mirror of
https://github.com/kataras/iris.git
synced 2025-01-23 10:41:03 +01:00
b2fddc7d68
Former-commit-id: fe06c0e0f4d7e121c678ffda7ac702ae865abd00
130 lines
3.2 KiB
Go
130 lines
3.2 KiB
Go
// Package jwt_test contains simple Iris jwt tests. Most of the jwt functionality is already tested inside the jose package itself.
|
|
package jwt_test
|
|
|
|
import (
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/kataras/iris/v12"
|
|
"github.com/kataras/iris/v12/httptest"
|
|
"github.com/kataras/iris/v12/middleware/jwt"
|
|
)
|
|
|
|
type userClaims struct {
|
|
jwt.Claims
|
|
Username string
|
|
}
|
|
|
|
const testMaxAge = 3 * time.Second
|
|
|
|
// Random RSA verification and encryption.
|
|
func TestDefaultRSA(t *testing.T) {
|
|
j := jwt.DefaultRSA(testMaxAge)
|
|
t.Cleanup(func() {
|
|
os.Remove(jwt.SignFilename)
|
|
os.Remove(jwt.EncFilename)
|
|
})
|
|
testWriteVerifyToken(t, j)
|
|
}
|
|
|
|
// HMAC verification and encryption.
|
|
func TestDefaultHMAC(t *testing.T) {
|
|
j := jwt.DefaultHMAC(testMaxAge, "secret", "itsa16bytesecret")
|
|
testWriteVerifyToken(t, j)
|
|
}
|
|
|
|
func TestHMAC(t *testing.T) {
|
|
j, err := jwt.New(testMaxAge, jwt.HS256, []byte("secret"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = j.WithEncryption(jwt.A128GCM, jwt.DIRECT, []byte("itsa16bytesecret"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
testWriteVerifyToken(t, j)
|
|
}
|
|
|
|
// HMAC verification only (unecrypted).
|
|
func TestVerify(t *testing.T) {
|
|
j, err := jwt.New(testMaxAge, jwt.HS256, []byte("another secret"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
testWriteVerifyToken(t, j)
|
|
}
|
|
|
|
func testWriteVerifyToken(t *testing.T, j *jwt.JWT) {
|
|
t.Helper()
|
|
|
|
j.Extractors = append(j.Extractors, jwt.FromJSON("access_token"))
|
|
standardClaims := jwt.Claims{Issuer: "an-issuer", Audience: jwt.Audience{"an-audience"}}
|
|
expectedClaims := userClaims{
|
|
Claims: j.Expiry(standardClaims),
|
|
Username: "kataras",
|
|
}
|
|
|
|
app := iris.New()
|
|
app.Get("/auth", func(ctx iris.Context) {
|
|
j.WriteToken(ctx, expectedClaims)
|
|
})
|
|
|
|
app.Post("/restricted", func(ctx iris.Context) {
|
|
var claims userClaims
|
|
if err := j.VerifyToken(ctx, &claims); err != nil {
|
|
ctx.StopWithStatus(iris.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
ctx.JSON(claims)
|
|
})
|
|
|
|
app.Post("/restricted_middleware", j.Verify, func(ctx iris.Context) {
|
|
var claims userClaims
|
|
if err := jwt.ReadClaims(ctx, &claims); err != nil {
|
|
ctx.StopWithStatus(iris.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
ctx.JSON(claims)
|
|
})
|
|
|
|
e := httptest.New(t, app)
|
|
|
|
// Get token.
|
|
rawToken := e.GET("/auth").Expect().Status(httptest.StatusOK).Body().Raw()
|
|
if rawToken == "" {
|
|
t.Fatalf("empty token")
|
|
}
|
|
|
|
restrictedPaths := [...]string{"/restricted", "/restricted_middleware"}
|
|
|
|
now := time.Now()
|
|
for _, path := range restrictedPaths {
|
|
// Authorization Header.
|
|
e.POST(path).WithHeader("Authorization", "Bearer "+rawToken).Expect().
|
|
Status(httptest.StatusOK).JSON().Equal(expectedClaims)
|
|
|
|
// URL Query.
|
|
e.POST(path).WithQuery("token", rawToken).Expect().
|
|
Status(httptest.StatusOK).JSON().Equal(expectedClaims)
|
|
|
|
// JSON Body.
|
|
e.POST(path).WithJSON(iris.Map{"access_token": rawToken}).Expect().
|
|
Status(httptest.StatusOK).JSON().Equal(expectedClaims)
|
|
|
|
// Missing "Bearer".
|
|
e.POST(path).WithHeader("Authorization", rawToken).Expect().
|
|
Status(httptest.StatusUnauthorized)
|
|
}
|
|
expireRemDur := testMaxAge - time.Since(now)
|
|
|
|
// Expiration.
|
|
time.Sleep(expireRemDur /* -end */)
|
|
for _, path := range restrictedPaths {
|
|
e.POST(path).WithQuery("token", rawToken).Expect().Status(httptest.StatusUnauthorized)
|
|
}
|
|
}
|