2017-01-19 15:08:56 +01:00
|
|
|
package alicloud
|
|
|
|
|
|
|
|
import "testing"
|
|
|
|
|
|
|
|
func TestValidateInstancePort(t *testing.T) {
|
|
|
|
validPorts := []int{1, 22, 80, 100, 8088, 65535}
|
|
|
|
for _, v := range validPorts {
|
|
|
|
_, errors := validateInstancePort(v, "instance_port")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance port number between 1 and 65535: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidPorts := []int{-10, -1, 0}
|
|
|
|
for _, v := range invalidPorts {
|
|
|
|
_, errors := validateInstancePort(v, "instance_port")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance port number", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInstanceProtocol(t *testing.T) {
|
|
|
|
validProtocals := []string{"http", "tcp", "https", "udp"}
|
|
|
|
for _, v := range validProtocals {
|
|
|
|
_, errors := validateInstanceProtocol(v, "instance_protocal")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance protocol: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidProtocals := []string{"HTTP", "abc", "ecmp", "dubbo"}
|
|
|
|
for _, v := range invalidProtocals {
|
|
|
|
_, errors := validateInstanceProtocol(v, "instance_protocal")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance protocol", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInstanceDiskCategory(t *testing.T) {
|
|
|
|
validDiskCategory := []string{"cloud", "cloud_efficiency", "cloud_ssd"}
|
|
|
|
for _, v := range validDiskCategory {
|
|
|
|
_, errors := validateDiskCategory(v, "instance_disk_category")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance disk category: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidDiskCategory := []string{"all", "ephemeral", "ephemeral_ssd", "ALL", "efficiency"}
|
|
|
|
for _, v := range invalidDiskCategory {
|
|
|
|
_, errors := validateDiskCategory(v, "instance_disk_category")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance disk category", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInstanceName(t *testing.T) {
|
|
|
|
validInstanceName := []string{"hi", "hi http://", "some word + any word &", "http", "中文"}
|
|
|
|
for _, v := range validInstanceName {
|
|
|
|
_, errors := validateInstanceName(v, "instance_name")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance name: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidInstanceName := []string{"y", "http://", "https://", "+"}
|
|
|
|
for _, v := range invalidInstanceName {
|
|
|
|
_, errors := validateInstanceName(v, "instance_name")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance name", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInstanceDescription(t *testing.T) {
|
|
|
|
validInstanceDescription := []string{"hi", "hi http://", "some word + any word &", "http://", "中文"}
|
|
|
|
for _, v := range validInstanceDescription {
|
|
|
|
_, errors := validateInstanceDescription(v, "instance_description")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance description: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidvalidInstanceDescription := []string{"y", ""}
|
|
|
|
for _, v := range invalidvalidInstanceDescription {
|
|
|
|
_, errors := validateInstanceName(v, "instance_description")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance description", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityGroupName(t *testing.T) {
|
|
|
|
validSecurityGroupName := []string{"hi", "hi http://", "some word + any word &", "http", "中文", "12345"}
|
|
|
|
for _, v := range validSecurityGroupName {
|
|
|
|
_, errors := validateSecurityGroupName(v, "security_group_name")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid security group name: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSecurityGroupName := []string{"y", "http://", "https://", "+"}
|
|
|
|
for _, v := range invalidSecurityGroupName {
|
|
|
|
_, errors := validateSecurityGroupName(v, "security_group_name")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid security group name", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityGroupDescription(t *testing.T) {
|
|
|
|
validSecurityGroupDescription := []string{"hi", "hi http://", "some word + any word &", "http://", "中文"}
|
|
|
|
for _, v := range validSecurityGroupDescription {
|
|
|
|
_, errors := validateSecurityGroupDescription(v, "security_group_description")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid security group description: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSecurityGroupDescription := []string{"y", ""}
|
|
|
|
for _, v := range invalidSecurityGroupDescription {
|
|
|
|
_, errors := validateSecurityGroupDescription(v, "security_group_description")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid security group description", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityRuleType(t *testing.T) {
|
|
|
|
validSecurityRuleType := []string{"ingress", "egress"}
|
|
|
|
for _, v := range validSecurityRuleType {
|
|
|
|
_, errors := validateSecurityRuleType(v, "security_rule_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid security rule type: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSecurityRuleType := []string{"y", "gress", "in", "out"}
|
|
|
|
for _, v := range invalidSecurityRuleType {
|
|
|
|
_, errors := validateSecurityRuleType(v, "security_rule_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid security rule type", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityRuleIpProtocol(t *testing.T) {
|
|
|
|
validIpProtocol := []string{"tcp", "udp", "icmp", "gre", "all"}
|
|
|
|
for _, v := range validIpProtocol {
|
|
|
|
_, errors := validateSecurityRuleIpProtocol(v, "security_rule_ip_protocol")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid ip protocol: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidIpProtocol := []string{"y", "ecmp", "http", "https"}
|
|
|
|
for _, v := range invalidIpProtocol {
|
|
|
|
_, errors := validateSecurityRuleIpProtocol(v, "security_rule_ip_protocol")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid ip protocol", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityRuleNicType(t *testing.T) {
|
|
|
|
validRuleNicType := []string{"intranet", "internet"}
|
|
|
|
for _, v := range validRuleNicType {
|
|
|
|
_, errors := validateSecurityRuleNicType(v, "security_rule_nic_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid nic type: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidRuleNicType := []string{"inter", "ecmp", "http", "https"}
|
|
|
|
for _, v := range invalidRuleNicType {
|
|
|
|
_, errors := validateSecurityRuleNicType(v, "security_rule_nic_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid nic type", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityRulePolicy(t *testing.T) {
|
|
|
|
validRulePolicy := []string{"accept", "drop"}
|
|
|
|
for _, v := range validRulePolicy {
|
|
|
|
_, errors := validateSecurityRulePolicy(v, "security_rule_policy")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid security rule policy: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidRulePolicy := []string{"inter", "ecmp", "http", "https"}
|
|
|
|
for _, v := range invalidRulePolicy {
|
|
|
|
_, errors := validateSecurityRulePolicy(v, "security_rule_policy")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid security rule policy", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSecurityRulePriority(t *testing.T) {
|
|
|
|
validPriority := []int{1, 50, 100}
|
|
|
|
for _, v := range validPriority {
|
|
|
|
_, errors := validateSecurityPriority(v, "security_rule_priority")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid security rule priority: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidPriority := []int{-1, 0, 101}
|
|
|
|
for _, v := range invalidPriority {
|
|
|
|
_, errors := validateSecurityPriority(v, "security_rule_priority")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid security rule priority", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateCIDRNetworkAddress(t *testing.T) {
|
|
|
|
validCIDRNetworkAddress := []string{"192.168.10.0/24", "0.0.0.0/0", "10.121.10.0/24"}
|
|
|
|
for _, v := range validCIDRNetworkAddress {
|
|
|
|
_, errors := validateCIDRNetworkAddress(v, "cidr_network_address")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid cidr network address: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidCIDRNetworkAddress := []string{"1.2.3.4", "0x38732/21"}
|
|
|
|
for _, v := range invalidCIDRNetworkAddress {
|
|
|
|
_, errors := validateCIDRNetworkAddress(v, "cidr_network_address")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid cidr network address", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateRouteEntryNextHopType(t *testing.T) {
|
|
|
|
validNexthopType := []string{"Instance", "Tunnel"}
|
|
|
|
for _, v := range validNexthopType {
|
|
|
|
_, errors := validateRouteEntryNextHopType(v, "route_entry_nexthop_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid route entry nexthop type: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidNexthopType := []string{"ri", "vpc"}
|
|
|
|
for _, v := range invalidNexthopType {
|
|
|
|
_, errors := validateRouteEntryNextHopType(v, "route_entry_nexthop_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid route entry nexthop type", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSwitchCIDRNetworkAddress(t *testing.T) {
|
|
|
|
validSwitchCIDRNetworkAddress := []string{"192.168.10.0/24", "0.0.0.0/16", "127.0.0.0/29", "10.121.10.0/24"}
|
|
|
|
for _, v := range validSwitchCIDRNetworkAddress {
|
|
|
|
_, errors := validateSwitchCIDRNetworkAddress(v, "switch_cidr_network_address")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid switch cidr network address: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSwitchCIDRNetworkAddress := []string{"1.2.3.4", "0x38732/21", "10.121.10.0/15", "10.121.10.0/30", "256.121.10.0/22"}
|
|
|
|
for _, v := range invalidSwitchCIDRNetworkAddress {
|
|
|
|
_, errors := validateSwitchCIDRNetworkAddress(v, "switch_cidr_network_address")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid switch cidr network address", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateIoOptimized(t *testing.T) {
|
|
|
|
validIoOptimized := []string{"", "none", "optimized"}
|
|
|
|
for _, v := range validIoOptimized {
|
|
|
|
_, errors := validateIoOptimized(v, "ioOptimized")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid IoOptimized value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidIoOptimized := []string{"true", "ioOptimized"}
|
|
|
|
for _, v := range invalidIoOptimized {
|
|
|
|
_, errors := validateIoOptimized(v, "ioOptimized")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid IoOptimized value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInstanceNetworkType(t *testing.T) {
|
|
|
|
validInstanceNetworkType := []string{"", "classic", "vpc"}
|
|
|
|
for _, v := range validInstanceNetworkType {
|
|
|
|
_, errors := validateInstanceNetworkType(v, "instance_network_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance network type value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidInstanceNetworkType := []string{"Classic", "vswitch", "123"}
|
|
|
|
for _, v := range invalidInstanceNetworkType {
|
|
|
|
_, errors := validateInstanceNetworkType(v, "instance_network_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance network type value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInstanceChargeType(t *testing.T) {
|
|
|
|
validInstanceChargeType := []string{"", "PrePaid", "PostPaid"}
|
|
|
|
for _, v := range validInstanceChargeType {
|
|
|
|
_, errors := validateInstanceChargeType(v, "instance_charge_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid instance charge type value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidInstanceChargeType := []string{"prepay", "yearly", "123"}
|
|
|
|
for _, v := range invalidInstanceChargeType {
|
|
|
|
_, errors := validateInstanceChargeType(v, "instance_charge_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid instance charge type value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInternetChargeType(t *testing.T) {
|
|
|
|
validInternetChargeType := []string{"", "PayByBandwidth", "PayByTraffic"}
|
|
|
|
for _, v := range validInternetChargeType {
|
|
|
|
_, errors := validateInternetChargeType(v, "internet_charge_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid internet charge type value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidInternetChargeType := []string{"paybybandwidth", "paybytraffic", "123"}
|
|
|
|
for _, v := range invalidInternetChargeType {
|
|
|
|
_, errors := validateInternetChargeType(v, "internet_charge_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid internet charge type value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateInternetMaxBandWidthOut(t *testing.T) {
|
|
|
|
validInternetMaxBandWidthOut := []int{1, 22, 100}
|
|
|
|
for _, v := range validInternetMaxBandWidthOut {
|
|
|
|
_, errors := validateInternetMaxBandWidthOut(v, "internet_max_bandwidth_out")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid internet max bandwidth out value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidInternetMaxBandWidthOut := []int{-2, 0, 101, 123}
|
|
|
|
for _, v := range invalidInternetMaxBandWidthOut {
|
|
|
|
_, errors := validateInternetMaxBandWidthOut(v, "internet_max_bandwidth_out")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid internet max bandwidth out value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSlbName(t *testing.T) {
|
|
|
|
validSlbName := []string{"h", "http://", "123", "hello, aliyun! "}
|
|
|
|
for _, v := range validSlbName {
|
|
|
|
_, errors := validateSlbName(v, "slb_name")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid slb name: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// todo: add invalid case
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSlbInternetChargeType(t *testing.T) {
|
|
|
|
validSlbInternetChargeType := []string{"paybybandwidth", "paybytraffic"}
|
|
|
|
for _, v := range validSlbInternetChargeType {
|
|
|
|
_, errors := validateSlbInternetChargeType(v, "slb_internet_charge_type")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid slb internet charge type value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSlbInternetChargeType := []string{"PayByBandwidth", "PayByTraffic"}
|
|
|
|
for _, v := range invalidSlbInternetChargeType {
|
|
|
|
_, errors := validateSlbInternetChargeType(v, "slb_internet_charge_type")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid slb internet charge type value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSlbBandwidth(t *testing.T) {
|
|
|
|
validSlbBandwidth := []int{1, 22, 1000}
|
|
|
|
for _, v := range validSlbBandwidth {
|
|
|
|
_, errors := validateSlbBandwidth(v, "slb_bandwidth")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid slb bandwidth value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSlbBandwidth := []int{-2, 0, 1001}
|
|
|
|
for _, v := range invalidSlbBandwidth {
|
|
|
|
_, errors := validateSlbBandwidth(v, "slb_bandwidth")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid slb bandwidth value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateSlbListenerBandwidth(t *testing.T) {
|
|
|
|
validSlbListenerBandwidth := []int{-1, 1, 22, 1000}
|
|
|
|
for _, v := range validSlbListenerBandwidth {
|
|
|
|
_, errors := validateSlbListenerBandwidth(v, "slb_bandwidth")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid slb listener bandwidth value: %q", v, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidSlbListenerBandwidth := []int{-2, 0, -10, 1001}
|
|
|
|
for _, v := range invalidSlbListenerBandwidth {
|
|
|
|
_, errors := validateSlbListenerBandwidth(v, "slb_bandwidth")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid slb listener bandwidth value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-03-24 12:04:56 +01:00
|
|
|
|
|
|
|
func TestValidateAllowedStringValue(t *testing.T) {
|
|
|
|
exceptValues := []string{"aliyun", "alicloud", "alibaba"}
|
|
|
|
validValues := []string{"aliyun"}
|
|
|
|
for _, v := range validValues {
|
|
|
|
_, errors := validateAllowedStringValue(exceptValues)(v, "allowvalue")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid value in %#v: %q", v, exceptValues, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidValues := []string{"ali", "alidata", "terraform"}
|
|
|
|
for _, v := range invalidValues {
|
|
|
|
_, errors := validateAllowedStringValue(exceptValues)(v, "allowvalue")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateAllowedStringSplitValue(t *testing.T) {
|
|
|
|
exceptValues := []string{"aliyun", "alicloud", "alibaba"}
|
|
|
|
validValues := "aliyun,alicloud"
|
|
|
|
_, errors := validateAllowedSplitStringValue(exceptValues, ",")(validValues, "allowvalue")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid value in %#v: %q", validValues, exceptValues, errors)
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidValues := "ali,alidata"
|
|
|
|
_, invalidErr := validateAllowedSplitStringValue(exceptValues, ",")(invalidValues, "allowvalue")
|
|
|
|
if len(invalidErr) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid value", invalidValues)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateAllowedIntValue(t *testing.T) {
|
|
|
|
exceptValues := []int{1, 3, 5, 6}
|
|
|
|
validValues := []int{1, 3, 5, 6}
|
|
|
|
for _, v := range validValues {
|
|
|
|
_, errors := validateAllowedIntValue(exceptValues)(v, "allowvalue")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be a valid value in %#v: %q", v, exceptValues, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidValues := []int{0, 7, 10}
|
|
|
|
for _, v := range invalidValues {
|
|
|
|
_, errors := validateAllowedIntValue(exceptValues)(v, "allowvalue")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an invalid value", v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateIntegerInRange(t *testing.T) {
|
|
|
|
validIntegers := []int{-259, 0, 1, 5, 999}
|
|
|
|
min := -259
|
|
|
|
max := 999
|
|
|
|
for _, v := range validIntegers {
|
|
|
|
_, errors := validateIntegerInRange(min, max)(v, "name")
|
|
|
|
if len(errors) != 0 {
|
|
|
|
t.Fatalf("%q should be an integer in range (%d, %d): %q", v, min, max, errors)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
invalidIntegers := []int{-260, -99999, 1000, 25678}
|
|
|
|
for _, v := range invalidIntegers {
|
|
|
|
_, errors := validateIntegerInRange(min, max)(v, "name")
|
|
|
|
if len(errors) == 0 {
|
|
|
|
t.Fatalf("%q should be an integer outside range (%d, %d)", v, min, max)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|