authhandler_test.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. package handler
  2. import (
  3. "bufio"
  4. "net"
  5. "net/http"
  6. "net/http/httptest"
  7. "testing"
  8. "time"
  9. "github.com/golang-jwt/jwt/v4"
  10. "github.com/stretchr/testify/assert"
  11. )
  12. func TestAuthHandlerFailed(t *testing.T) {
  13. req := httptest.NewRequest(http.MethodGet, "http://localhost", http.NoBody)
  14. handler := Authorize("B63F477D-BBA3-4E52-96D3-C0034C27694A", WithUnauthorizedCallback(
  15. func(w http.ResponseWriter, r *http.Request, err error) {
  16. assert.NotNil(t, err)
  17. w.Header().Set("X-Test", err.Error())
  18. w.WriteHeader(http.StatusUnauthorized)
  19. _, err = w.Write([]byte("content"))
  20. assert.Nil(t, err)
  21. }))(
  22. http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  23. w.WriteHeader(http.StatusOK)
  24. }))
  25. resp := httptest.NewRecorder()
  26. handler.ServeHTTP(resp, req)
  27. assert.Equal(t, http.StatusUnauthorized, resp.Code)
  28. }
  29. func TestAuthHandler(t *testing.T) {
  30. const key = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
  31. req := httptest.NewRequest(http.MethodGet, "http://localhost", http.NoBody)
  32. token, err := buildToken(key, map[string]any{
  33. "key": "value",
  34. }, 3600)
  35. assert.Nil(t, err)
  36. req.Header.Set("Authorization", "Bearer "+token)
  37. handler := Authorize(key)(
  38. http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  39. w.Header().Set("X-Test", "test")
  40. _, err := w.Write([]byte("content"))
  41. assert.Nil(t, err)
  42. flusher, ok := w.(http.Flusher)
  43. assert.True(t, ok)
  44. flusher.Flush()
  45. }))
  46. resp := httptest.NewRecorder()
  47. handler.ServeHTTP(resp, req)
  48. assert.Equal(t, http.StatusOK, resp.Code)
  49. assert.Equal(t, "test", resp.Header().Get("X-Test"))
  50. assert.Equal(t, "content", resp.Body.String())
  51. }
  52. func TestAuthHandlerWithPrevSecret(t *testing.T) {
  53. const (
  54. key = "14F17379-EB8F-411B-8F12-6929002DCA76"
  55. prevKey = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
  56. )
  57. req := httptest.NewRequest(http.MethodGet, "http://localhost", http.NoBody)
  58. token, err := buildToken(key, map[string]any{
  59. "key": "value",
  60. }, 3600)
  61. assert.Nil(t, err)
  62. req.Header.Set("Authorization", "Bearer "+token)
  63. handler := Authorize(key, WithPrevSecret(prevKey))(
  64. http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  65. w.Header().Set("X-Test", "test")
  66. _, err := w.Write([]byte("content"))
  67. assert.Nil(t, err)
  68. }))
  69. resp := httptest.NewRecorder()
  70. handler.ServeHTTP(resp, req)
  71. assert.Equal(t, http.StatusOK, resp.Code)
  72. assert.Equal(t, "test", resp.Header().Get("X-Test"))
  73. assert.Equal(t, "content", resp.Body.String())
  74. }
  75. func TestAuthHandler_NilError(t *testing.T) {
  76. req := httptest.NewRequest(http.MethodGet, "http://localhost", http.NoBody)
  77. resp := httptest.NewRecorder()
  78. assert.NotPanics(t, func() {
  79. unauthorized(resp, req, nil, nil)
  80. })
  81. }
  82. func buildToken(secretKey string, payloads map[string]any, seconds int64) (string, error) {
  83. now := time.Now().Unix()
  84. claims := make(jwt.MapClaims)
  85. claims["exp"] = now + seconds
  86. claims["iat"] = now
  87. for k, v := range payloads {
  88. claims[k] = v
  89. }
  90. token := jwt.New(jwt.SigningMethodHS256)
  91. token.Claims = claims
  92. return token.SignedString([]byte(secretKey))
  93. }
  94. type mockedHijackable struct {
  95. *httptest.ResponseRecorder
  96. }
  97. func (m mockedHijackable) Hijack() (net.Conn, *bufio.ReadWriter, error) {
  98. return nil, nil, nil
  99. }