mirror of
https://github.com/lordmathis/lemma.git
synced 2025-11-05 23:44:22 +00:00
Load or generate signing key from file
This commit is contained in:
@@ -1,7 +1,6 @@
|
||||
package db_test
|
||||
|
||||
import (
|
||||
"encoding/base64"
|
||||
"fmt"
|
||||
"strings"
|
||||
"testing"
|
||||
@@ -118,33 +117,6 @@ func TestSystemOperations(t *testing.T) {
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("EnsureJWTSecret", func(t *testing.T) {
|
||||
// First call should generate a new secret
|
||||
secret1, err := database.EnsureJWTSecret()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to ensure JWT secret: %v", err)
|
||||
}
|
||||
|
||||
// Verify the secret is a valid base64-encoded string of sufficient length
|
||||
decoded, err := base64.StdEncoding.DecodeString(secret1)
|
||||
if err != nil {
|
||||
t.Errorf("secret is not valid base64: %v", err)
|
||||
}
|
||||
if len(decoded) < 32 {
|
||||
t.Errorf("secret length = %d, want >= 32", len(decoded))
|
||||
}
|
||||
|
||||
// Second call should return the same secret
|
||||
secret2, err := database.EnsureJWTSecret()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to get existing JWT secret: %v", err)
|
||||
}
|
||||
|
||||
if secret2 != secret1 {
|
||||
t.Errorf("got different secret on second call")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("GetSystemStats", func(t *testing.T) {
|
||||
// Create some test users and sessions
|
||||
users := []*models.User{
|
||||
|
||||
Reference in New Issue
Block a user