123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103 |
- package handler
- import (
- "net/http"
- "net/http/httptest"
- "testing"
- "time"
- "github.com/dgrijalva/jwt-go"
- "github.com/stretchr/testify/assert"
- )
- func TestAuthHandlerFailed(t *testing.T) {
- req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
- handler := Authorize("B63F477D-BBA3-4E52-96D3-C0034C27694A", WithUnauthorizedCallback(
- func(w http.ResponseWriter, r *http.Request, err error) {
- w.Header().Set("X-Test", "test")
- w.WriteHeader(http.StatusUnauthorized)
- _, err = w.Write([]byte("content"))
- assert.Nil(t, err)
- }))(
- http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(http.StatusOK)
- }))
- resp := httptest.NewRecorder()
- handler.ServeHTTP(resp, req)
- assert.Equal(t, http.StatusUnauthorized, resp.Code)
- }
- func TestAuthHandler(t *testing.T) {
- const key = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
- req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
- token, err := buildToken(key, map[string]interface{}{
- "key": "value",
- }, 3600)
- assert.Nil(t, err)
- req.Header.Set("Authorization", "Bearer "+token)
- handler := Authorize(key)(
- http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- w.Header().Set("X-Test", "test")
- _, err := w.Write([]byte("content"))
- assert.Nil(t, err)
- flusher, ok := w.(http.Flusher)
- assert.True(t, ok)
- flusher.Flush()
- }))
- resp := httptest.NewRecorder()
- handler.ServeHTTP(resp, req)
- assert.Equal(t, http.StatusOK, resp.Code)
- assert.Equal(t, "test", resp.Header().Get("X-Test"))
- assert.Equal(t, "content", resp.Body.String())
- }
- func TestAuthHandlerWithPrevSecret(t *testing.T) {
- const (
- key = "14F17379-EB8F-411B-8F12-6929002DCA76"
- prevKey = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
- )
- req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
- token, err := buildToken(key, map[string]interface{}{
- "key": "value",
- }, 3600)
- assert.Nil(t, err)
- req.Header.Set("Authorization", "Bearer "+token)
- handler := Authorize(key, WithPrevSecret(prevKey))(
- http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- w.Header().Set("X-Test", "test")
- _, err := w.Write([]byte("content"))
- assert.Nil(t, err)
- }))
- resp := httptest.NewRecorder()
- handler.ServeHTTP(resp, req)
- assert.Equal(t, http.StatusOK, resp.Code)
- assert.Equal(t, "test", resp.Header().Get("X-Test"))
- assert.Equal(t, "content", resp.Body.String())
- }
- func TestAuthHandler_NilError(t *testing.T) {
- req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
- resp := httptest.NewRecorder()
- assert.NotPanics(t, func() {
- unauthorized(resp, req, nil, nil)
- })
- }
- func buildToken(secretKey string, payloads map[string]interface{}, seconds int64) (string, error) {
- now := time.Now().Unix()
- claims := make(jwt.MapClaims)
- claims["exp"] = now + seconds
- claims["iat"] = now
- for k, v := range payloads {
- claims[k] = v
- }
- token := jwt.New(jwt.SigningMethodHS256)
- token.Claims = claims
- return token.SignedString([]byte(secretKey))
- }
|