|
||||||
public class HelpMessagesConsistencyTest {
|
|
||||||
|
|
||||||
private static final File DEFAULT_MESSAGES_FILE =
|
|
||||||
TestHelper.getJarFile("/" + MessagePathHelper.createHelpMessageFilePath(MessagePathHelper.DEFAULT_LANGUAGE));
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveIdenticalTexts() {
|
|
||||||
// given
|
|
||||||
CommandDescription description = getAuthMeRegisterDescription();
|
|
||||||
FileConfiguration configuration = YamlConfiguration.loadConfiguration(DEFAULT_MESSAGES_FILE);
|
|
||||||
final String path = "commands.authme.register.";
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
assertThat(configuration.get(path + "description"), equalTo(description.getDescription()));
|
|
||||||
assertThat(configuration.get(path + "detailedDescription"), equalTo(description.getDetailedDescription()));
|
|
||||||
assertThat(configuration.get(path + "arg1.label"), equalTo(description.getArguments().get(0).getName()));
|
|
||||||
assertThat(configuration.get(path + "arg1.description"), equalTo(description.getArguments().get(0).getDescription()));
|
|
||||||
assertThat(configuration.get(path + "arg2.label"), equalTo(description.getArguments().get(1).getName()));
|
|
||||||
assertThat(configuration.get(path + "arg2.description"), equalTo(description.getArguments().get(1).getDescription()));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Since CommandInitializer contains all descriptions for commands in English, the help_en.yml file
|
|
||||||
* only contains an entry for one command as to provide an example.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldOnlyHaveDescriptionForOneCommand() {
|
|
||||||
// given
|
|
||||||
FileConfiguration configuration = YamlConfiguration.loadConfiguration(DEFAULT_MESSAGES_FILE);
|
|
||||||
|
|
||||||
// when
|
|
||||||
Object commands = configuration.get("commands");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(commands, instanceOf(MemorySection.class));
|
|
||||||
assertThat(((MemorySection) commands).getKeys(false), contains("authme"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveEntryForEachHelpMessageKey() {
|
|
||||||
// given
|
|
||||||
PropertyReader reader = new YamlFileReader(DEFAULT_MESSAGES_FILE);
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
for (HelpMessage message : HelpMessage.values()) {
|
|
||||||
assertThat("Default configuration should have entry for message '" + message + "'",
|
|
||||||
reader.contains(message.getKey()), equalTo(true));
|
|
||||||
}
|
|
||||||
for (HelpSection section : HelpSection.values()) {
|
|
||||||
assertThat("Default configuration should have entry for section '" + section + "'",
|
|
||||||
reader.contains(section.getKey()), equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the CommandDescription object for the {@code /authme register} command.
|
|
||||||
*/
|
|
||||||
private static CommandDescription getAuthMeRegisterDescription() {
|
|
||||||
Collection<CommandDescription> commands = new CommandInitializer().getCommands();
|
|
||||||
|
|
||||||
List<CommandDescription> children = commands.stream()
|
|
||||||
.filter(command -> command.getLabels().contains("authme"))
|
|
||||||
.map(CommandDescription::getChildren)
|
|
||||||
.findFirst().get();
|
|
||||||
|
|
||||||
return children
|
|
||||||
.stream()
|
|
||||||
.filter(child -> child.getLabels().contains("register"))
|
|
||||||
.findFirst().get();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,160 +0,0 @@
|
|||||||
package fr.xephi.authme.command.help;
|
|
||||||
|
|
||||||
import com.google.common.io.Files;
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.command.CommandDescription;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil;
|
|
||||||
import fr.xephi.authme.message.AbstractMessageFileHandler;
|
|
||||||
import fr.xephi.authme.message.HelpMessagesFileHandler;
|
|
||||||
import fr.xephi.authme.message.MessagePathHelper;
|
|
||||||
import fr.xephi.authme.permission.DefaultPermission;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Rule;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.rules.TemporaryFolder;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.Collection;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.command.TestCommandsUtil.getCommandWithLabel;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.hasSize;
|
|
||||||
import static org.hamcrest.Matchers.sameInstance;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link HelpMessagesService}.
|
|
||||||
*/
|
|
||||||
public class HelpMessagesServiceTest {
|
|
||||||
|
|
||||||
private static final String TEST_FILE = TestHelper.PROJECT_ROOT + "command/help/help_test.yml";
|
|
||||||
private static final Collection<CommandDescription> COMMANDS = TestCommandsUtil.generateCommands();
|
|
||||||
|
|
||||||
private HelpMessagesService helpMessagesService;
|
|
||||||
|
|
||||||
@Rule
|
|
||||||
public TemporaryFolder temporaryFolder = new TemporaryFolder();
|
|
||||||
private File dataFolder;
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void initializeHandler() throws IOException {
|
|
||||||
dataFolder = temporaryFolder.newFolder();
|
|
||||||
new File(dataFolder, "messages").mkdirs();
|
|
||||||
File messagesFile = new File(dataFolder, MessagePathHelper.createHelpMessageFilePath("test"));
|
|
||||||
Files.copy(TestHelper.getJarFile(TEST_FILE), messagesFile);
|
|
||||||
|
|
||||||
HelpMessagesFileHandler helpMessagesFileHandler = createMessagesFileHandler();
|
|
||||||
helpMessagesService = new HelpMessagesService(helpMessagesFileHandler);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnLocalizedCommand() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(COMMANDS, "authme", "register");
|
|
||||||
|
|
||||||
// when
|
|
||||||
CommandDescription localCommand = helpMessagesService.buildLocalizedDescription(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(localCommand.getDescription(), equalTo("Registration"));
|
|
||||||
assertThat(localCommand.getDetailedDescription(), equalTo("Registers the player"));
|
|
||||||
assertThat(localCommand.getExecutableCommand(), equalTo(command.getExecutableCommand()));
|
|
||||||
assertThat(localCommand.getPermission(), equalTo(command.getPermission()));
|
|
||||||
assertThat(localCommand.getArguments(), hasSize(2));
|
|
||||||
assertThat(localCommand.getArguments().get(0).getName(), equalTo("password"));
|
|
||||||
assertThat(localCommand.getArguments().get(0).getDescription(), equalTo("The password"));
|
|
||||||
assertThat(localCommand.getArguments().get(1).getName(), equalTo("confirmation"));
|
|
||||||
assertThat(localCommand.getArguments().get(1).getDescription(), equalTo("The confirmation"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnLocalizedCommandWithDefaults() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(COMMANDS, "authme", "login");
|
|
||||||
|
|
||||||
// when
|
|
||||||
CommandDescription localCommand = helpMessagesService.buildLocalizedDescription(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(localCommand.getDescription(), equalTo("Logging in"));
|
|
||||||
assertThat(localCommand.getDetailedDescription(), equalTo("'login' test command"));
|
|
||||||
assertThat(localCommand.getArguments(), hasSize(1));
|
|
||||||
assertThat(localCommand.getArguments().get(0).getName(), equalTo("user password"));
|
|
||||||
assertThat(localCommand.getArguments().get(0).getDescription(), equalTo("'password' argument description"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReturnSameCommandForNoLocalization() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(COMMANDS, "email");
|
|
||||||
|
|
||||||
// when
|
|
||||||
CommandDescription localCommand = helpMessagesService.buildLocalizedDescription(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(localCommand, sameInstance(command));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldKeepChildrenInLocalCommand() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(COMMANDS, "authme");
|
|
||||||
|
|
||||||
// when
|
|
||||||
CommandDescription localCommand = helpMessagesService.buildLocalizedDescription(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(localCommand.getChildren(), equalTo(command.getChildren()));
|
|
||||||
assertThat(localCommand.getDescription(), equalTo("authme cmd"));
|
|
||||||
assertThat(localCommand.getDetailedDescription(), equalTo("Main command"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetTranslationsForSectionAndMessage() {
|
|
||||||
// given / when / then
|
|
||||||
assertThat(helpMessagesService.getMessage(DefaultPermission.OP_ONLY), equalTo("only op"));
|
|
||||||
assertThat(helpMessagesService.getMessage(HelpMessage.RESULT), equalTo("res."));
|
|
||||||
assertThat(helpMessagesService.getMessage(HelpSection.ARGUMENTS), equalTo("arg."));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGetLocalCommandDescription() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(COMMANDS, "authme", "register");
|
|
||||||
|
|
||||||
// when
|
|
||||||
String description = helpMessagesService.getDescription(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(description, equalTo("Registration"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldFallbackToDescriptionOnCommandObject() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(COMMANDS, "unregister");
|
|
||||||
|
|
||||||
// when
|
|
||||||
String description = helpMessagesService.getDescription(command);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(description, equalTo(command.getDescription()));
|
|
||||||
}
|
|
||||||
|
|
||||||
private HelpMessagesFileHandler createMessagesFileHandler() {
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(PluginSettings.MESSAGES_LANGUAGE)).willReturn("test");
|
|
||||||
|
|
||||||
HelpMessagesFileHandler messagesFileHandler = ReflectionTestUtils.newInstance(HelpMessagesFileHandler.class);
|
|
||||||
ReflectionTestUtils.setField(AbstractMessageFileHandler.class, messagesFileHandler, "settings", settings);
|
|
||||||
ReflectionTestUtils.setField(AbstractMessageFileHandler.class, messagesFileHandler, "dataFolder", dataFolder);
|
|
||||||
ReflectionTestUtils.invokePostConstructMethods(messagesFileHandler);
|
|
||||||
return messagesFileHandler;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,466 +0,0 @@
|
|||||||
package fr.xephi.authme.command.help;
|
|
||||||
|
|
||||||
import ch.jalu.injector.testing.BeforeInjecting;
|
|
||||||
import ch.jalu.injector.testing.DelayedInjectionRunner;
|
|
||||||
import ch.jalu.injector.testing.InjectDelayed;
|
|
||||||
import fr.xephi.authme.command.CommandDescription;
|
|
||||||
import fr.xephi.authme.command.FoundCommandResult;
|
|
||||||
import fr.xephi.authme.command.FoundResultStatus;
|
|
||||||
import fr.xephi.authme.command.TestCommandsUtil;
|
|
||||||
import fr.xephi.authme.permission.AdminPermission;
|
|
||||||
import fr.xephi.authme.permission.DefaultPermission;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import org.bukkit.ChatColor;
|
|
||||||
import org.bukkit.command.CommandSender;
|
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.internal.stubbing.answers.ReturnsArgumentAt;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.command.TestCommandsUtil.getCommandWithLabel;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.ALL_OPTIONS;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_ALTERNATIVES;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_ARGUMENTS;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_CHILDREN;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_COMMAND;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_DESCRIPTION;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_LONG_DESCRIPTION;
|
|
||||||
import static fr.xephi.authme.command.help.HelpProvider.SHOW_PERMISSIONS;
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.hasSize;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.atLeastOnce;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link HelpProvider}.
|
|
||||||
*/
|
|
||||||
@RunWith(DelayedInjectionRunner.class)
|
|
||||||
public class HelpProviderTest {
|
|
||||||
|
|
||||||
private static Collection<CommandDescription> commands;
|
|
||||||
|
|
||||||
@InjectDelayed
|
|
||||||
private HelpProvider helpProvider;
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
@Mock
|
|
||||||
private HelpMessagesService helpMessagesService;
|
|
||||||
@Mock
|
|
||||||
private CommandSender sender;
|
|
||||||
|
|
||||||
@BeforeClass
|
|
||||||
public static void setUpCommands() {
|
|
||||||
commands = TestCommandsUtil.generateCommands();
|
|
||||||
}
|
|
||||||
|
|
||||||
@BeforeInjecting
|
|
||||||
public void setInitialSettings() {
|
|
||||||
setDefaultHelpMessages(helpMessagesService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowLongDescription() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "login");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Arrays.asList("authme", "login"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_COMMAND | SHOW_LONG_DESCRIPTION | SHOW_DESCRIPTION);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(5));
|
|
||||||
assertThat(lines.get(0), containsString("Header"));
|
|
||||||
assertThat(lines.get(1), containsString("Command: /authme login <password>"));
|
|
||||||
assertThat(lines.get(2), containsString("Short description: login cmd"));
|
|
||||||
assertThat(lines.get(3), equalTo("Detailed description:"));
|
|
||||||
assertThat(lines.get(4), containsString("'login' test command"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowArguments() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Arrays.asList("authme", "reg"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_ARGUMENTS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(4));
|
|
||||||
assertThat(lines.get(0), containsString("Header"));
|
|
||||||
assertThat(lines.get(1), equalTo("Arguments:"));
|
|
||||||
assertThat(lines.get(2), containsString("password: 'password' argument description"));
|
|
||||||
assertThat(lines.get(3), containsString("confirmation: 'confirmation' argument description"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowSpecifyIfArgumentIsOptional() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "email");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("email"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_ARGUMENTS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(3));
|
|
||||||
assertThat(lines.get(2), containsString("player: 'player' argument description (Optional)"));
|
|
||||||
}
|
|
||||||
|
|
||||||
/** Verifies that the "Arguments:" line is not shown if the command has no arguments. */
|
|
||||||
@Test
|
|
||||||
public void shouldNotShowAnythingIfCommandHasNoArguments() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_ARGUMENTS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1)); // only has the help banner
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowAndEvaluatePermissions() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "unregister");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("unreg"));
|
|
||||||
given(sender.isOp()).willReturn(true);
|
|
||||||
given(permissionsManager.hasPermission(sender, AdminPermission.UNREGISTER)).willReturn(true);
|
|
||||||
given(permissionsManager.hasPermission(sender, command.getPermission())).willReturn(true);
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_PERMISSIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(5));
|
|
||||||
assertThat(lines.get(1), containsString("Permissions:"));
|
|
||||||
assertThat(lines.get(2),
|
|
||||||
containsString(AdminPermission.UNREGISTER.getNode() + " (Has permission)"));
|
|
||||||
assertThat(lines.get(3), containsString("Default: Op only (Has permission)"));
|
|
||||||
assertThat(lines.get(4), containsString("Result: Has permission"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowAndEvaluateForbiddenPermissions() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "unregister");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("unregister"));
|
|
||||||
given(sender.isOp()).willReturn(false);
|
|
||||||
given(permissionsManager.hasPermission(sender, AdminPermission.UNREGISTER)).willReturn(false);
|
|
||||||
given(permissionsManager.hasPermission(sender, command.getPermission())).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_PERMISSIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(5));
|
|
||||||
assertThat(lines.get(1), containsString("Permissions:"));
|
|
||||||
assertThat(lines.get(2),
|
|
||||||
containsString(AdminPermission.UNREGISTER.getNode() + " (No permission)"));
|
|
||||||
assertThat(lines.get(3), containsString("Default: Op only (No permission)"));
|
|
||||||
assertThat(lines.get(4), containsString("Result: No permission"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotShowAnythingForEmptyPermissions() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_PERMISSIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotShowAnythingForNullPermissionsOnCommand() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = mock(CommandDescription.class);
|
|
||||||
given(command.getPermission()).willReturn(null);
|
|
||||||
given(command.getLabels()).willReturn(Collections.singletonList("test"));
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("test"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_PERMISSIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowAlternatives() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Arrays.asList("authme", "reg"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_ALTERNATIVES);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(4));
|
|
||||||
assertThat(lines.get(1), containsString("Alternatives:"));
|
|
||||||
assertThat(lines.get(2), containsString("/authme register <password> <confirmation>"));
|
|
||||||
assertThat(lines.get(3), containsString("/authme r <password> <confirmation>"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotShowAnythingIfHasNoAlternatives() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "login");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Arrays.asList("authme", "login"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_ALTERNATIVES);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowChildren() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
given(helpMessagesService.getDescription(getCommandWithLabel(commands, "authme", "login")))
|
|
||||||
.willReturn("Command for login [localized]");
|
|
||||||
given(helpMessagesService.getDescription(getCommandWithLabel(commands, "authme", "register")))
|
|
||||||
.willReturn("Registration command [localized]");
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_CHILDREN);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(4));
|
|
||||||
assertThat(lines.get(1), equalTo("Children:"));
|
|
||||||
assertThat(lines.get(2), equalTo(" /authme login: Command for login [localized]"));
|
|
||||||
assertThat(lines.get(3), equalTo(" /authme register: Registration command [localized]"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotShowCommandsTitleForCommandWithNoChildren() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_CHILDREN);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleUnboundFoundCommandResult() {
|
|
||||||
// given
|
|
||||||
FoundCommandResult result = new FoundCommandResult(null, Arrays.asList("authme", "test"),
|
|
||||||
Collections.emptyList(), 0.0, FoundResultStatus.UNKNOWN_LABEL);
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, ALL_OPTIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1));
|
|
||||||
assertThat(lines.get(0), containsString("Failed to retrieve any help information"));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Since command parts may be mapped to a command description with labels that don't completely correspond to it,
|
|
||||||
* (e.g. suggest "register command" for /authme ragister), we need to check the labels and construct a correct list
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldShowCommandSyntaxWithCorrectLabels() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Arrays.asList("authme", "ragister"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_COMMAND);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(2));
|
|
||||||
assertThat(lines.get(0), containsString("Header"));
|
|
||||||
assertThat(lines.get(1), containsString("Command: /authme register <password> <confirmation>"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRetainCorrectLabels() {
|
|
||||||
// given
|
|
||||||
List<String> labels = Arrays.asList("authme", "reg");
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
|
|
||||||
// when
|
|
||||||
List<String> result = HelpProvider.filterCorrectLabels(command, labels);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(labels));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldReplaceIncorrectLabels() {
|
|
||||||
// given
|
|
||||||
List<String> labels = Arrays.asList("authme", "wrong");
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
|
|
||||||
// when
|
|
||||||
List<String> result = HelpProvider.filterCorrectLabels(command, labels);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, contains("authme", "register"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDisableSectionsWithEmptyTranslations() {
|
|
||||||
// given
|
|
||||||
given(helpMessagesService.getMessage(HelpSection.DETAILED_DESCRIPTION)).willReturn("");
|
|
||||||
given(helpMessagesService.getMessage(HelpSection.ALTERNATIVES)).willReturn("");
|
|
||||||
given(helpMessagesService.getMessage(HelpSection.PERMISSIONS)).willReturn("");
|
|
||||||
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, ALL_OPTIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(6));
|
|
||||||
assertThat(lines.get(0), equalTo("Header"));
|
|
||||||
assertThat(lines.get(1), equalTo("Command: /authme register <password> <confirmation>"));
|
|
||||||
assertThat(lines.get(2), equalTo("Short description: register cmd"));
|
|
||||||
assertThat(lines.get(3), equalTo("Arguments:"));
|
|
||||||
assertThat(lines.get(4), containsString("'password' argument description"));
|
|
||||||
assertThat(lines.get(5), containsString("'confirmation' argument description"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotReturnAnythingForAllDisabledSections() {
|
|
||||||
// given
|
|
||||||
given(helpMessagesService.getMessage(HelpSection.COMMAND)).willReturn("");
|
|
||||||
given(helpMessagesService.getMessage(HelpSection.ALTERNATIVES)).willReturn("");
|
|
||||||
given(helpMessagesService.getMessage(HelpSection.PERMISSIONS)).willReturn("");
|
|
||||||
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_COMMAND | SHOW_ALTERNATIVES | SHOW_PERMISSIONS);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(sender, never()).sendMessage(anyString());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSkipEmptyHeader() {
|
|
||||||
// given
|
|
||||||
given(helpMessagesService.getMessage(HelpMessage.HEADER)).willReturn("");
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "authme", "register");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("authme"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_COMMAND);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(1));
|
|
||||||
assertThat(lines.get(0), equalTo("Command: /authme register <password> <confirmation>"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldShowAlternativesForRootCommand() {
|
|
||||||
// given
|
|
||||||
CommandDescription command = getCommandWithLabel(commands, "unregister");
|
|
||||||
FoundCommandResult result = newFoundResult(command, Collections.singletonList("unreg"));
|
|
||||||
|
|
||||||
// when
|
|
||||||
helpProvider.outputHelp(sender, result, SHOW_COMMAND | SHOW_ALTERNATIVES);
|
|
||||||
|
|
||||||
// then
|
|
||||||
List<String> lines = getLines(sender);
|
|
||||||
assertThat(lines, hasSize(4));
|
|
||||||
assertThat(lines.get(0), equalTo("Header"));
|
|
||||||
assertThat(lines.get(1), equalTo("Command: /unreg <player>"));
|
|
||||||
assertThat(lines.get(2), equalTo("Alternatives:"));
|
|
||||||
assertThat(lines.get(3), equalTo(" /unregister <player>"));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Generate an instance of {@link FoundCommandResult} with the given command and labels. All other fields aren't
|
|
||||||
* retrieved by {@link HelpProvider} and so are initialized to default values for the tests.
|
|
||||||
*
|
|
||||||
* @param command The command description
|
|
||||||
* @param labels The labels of the command (as in a real use case, they do not have to be correct)
|
|
||||||
* @return The generated FoundCommandResult object
|
|
||||||
*/
|
|
||||||
private static FoundCommandResult newFoundResult(CommandDescription command, List<String> labels) {
|
|
||||||
return new FoundCommandResult(command, labels, Collections.emptyList(), 0.0, FoundResultStatus.SUCCESS);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static String removeColors(String str) {
|
|
||||||
for (ChatColor color : ChatColor.values()) {
|
|
||||||
str = str.replace(color.toString(), "");
|
|
||||||
}
|
|
||||||
return str;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static List<String> getLines(CommandSender sender) {
|
|
||||||
ArgumentCaptor<String> captor = ArgumentCaptor.forClass(String.class);
|
|
||||||
verify(sender, atLeastOnce()).sendMessage(captor.capture());
|
|
||||||
return captor.getAllValues().stream().map(s -> removeColors(s)).collect(Collectors.toList());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void setDefaultHelpMessages(HelpMessagesService helpMessagesService) {
|
|
||||||
given(helpMessagesService.buildLocalizedDescription(any(CommandDescription.class)))
|
|
||||||
.willAnswer(new ReturnsArgumentAt(0));
|
|
||||||
for (HelpMessage key : HelpMessage.values()) {
|
|
||||||
String text = key.name().replace("_", " ").toLowerCase(Locale.ROOT);
|
|
||||||
given(helpMessagesService.getMessage(key))
|
|
||||||
.willReturn(text.substring(0, 1).toUpperCase(Locale.ROOT) + text.substring(1));
|
|
||||||
}
|
|
||||||
for (DefaultPermission permission : DefaultPermission.values()) {
|
|
||||||
String text = permission.name().replace("_", " ").toLowerCase(Locale.ROOT);
|
|
||||||
given(helpMessagesService.getMessage(permission))
|
|
||||||
.willReturn(text.substring(0, 1).toUpperCase(Locale.ROOT) + text.substring(1));
|
|
||||||
}
|
|
||||||
for (HelpSection section : HelpSection.values()) {
|
|
||||||
String text = section.name().replace("_", " ").toLowerCase(Locale.ROOT);
|
|
||||||
given(helpMessagesService.getMessage(section))
|
|
||||||
.willReturn(text.substring(0, 1).toUpperCase(Locale.ROOT) + text.substring(1));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,80 +0,0 @@
|
|||||||
package fr.xephi.authme.data;
|
|
||||||
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.permission.PlayerPermission;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.ProtectionSettings;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link QuickCommandsProtectionManager}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class QuickCommandsProtectionManagerTest {
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Settings settings;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAllowCommand() {
|
|
||||||
// given
|
|
||||||
String playername = "PlayerName";
|
|
||||||
Player player = mockPlayerWithName(playername);
|
|
||||||
given(settings.getProperty(ProtectionSettings.QUICK_COMMANDS_DENIED_BEFORE_MILLISECONDS)).willReturn(0);
|
|
||||||
given(permissionsManager.hasPermission(player, PlayerPermission.QUICK_COMMANDS_PROTECTION)).willReturn(true);
|
|
||||||
|
|
||||||
String name = "TestName";
|
|
||||||
|
|
||||||
QuickCommandsProtectionManager qcpm = createQuickCommandsProtectioneManager();
|
|
||||||
qcpm.processJoin(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean test1 = qcpm.isAllowed(name);
|
|
||||||
boolean test2 = qcpm.isAllowed(playername);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(test1, equalTo(true));
|
|
||||||
assertThat(test2, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldDenyCommand() {
|
|
||||||
// given
|
|
||||||
String name = "TestName1";
|
|
||||||
Player player = mockPlayerWithName(name);
|
|
||||||
given(settings.getProperty(ProtectionSettings.QUICK_COMMANDS_DENIED_BEFORE_MILLISECONDS)).willReturn(5000);
|
|
||||||
|
|
||||||
QuickCommandsProtectionManager qcpm = createQuickCommandsProtectioneManager();
|
|
||||||
given(permissionsManager.hasPermission(player, PlayerPermission.QUICK_COMMANDS_PROTECTION)).willReturn(true);
|
|
||||||
qcpm.processJoin(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean test = qcpm.isAllowed(name);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(test, equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
private QuickCommandsProtectionManager createQuickCommandsProtectioneManager() {
|
|
||||||
return new QuickCommandsProtectionManager(settings, permissionsManager);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,265 +0,0 @@
|
|||||||
package fr.xephi.authme.data;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.TestHelper;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
|
||||||
import fr.xephi.authme.message.Messages;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import fr.xephi.authme.util.expiring.TimedCounter;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.ArgumentCaptor;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.util.Calendar;
|
|
||||||
import java.util.Date;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitServiceTestHelper.setBukkitServiceToScheduleSyncDelayedTask;
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.lessThan;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.eq;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link TempbanManager}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class TempbanManagerTest {
|
|
||||||
|
|
||||||
private static final long DATE_TOLERANCE_MILLISECONDS = 200L;
|
|
||||||
private static final long TEST_EXPIRATION_THRESHOLD = 120_000L;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Messages messages;
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAddCounts() {
|
|
||||||
// given
|
|
||||||
Settings settings = mockSettings(3, 60, "");
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
String address = "192.168.1.1";
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseCount(address, "Bob");
|
|
||||||
manager.increaseCount(address, "Todd");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(manager.shouldTempban(address), equalTo(false));
|
|
||||||
assertHasCount(manager, address, "Bob", 1);
|
|
||||||
assertHasCount(manager, address, "Todd", 1);
|
|
||||||
manager.increaseCount(address, "Bob");
|
|
||||||
assertThat(manager.shouldTempban(address), equalTo(true));
|
|
||||||
assertThat(manager.shouldTempban("10.0.0.1"), equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldIncreaseAndResetCount() {
|
|
||||||
// given
|
|
||||||
String address = "192.168.1.2";
|
|
||||||
Settings settings = mockSettings(3, 60, "");
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseCount(address, "test");
|
|
||||||
manager.increaseCount(address, "test");
|
|
||||||
manager.increaseCount(address, "test");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(manager.shouldTempban(address), equalTo(true));
|
|
||||||
assertHasCount(manager, address, "test", 3);
|
|
||||||
|
|
||||||
// when 2
|
|
||||||
manager.resetCount(address, "test");
|
|
||||||
|
|
||||||
// then 2
|
|
||||||
assertThat(manager.shouldTempban(address), equalTo(false));
|
|
||||||
assertHasNoEntries(manager, address);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotIncreaseCountForDisabledTempban() {
|
|
||||||
// given
|
|
||||||
String address = "192.168.1.3";
|
|
||||||
Settings settings = mockSettings(1, 5, "");
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_ON_MAX_LOGINS)).willReturn(false);
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseCount(address, "username");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(manager.shouldTempban(address), equalTo(false));
|
|
||||||
assertHasNoEntries(manager, address);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCheckCountIfTempbanIsDisabled() {
|
|
||||||
// given
|
|
||||||
String address = "192.168.1.4";
|
|
||||||
Settings settings = mockSettings(1, 5, "");
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_ON_MAX_LOGINS)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseCount(address, "username");
|
|
||||||
// assumptions
|
|
||||||
assertThat(manager.shouldTempban(address), equalTo(true));
|
|
||||||
assertHasCount(manager, address, "username", 1);
|
|
||||||
// end assumptions
|
|
||||||
manager.reload(settings);
|
|
||||||
boolean result = manager.shouldTempban(address);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotIssueBanIfDisabled() {
|
|
||||||
// given
|
|
||||||
Settings settings = mockSettings(0, 0, "");
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_ON_MAX_LOGINS)).willReturn(false);
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.tempbanPlayer(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verifyNoInteractions(player, bukkitService);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldBanPlayerIp() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String ip = "123.45.67.89";
|
|
||||||
TestHelper.mockIpAddressToPlayer(player, ip);
|
|
||||||
String banReason = "IP ban too many logins";
|
|
||||||
given(messages.retrieveSingle(player, MessageKey.TEMPBAN_MAX_LOGINS)).willReturn(banReason);
|
|
||||||
Settings settings = mockSettings(2, 100, "");
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
setBukkitServiceToScheduleSyncDelayedTask(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.tempbanPlayer(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player).kickPlayer(banReason);
|
|
||||||
ArgumentCaptor<Date> captor = ArgumentCaptor.forClass(Date.class);
|
|
||||||
verify(bukkitService).banIp(eq(ip), eq(banReason), captor.capture(), eq("AuthMe"));
|
|
||||||
|
|
||||||
// Compute the expected expiration date and check that the actual date is within the difference tolerance
|
|
||||||
Calendar cal = Calendar.getInstance();
|
|
||||||
cal.add(Calendar.MINUTE, 100);
|
|
||||||
long expectedExpiration = cal.getTime().getTime();
|
|
||||||
assertThat(Math.abs(captor.getValue().getTime() - expectedExpiration), lessThan(DATE_TOLERANCE_MILLISECONDS));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldBanPlayerIpCustom() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn("Bob");
|
|
||||||
String ip = "143.45.77.89";
|
|
||||||
TestHelper.mockIpAddressToPlayer(player, ip);
|
|
||||||
String banCommand = "banip %ip% 15d IP ban too many logins";
|
|
||||||
Settings settings = mockSettings(2, 100, banCommand);
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
setBukkitServiceToScheduleSyncDelayedTask(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.tempbanPlayer(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(bukkitService).dispatchConsoleCommand(banCommand.replace("%ip%", ip));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldResetCountAfterBan() {
|
|
||||||
// given
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
String ip = "22.44.66.88";
|
|
||||||
TestHelper.mockIpAddressToPlayer(player, ip);
|
|
||||||
String banReason = "kick msg";
|
|
||||||
given(messages.retrieveSingle(player, MessageKey.TEMPBAN_MAX_LOGINS)).willReturn(banReason);
|
|
||||||
Settings settings = mockSettings(10, 60, "");
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, settings);
|
|
||||||
manager.increaseCount(ip, "user");
|
|
||||||
manager.increaseCount(ip, "name2");
|
|
||||||
manager.increaseCount(ip, "user");
|
|
||||||
setBukkitServiceToScheduleSyncDelayedTask(bukkitService);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.tempbanPlayer(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(player).kickPlayer(banReason);
|
|
||||||
assertHasNoEntries(manager, ip);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldPerformCleanup() {
|
|
||||||
// given
|
|
||||||
Map<String, TimedCounter<String>> counts = new HashMap<>();
|
|
||||||
TimedCounter<String> counter1 = mockCounter();
|
|
||||||
given(counter1.isEmpty()).willReturn(true);
|
|
||||||
counts.put("11.11.11.11", counter1);
|
|
||||||
TimedCounter<String> counter2 = mockCounter();
|
|
||||||
given(counter2.isEmpty()).willReturn(false);
|
|
||||||
counts.put("33.33.33.33", counter2);
|
|
||||||
|
|
||||||
TempbanManager manager = new TempbanManager(bukkitService, messages, mockSettings(3, 10, ""));
|
|
||||||
ReflectionTestUtils.setField(TempbanManager.class, manager, "ipLoginFailureCounts", counts);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.performCleanup();
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(counter1).removeExpiredEntries();
|
|
||||||
verify(counter2).removeExpiredEntries();
|
|
||||||
assertThat(counts.keySet(), contains("33.33.33.33"));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Settings mockSettings(int maxTries, int tempbanLength, String customCommand) {
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_ON_MAX_LOGINS)).willReturn(true);
|
|
||||||
given(settings.getProperty(SecuritySettings.MAX_LOGIN_TEMPBAN)).willReturn(maxTries);
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_LENGTH)).willReturn(tempbanLength);
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_MINUTES_BEFORE_RESET))
|
|
||||||
.willReturn((int) TEST_EXPIRATION_THRESHOLD / 60_000);
|
|
||||||
given(settings.getProperty(SecuritySettings.TEMPBAN_CUSTOM_COMMAND)).willReturn(customCommand);
|
|
||||||
return settings;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void assertHasNoEntries(TempbanManager manager, String address) {
|
|
||||||
Map<String, TimedCounter<String>> playerCounts = ReflectionTestUtils
|
|
||||||
.getFieldValue(TempbanManager.class, manager, "ipLoginFailureCounts");
|
|
||||||
TimedCounter<String> counter = playerCounts.get(address);
|
|
||||||
assertThat(counter == null || counter.isEmpty(), equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void assertHasCount(TempbanManager manager, String address, String name, int count) {
|
|
||||||
Map<String, TimedCounter<String>> playerCounts = ReflectionTestUtils
|
|
||||||
.getFieldValue(TempbanManager.class, manager, "ipLoginFailureCounts");
|
|
||||||
assertThat(playerCounts.get(address).get(name), equalTo(count));
|
|
||||||
}
|
|
||||||
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
private static <T> TimedCounter<T> mockCounter() {
|
|
||||||
return mock(TimedCounter.class);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,171 +0,0 @@
|
|||||||
package fr.xephi.authme.data;
|
|
||||||
|
|
||||||
import ch.jalu.datasourcecolumns.data.DataSourceValueImpl;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.permission.PlayerPermission;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.only;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link VerificationCodeManager}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class VerificationCodeManagerTest {
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Settings settings;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private DataSource dataSource;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private EmailService emailService;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PermissionsManager permissionsManager;
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void setUpBasicBehavior() {
|
|
||||||
given(emailService.hasAllInformation()).willReturn(true);
|
|
||||||
given(settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES)).willReturn(1);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRequireVerification() {
|
|
||||||
// given
|
|
||||||
String name1 = "ILoveTests";
|
|
||||||
Player player1 = mockPlayerWithName(name1);
|
|
||||||
given(dataSource.getEmail(name1)).willReturn(DataSourceValueImpl.of("ilovetests@test.com"));
|
|
||||||
given(permissionsManager.hasPermission(player1, PlayerPermission.VERIFICATION_CODE)).willReturn(true);
|
|
||||||
String name2 = "StillLovingTests";
|
|
||||||
Player player2 = mockPlayerWithName(name2);
|
|
||||||
|
|
||||||
VerificationCodeManager codeManager = createCodeManager();
|
|
||||||
codeManager.verify(name2);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean test1 = codeManager.isVerificationRequired(player1);
|
|
||||||
boolean test2 = codeManager.isVerificationRequired(player2);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(test1, equalTo(true));
|
|
||||||
assertThat(test2, equalTo(false));
|
|
||||||
verify(dataSource, only()).getEmail(name1);
|
|
||||||
verify(permissionsManager, only()).hasPermission(player1, PlayerPermission.VERIFICATION_CODE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotRequireVerificationIfEmailSettingsAreIncomplete() {
|
|
||||||
// given
|
|
||||||
given(emailService.hasAllInformation()).willReturn(false);
|
|
||||||
VerificationCodeManager codeManager = createCodeManager();
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = codeManager.isVerificationRequired(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(false));
|
|
||||||
verifyNoInteractions(permissionsManager, dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotRequireVerificationForMissingPermission() {
|
|
||||||
// given
|
|
||||||
Player player = mockPlayerWithName("ILoveTests");
|
|
||||||
given(permissionsManager.hasPermission(player, PlayerPermission.VERIFICATION_CODE)).willReturn(false);
|
|
||||||
VerificationCodeManager codeManager = createCodeManager();
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = codeManager.isVerificationRequired(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(false));
|
|
||||||
verify(permissionsManager).hasPermission(player, PlayerPermission.VERIFICATION_CODE);
|
|
||||||
verifyNoInteractions(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGenerateCode() {
|
|
||||||
// given
|
|
||||||
String player = "ILoveTests";
|
|
||||||
String email = "ilovetests@test.com";
|
|
||||||
given(dataSource.getEmail(player)).willReturn(DataSourceValueImpl.of(email));
|
|
||||||
VerificationCodeManager codeManager1 = createCodeManager();
|
|
||||||
VerificationCodeManager codeManager2 = createCodeManager();
|
|
||||||
codeManager2.codeExistOrGenerateNew(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean test1 = codeManager1.hasCode(player);
|
|
||||||
boolean test2 = codeManager2.hasCode(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(test1, equalTo(false));
|
|
||||||
assertThat(test2, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRequireCode() {
|
|
||||||
// given
|
|
||||||
String player = "ILoveTests";
|
|
||||||
String email = "ilovetests@test.com";
|
|
||||||
given(dataSource.getEmail(player)).willReturn(DataSourceValueImpl.of(email));
|
|
||||||
VerificationCodeManager codeManager1 = createCodeManager();
|
|
||||||
VerificationCodeManager codeManager2 = createCodeManager();
|
|
||||||
codeManager2.codeExistOrGenerateNew(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean test1 = codeManager1.isCodeRequired(player);
|
|
||||||
boolean test2 = codeManager2.isCodeRequired(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(test1, equalTo(false));
|
|
||||||
assertThat(test2, equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldVerifyCode() {
|
|
||||||
// given
|
|
||||||
String player = "ILoveTests";
|
|
||||||
String code = "193458";
|
|
||||||
String email = "ilovetests@test.com";
|
|
||||||
given(dataSource.getEmail(player)).willReturn(DataSourceValueImpl.of(email));
|
|
||||||
VerificationCodeManager codeManager1 = createCodeManager();
|
|
||||||
VerificationCodeManager codeManager2 = createCodeManager();
|
|
||||||
codeManager1.codeExistOrGenerateNew(player);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean test1 = codeManager1.checkCode(player, code);
|
|
||||||
boolean test2 = codeManager2.checkCode(player, code);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(test1, equalTo(false));
|
|
||||||
assertThat(test2, equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
private VerificationCodeManager createCodeManager() {
|
|
||||||
return new VerificationCodeManager(settings, dataSource, emailService, permissionsManager);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Player mockPlayerWithName(String name) {
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
return player;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,69 +0,0 @@
|
|||||||
package fr.xephi.authme.data.auth;
|
|
||||||
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import static org.hamcrest.MatcherAssert.assertThat;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link PlayerAuth} and its builder.
|
|
||||||
*/
|
|
||||||
public class PlayerAuthTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldRemoveDatabaseDefaults() {
|
|
||||||
// given / when
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("Bobby")
|
|
||||||
.lastLogin(0L)
|
|
||||||
.lastIp("127.0.0.1")
|
|
||||||
.email("your@email.com")
|
|
||||||
.build();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(auth.getNickname(), equalTo("bobby"));
|
|
||||||
assertThat(auth.getLastLogin(), nullValue());
|
|
||||||
// Note ljacqu 20171020: Although 127.0.0.1 is the default value, we need to keep it because it might
|
|
||||||
// legitimately be the resolved IP of a player
|
|
||||||
assertThat(auth.getLastIp(), equalTo("127.0.0.1"));
|
|
||||||
assertThat(auth.getEmail(), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldThrowForMissingName() {
|
|
||||||
try {
|
|
||||||
// given / when
|
|
||||||
PlayerAuth.builder()
|
|
||||||
.email("test@example.org")
|
|
||||||
.groupId(3)
|
|
||||||
.build();
|
|
||||||
|
|
||||||
// then
|
|
||||||
fail("Expected exception to be thrown");
|
|
||||||
} catch (NullPointerException e) {
|
|
||||||
// all good
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCreatePlayerAuthWithNullValues() {
|
|
||||||
// given / when
|
|
||||||
PlayerAuth auth = PlayerAuth.builder()
|
|
||||||
.name("Charlie")
|
|
||||||
.email(null)
|
|
||||||
.lastLogin(null)
|
|
||||||
.lastIp(null)
|
|
||||||
.groupId(19)
|
|
||||||
.locPitch(123.004f)
|
|
||||||
.build();
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(auth.getEmail(), nullValue());
|
|
||||||
assertThat(auth.getLastLogin(), nullValue());
|
|
||||||
assertThat(auth.getLastIp(), nullValue());
|
|
||||||
assertThat(auth.getGroupId(), equalTo(19));
|
|
||||||
assertThat(auth.getPitch(), equalTo(123.004f));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,174 +0,0 @@
|
|||||||
package fr.xephi.authme.data.captcha;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import fr.xephi.authme.util.expiring.TimedCounter;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.util.Locale;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.AuthMeMatchers.stringWithLength;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link LoginCaptchaManager}.
|
|
||||||
*/
|
|
||||||
public class LoginCaptchaManagerTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAddCounts() {
|
|
||||||
// given
|
|
||||||
Settings settings = mockSettings(3, 4);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
String player = "tester";
|
|
||||||
|
|
||||||
// when
|
|
||||||
for (int i = 0; i < 2; ++i) {
|
|
||||||
manager.increaseLoginFailureCount(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(manager.isCaptchaRequired(player), equalTo(false));
|
|
||||||
manager.increaseLoginFailureCount(player);
|
|
||||||
assertThat(manager.isCaptchaRequired(player.toUpperCase(Locale.ROOT)), equalTo(true));
|
|
||||||
assertThat(manager.isCaptchaRequired("otherPlayer"), equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCreateAndCheckCaptcha() {
|
|
||||||
// given
|
|
||||||
String name = "Miner";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
Settings settings = mockSettings(1, 4);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
String captchaCode = manager.getCaptchaCodeOrGenerateNew(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = manager.checkCode(player, captchaCode);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(captchaCode, stringWithLength(4));
|
|
||||||
assertThat(result, equalTo(true));
|
|
||||||
// Supplying correct code should clear the entry, and a code should be invalid if no entry is present
|
|
||||||
assertThat(manager.checkCode(player, "bogus"), equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGenerateNewCodeOnFailure() {
|
|
||||||
// given
|
|
||||||
String name = "Tarheel";
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn(name);
|
|
||||||
Settings settings = mockSettings(1, 9);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
String captchaCode = manager.getCaptchaCodeOrGenerateNew(name);
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean result = manager.checkCode(player, "wrongcode");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(captchaCode, stringWithLength(9));
|
|
||||||
assertThat(result, equalTo(false));
|
|
||||||
assertThat(manager.getCaptchaCodeOrGenerateNew(name), not(equalTo(captchaCode)));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveSameCodeAfterGeneration() {
|
|
||||||
// given
|
|
||||||
String player = "Tester";
|
|
||||||
Settings settings = mockSettings(1, 5);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
String code1 = manager.getCaptchaCodeOrGenerateNew(player);
|
|
||||||
String code2 = manager.getCaptchaCodeOrGenerateNew(player);
|
|
||||||
String code3 = manager.getCaptchaCodeOrGenerateNew(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(code1.length(), equalTo(5));
|
|
||||||
assertThat(code2, equalTo(code1));
|
|
||||||
assertThat(code3, equalTo(code1));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldIncreaseAndResetCount() {
|
|
||||||
// given
|
|
||||||
String player = "plaYer";
|
|
||||||
Settings settings = mockSettings(2, 3);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseLoginFailureCount(player);
|
|
||||||
manager.increaseLoginFailureCount(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(manager.isCaptchaRequired(player), equalTo(true));
|
|
||||||
assertHasCount(manager, player, 2);
|
|
||||||
|
|
||||||
// when 2
|
|
||||||
manager.resetLoginFailureCount(player);
|
|
||||||
|
|
||||||
// then 2
|
|
||||||
assertThat(manager.isCaptchaRequired(player), equalTo(false));
|
|
||||||
assertHasCount(manager, player, 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotIncreaseCountForDisabledCaptcha() {
|
|
||||||
// given
|
|
||||||
String player = "someone_";
|
|
||||||
Settings settings = mockSettings(1, 3);
|
|
||||||
given(settings.getProperty(SecuritySettings.ENABLE_LOGIN_FAILURE_CAPTCHA)).willReturn(false);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseLoginFailureCount(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(manager.isCaptchaRequired(player), equalTo(false));
|
|
||||||
assertHasCount(manager, player, 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotCheckCountIfCaptchaIsDisabled() {
|
|
||||||
// given
|
|
||||||
String player = "Robert001";
|
|
||||||
Settings settings = mockSettings(1, 5);
|
|
||||||
LoginCaptchaManager manager = new LoginCaptchaManager(settings);
|
|
||||||
given(settings.getProperty(SecuritySettings.ENABLE_LOGIN_FAILURE_CAPTCHA)).willReturn(false);
|
|
||||||
|
|
||||||
// when
|
|
||||||
manager.increaseLoginFailureCount(player);
|
|
||||||
// assumptions
|
|
||||||
assertThat(manager.isCaptchaRequired(player), equalTo(true));
|
|
||||||
assertHasCount(manager, player, 1);
|
|
||||||
// end assumptions
|
|
||||||
manager.reload(settings);
|
|
||||||
boolean result = manager.isCaptchaRequired(player);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(result, equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Settings mockSettings(int maxTries, int captchaLength) {
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(SecuritySettings.ENABLE_LOGIN_FAILURE_CAPTCHA)).willReturn(true);
|
|
||||||
given(settings.getProperty(SecuritySettings.MAX_LOGIN_TRIES_BEFORE_CAPTCHA)).willReturn(maxTries);
|
|
||||||
given(settings.getProperty(SecuritySettings.CAPTCHA_LENGTH)).willReturn(captchaLength);
|
|
||||||
given(settings.getProperty(SecuritySettings.CAPTCHA_COUNT_MINUTES_BEFORE_RESET)).willReturn(30);
|
|
||||||
return settings;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void assertHasCount(LoginCaptchaManager manager, String player, Integer count) {
|
|
||||||
TimedCounter<String> playerCounts = ReflectionTestUtils
|
|
||||||
.getFieldValue(LoginCaptchaManager.class, manager, "playerCounts");
|
|
||||||
assertThat(playerCounts.get(player.toLowerCase(Locale.ROOT)), equalTo(count));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,93 +0,0 @@
|
|||||||
package fr.xephi.authme.data.captcha;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ReflectionTestUtils;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import fr.xephi.authme.util.expiring.ExpiringMap;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.AuthMeMatchers.stringWithLength;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link RegistrationCaptchaManager}.
|
|
||||||
*/
|
|
||||||
public class RegistrationCaptchaManagerTest {
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldBeDisabled() {
|
|
||||||
// given
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
// Return false first time, and true after that
|
|
||||||
given(settings.getProperty(SecuritySettings.ENABLE_CAPTCHA_FOR_REGISTRATION))
|
|
||||||
.willReturn(false).willReturn(true);
|
|
||||||
given(settings.getProperty(SecuritySettings.CAPTCHA_LENGTH)).willReturn(12);
|
|
||||||
|
|
||||||
// when
|
|
||||||
RegistrationCaptchaManager captchaManager1 = new RegistrationCaptchaManager(settings);
|
|
||||||
RegistrationCaptchaManager captchaManager2 = new RegistrationCaptchaManager(settings);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(captchaManager1.isCaptchaRequired("bob"), equalTo(false));
|
|
||||||
assertThat(captchaManager2.isCaptchaRequired("bob"), equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldVerifyCodeSuccessfully() {
|
|
||||||
// given
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(SecuritySettings.ENABLE_CAPTCHA_FOR_REGISTRATION)).willReturn(true);
|
|
||||||
given(settings.getProperty(SecuritySettings.CAPTCHA_LENGTH)).willReturn(12);
|
|
||||||
|
|
||||||
String captcha = "abc3";
|
|
||||||
RegistrationCaptchaManager captchaManager = new RegistrationCaptchaManager(settings);
|
|
||||||
getCodeMap(captchaManager).put("test", captcha);
|
|
||||||
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn("TeSt");
|
|
||||||
|
|
||||||
// when
|
|
||||||
boolean isSuccessful = captchaManager.checkCode(player, captcha);
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(isSuccessful, equalTo(true));
|
|
||||||
assertThat(getCodeMap(captchaManager).isEmpty(), equalTo(true));
|
|
||||||
assertThat(captchaManager.isCaptchaRequired("test"), equalTo(false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldGenerateAndRetrieveCode() {
|
|
||||||
// given
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(SecuritySettings.ENABLE_CAPTCHA_FOR_REGISTRATION)).willReturn(true);
|
|
||||||
int captchaLength = 9;
|
|
||||||
given(settings.getProperty(SecuritySettings.CAPTCHA_LENGTH)).willReturn(captchaLength);
|
|
||||||
RegistrationCaptchaManager captchaManager = new RegistrationCaptchaManager(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
String captcha1 = captchaManager.getCaptchaCodeOrGenerateNew("toast");
|
|
||||||
String captcha2 = captchaManager.getCaptchaCodeOrGenerateNew("Toast");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(captcha1, equalTo(captcha2));
|
|
||||||
assertThat(captcha1, stringWithLength(captchaLength));
|
|
||||||
|
|
||||||
// given (2)
|
|
||||||
Player player = mock(Player.class);
|
|
||||||
given(player.getName()).willReturn("toast");
|
|
||||||
|
|
||||||
// when (2) / then (2)
|
|
||||||
assertThat(captchaManager.checkCode(player, captcha1), equalTo(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
private static ExpiringMap<String, String> getCodeMap(RegistrationCaptchaManager captchaManager) {
|
|
||||||
CaptchaCodeStorage captchaStorage = ReflectionTestUtils.getFieldValue(
|
|
||||||
RegistrationCaptchaManager.class, captchaManager, "captchaCodeStorage");
|
|
||||||
return ReflectionTestUtils.getFieldValue(CaptchaCodeStorage.class, captchaStorage, "captchaCodes");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user