You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
92 lines
2.6 KiB
Go
92 lines
2.6 KiB
Go
package handler
|
|
|
|
import (
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/dgrijalva/jwt-go"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestAuthHandlerFailed(t *testing.T) {
|
|
req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
|
|
handler := Authorize("B63F477D-BBA3-4E52-96D3-C0034C27694A", WithUnauthorizedCallback(
|
|
func(w http.ResponseWriter, r *http.Request, err error) {
|
|
w.Header().Set("X-Test", "test")
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
_, err = w.Write([]byte("content"))
|
|
assert.Nil(t, err)
|
|
}))(
|
|
http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
}))
|
|
|
|
resp := httptest.NewRecorder()
|
|
handler.ServeHTTP(resp, req)
|
|
assert.Equal(t, http.StatusUnauthorized, resp.Code)
|
|
}
|
|
|
|
func TestAuthHandler(t *testing.T) {
|
|
const key = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
|
|
req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
|
|
token, err := buildToken(key, map[string]interface{}{
|
|
"key": "value",
|
|
}, 3600)
|
|
assert.Nil(t, err)
|
|
req.Header.Set("Authorization", "Bearer "+token)
|
|
handler := Authorize(key)(
|
|
http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Set("X-Test", "test")
|
|
_, err := w.Write([]byte("content"))
|
|
assert.Nil(t, err)
|
|
}))
|
|
|
|
resp := httptest.NewRecorder()
|
|
handler.ServeHTTP(resp, req)
|
|
assert.Equal(t, http.StatusOK, resp.Code)
|
|
assert.Equal(t, "test", resp.Header().Get("X-Test"))
|
|
assert.Equal(t, "content", resp.Body.String())
|
|
}
|
|
|
|
func TestAuthHandlerWithPrevSecret(t *testing.T) {
|
|
const (
|
|
key = "14F17379-EB8F-411B-8F12-6929002DCA76"
|
|
prevKey = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
|
|
)
|
|
req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
|
|
token, err := buildToken(key, map[string]interface{}{
|
|
"key": "value",
|
|
}, 3600)
|
|
assert.Nil(t, err)
|
|
req.Header.Set("Authorization", "Bearer "+token)
|
|
handler := Authorize(key, WithPrevSecret(prevKey))(
|
|
http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Set("X-Test", "test")
|
|
_, err := w.Write([]byte("content"))
|
|
assert.Nil(t, err)
|
|
}))
|
|
|
|
resp := httptest.NewRecorder()
|
|
handler.ServeHTTP(resp, req)
|
|
assert.Equal(t, http.StatusOK, resp.Code)
|
|
assert.Equal(t, "test", resp.Header().Get("X-Test"))
|
|
assert.Equal(t, "content", resp.Body.String())
|
|
}
|
|
|
|
func buildToken(secretKey string, payloads map[string]interface{}, seconds int64) (string, error) {
|
|
now := time.Now().Unix()
|
|
claims := make(jwt.MapClaims)
|
|
claims["exp"] = now + seconds
|
|
claims["iat"] = now
|
|
for k, v := range payloads {
|
|
claims[k] = v
|
|
}
|
|
|
|
token := jwt.New(jwt.SigningMethodHS256)
|
|
token.Claims = claims
|
|
|
|
return token.SignedString([]byte(secretKey))
|
|
}
|