Commit 433dd4be by fwkz

Fixing search's command completer tests

parent 930c1b3a
...@@ -457,7 +457,7 @@ class RoutersploitInterpreter(BaseInterpreter): ...@@ -457,7 +457,7 @@ class RoutersploitInterpreter(BaseInterpreter):
def command_exec(self, *args, **kwargs): def command_exec(self, *args, **kwargs):
os.system(args[0]) os.system(args[0])
def command_search(self, *args, **kwargs): def command_search(self, *args, **kwargs): # TODO cover with unit tests
for arg in args: for arg in args:
matches = [s for s in self.modules if arg in s] matches = [s for s in self.modules if arg in s]
for match in matches: for match in matches:
......
...@@ -89,7 +89,8 @@ class RoutersploitCompleterTest(RoutersploitTestCase): ...@@ -89,7 +89,8 @@ class RoutersploitCompleterTest(RoutersploitTestCase):
self.set_module() self.set_module()
self.rsf.send("\t\t") self.rsf.send("\t\t")
self.assertPrompt( self.assertPrompt(
'\r\n', 'back exec help search setg use \r\n'
'check exit run set show \r\n',
self.module_prompt('FTP Bruteforce') self.module_prompt('FTP Bruteforce')
) )
...@@ -117,6 +118,14 @@ class RoutersploitCompleterTest(RoutersploitTestCase): ...@@ -117,6 +118,14 @@ class RoutersploitCompleterTest(RoutersploitTestCase):
'run' 'run'
) )
def test_complete_search(self):
self.set_module()
self.rsf.send("sea\t")
self.assertPrompt(
self.module_prompt('FTP Bruteforce'),
'search ',
)
def test_complete_set_raw(self): def test_complete_set_raw(self):
self.set_module() self.set_module()
self.rsf.send("s\t\t") self.rsf.send("s\t\t")
...@@ -145,7 +154,8 @@ class RoutersploitCompleterTest(RoutersploitTestCase): ...@@ -145,7 +154,8 @@ class RoutersploitCompleterTest(RoutersploitTestCase):
self.set_module() self.set_module()
self.rsf.send("set \t\t") self.rsf.send("set \t\t")
self.assertPrompt( self.assertPrompt(
'passwords stop_on_success threads verbosity\r\nport target usernames \r\n', 'passwords stop_on_success threads verbosity\r\n'
'port target usernames \r\n',
self.module_prompt('FTP Bruteforce'), self.module_prompt('FTP Bruteforce'),
'set ', 'set ',
) )
...@@ -162,7 +172,8 @@ class RoutersploitCompleterTest(RoutersploitTestCase): ...@@ -162,7 +172,8 @@ class RoutersploitCompleterTest(RoutersploitTestCase):
self.set_module() self.set_module()
self.rsf.send("setg \t\t") self.rsf.send("setg \t\t")
self.assertPrompt( self.assertPrompt(
'passwords stop_on_success threads verbosity\r\nport target usernames \r\n', 'passwords stop_on_success threads verbosity\r\n'
'port target usernames \r\n',
self.module_prompt('FTP Bruteforce'), self.module_prompt('FTP Bruteforce'),
'setg ', 'setg ',
) )
...@@ -182,8 +193,9 @@ class RoutersploitCompleterTest(RoutersploitTestCase): ...@@ -182,8 +193,9 @@ class RoutersploitCompleterTest(RoutersploitTestCase):
self.set_module() self.set_module()
self.rsf.send("\t\t") self.rsf.send("\t\t")
self.assertPrompt( self.assertPrompt(
"\r\n", "back exec help search setg use \r\n"
self.module_prompt('FTP Bruteforce') "check exit run set show \r\n",
self.module_prompt('FTP Bruteforce'),
) )
def test_complete_unsetg_2(self): def test_complete_unsetg_2(self):
...@@ -194,8 +206,9 @@ class RoutersploitCompleterTest(RoutersploitTestCase): ...@@ -194,8 +206,9 @@ class RoutersploitCompleterTest(RoutersploitTestCase):
self.rsf.send("setg target foo\r\n") self.rsf.send("setg target foo\r\n")
self.rsf.send("\t\t") self.rsf.send("\t\t")
self.assertPrompt( self.assertPrompt(
'\r\n', 'back exec help search setg unsetg \r\n'
self.module_prompt('FTP Bruteforce') 'check exit run set show use \r\n',
self.module_prompt('FTP Bruteforce'),
) )
def test_complete_unsetg_3(self): def test_complete_unsetg_3(self):
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment