forked from lorenzodonini/ocpp-go
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathauthorize_test.go
78 lines (72 loc) · 3.4 KB
/
authorize_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
package ocpp16_test
import (
"fmt"
"github.com/lorenzodonini/ocpp-go/ocpp1.6/core"
"github.com/lorenzodonini/ocpp-go/ocpp1.6/types"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
"time"
)
// Test
func (suite *OcppV16TestSuite) TestAuthorizeRequestValidation() {
t := suite.T()
var requestTable = []GenericTestEntry{
{core.AuthorizeRequest{IdTag: "12345"}, true},
{core.AuthorizeRequest{}, false},
{core.AuthorizeRequest{IdTag: ">20.................."}, false},
}
ExecuteGenericTestTable(t, requestTable)
}
func (suite *OcppV16TestSuite) TestAuthorizeConfirmationValidation() {
t := suite.T()
var confirmationTable = []GenericTestEntry{
{core.AuthorizeConfirmation{IdTagInfo: &types.IdTagInfo{ExpiryDate: types.NewDateTime(time.Now().Add(time.Hour * 8)), ParentIdTag: "00000", Status: types.AuthorizationStatusAccepted}}, true},
{core.AuthorizeConfirmation{IdTagInfo: &types.IdTagInfo{Status: "invalidAuthorizationStatus"}}, false},
{core.AuthorizeConfirmation{}, false},
}
ExecuteGenericTestTable(t, confirmationTable)
}
func (suite *OcppV16TestSuite) TestAuthorizeE2EMocked() {
t := suite.T()
wsId := "test_id"
messageId := defaultMessageId
wsUrl := "someUrl"
idTag := "tag1"
parentIdTag := "parentTag1"
status := types.AuthorizationStatusAccepted
expiryDate := types.NewDateTime(time.Now().Add(time.Hour * 8))
idTagInfo := types.IdTagInfo{ExpiryDate: expiryDate, ParentIdTag: parentIdTag, Status: status}
requestJson := fmt.Sprintf(`[2,"%v","%v",{"idTag":"%v"}]`, messageId, core.AuthorizeFeatureName, idTag)
responseJson := fmt.Sprintf(`[3,"%v",{"idTagInfo":{"expiryDate":"%v","parentIdTag":"%v","status":"%v"}}]`, messageId, expiryDate.FormatTimestamp(), parentIdTag, status)
authorizeConfirmation := core.NewAuthorizationConfirmation(&idTagInfo)
requestRaw := []byte(requestJson)
responseRaw := []byte(responseJson)
channel := NewMockWebSocket(wsId)
coreListener := MockCentralSystemCoreListener{}
coreListener.On("OnAuthorize", mock.AnythingOfType("string"), mock.Anything).Return(authorizeConfirmation, nil).Run(func(args mock.Arguments) {
request, ok := args.Get(1).(*core.AuthorizeRequest)
require.True(t, ok)
require.NotNil(t, request)
assert.Equal(t, idTag, request.IdTag)
})
setupDefaultCentralSystemHandlers(suite, coreListener, expectedCentralSystemOptions{clientId: wsId, rawWrittenMessage: responseRaw, forwardWrittenMessage: true})
setupDefaultChargePointHandlers(suite, nil, expectedChargePointOptions{serverUrl: wsUrl, clientId: wsId, createChannelOnStart: true, channel: channel, rawWrittenMessage: requestRaw, forwardWrittenMessage: true})
// Run Test
suite.centralSystem.Start(8887, "somePath")
err := suite.chargePoint.Start(wsUrl)
require.Nil(t, err)
confirmation, err := suite.chargePoint.Authorize(idTag)
require.Nil(t, err)
require.NotNil(t, confirmation)
assert.Equal(t, status, confirmation.IdTagInfo.Status)
assert.Equal(t, parentIdTag, confirmation.IdTagInfo.ParentIdTag)
assertDateTimeEquality(t, *expiryDate, *confirmation.IdTagInfo.ExpiryDate)
}
func (suite *OcppV16TestSuite) TestAuthorizeInvalidEndpoint() {
messageId := defaultMessageId
idTag := "tag1"
authorizeRequest := core.NewAuthorizationRequest(idTag)
requestJson := fmt.Sprintf(`[2,"%v","%v",{"idTag":"%v"}]`, messageId, core.AuthorizeFeatureName, idTag)
testUnsupportedRequestFromCentralSystem(suite, authorizeRequest, requestJson, messageId)
}