mirror of
https://github.com/lordmathis/lemma.git
synced 2025-11-06 07:54:22 +00:00
Implement auth tests
This commit is contained in:
221
server/internal/auth/jwt_test.go
Normal file
221
server/internal/auth/jwt_test.go
Normal file
@@ -0,0 +1,221 @@
|
||||
package auth_test
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"novamd/internal/auth"
|
||||
|
||||
"github.com/golang-jwt/jwt/v5"
|
||||
)
|
||||
|
||||
// jwt_test.go tests
|
||||
|
||||
func TestNewJWTService(t *testing.T) {
|
||||
testCases := []struct {
|
||||
name string
|
||||
config auth.JWTConfig
|
||||
wantErr bool
|
||||
}{
|
||||
{
|
||||
name: "valid configuration",
|
||||
config: auth.JWTConfig{
|
||||
SigningKey: "test-key",
|
||||
AccessTokenExpiry: 15 * time.Minute,
|
||||
RefreshTokenExpiry: 24 * time.Hour,
|
||||
},
|
||||
wantErr: false,
|
||||
},
|
||||
{
|
||||
name: "missing signing key",
|
||||
config: auth.JWTConfig{
|
||||
AccessTokenExpiry: 15 * time.Minute,
|
||||
RefreshTokenExpiry: 24 * time.Hour,
|
||||
},
|
||||
wantErr: true,
|
||||
},
|
||||
{
|
||||
name: "zero expiry times",
|
||||
config: auth.JWTConfig{
|
||||
SigningKey: "test-key",
|
||||
},
|
||||
wantErr: false, // Should use default values
|
||||
},
|
||||
}
|
||||
|
||||
for _, tc := range testCases {
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
service, err := auth.NewJWTService(tc.config)
|
||||
if tc.wantErr {
|
||||
if err == nil {
|
||||
t.Error("expected error, got nil")
|
||||
}
|
||||
return
|
||||
}
|
||||
if err != nil {
|
||||
t.Errorf("unexpected error: %v", err)
|
||||
}
|
||||
if service == nil {
|
||||
t.Error("expected service, got nil")
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestGenerateAndValidateToken(t *testing.T) {
|
||||
config := auth.JWTConfig{
|
||||
SigningKey: "test-key",
|
||||
AccessTokenExpiry: 15 * time.Minute,
|
||||
RefreshTokenExpiry: 24 * time.Hour,
|
||||
}
|
||||
service, _ := auth.NewJWTService(config)
|
||||
|
||||
testCases := []struct {
|
||||
name string
|
||||
userID int
|
||||
role string
|
||||
tokenType auth.TokenType
|
||||
wantErr bool
|
||||
}{
|
||||
{
|
||||
name: "valid access token",
|
||||
userID: 1,
|
||||
role: "admin",
|
||||
tokenType: auth.AccessToken,
|
||||
wantErr: false,
|
||||
},
|
||||
{
|
||||
name: "valid refresh token",
|
||||
userID: 1,
|
||||
role: "editor",
|
||||
tokenType: auth.RefreshToken,
|
||||
wantErr: false,
|
||||
},
|
||||
}
|
||||
|
||||
for _, tc := range testCases {
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
var token string
|
||||
var err error
|
||||
|
||||
// Generate token based on type
|
||||
if tc.tokenType == auth.AccessToken {
|
||||
token, err = service.GenerateAccessToken(tc.userID, tc.role)
|
||||
} else {
|
||||
token, err = service.GenerateRefreshToken(tc.userID, tc.role)
|
||||
}
|
||||
|
||||
if err != nil {
|
||||
t.Fatalf("failed to generate token: %v", err)
|
||||
}
|
||||
|
||||
// Validate token
|
||||
claims, err := service.ValidateToken(token)
|
||||
if tc.wantErr {
|
||||
if err == nil {
|
||||
t.Error("expected error, got nil")
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
if err != nil {
|
||||
t.Errorf("unexpected error: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
// Verify claims
|
||||
if claims.UserID != tc.userID {
|
||||
t.Errorf("userID = %v, want %v", claims.UserID, tc.userID)
|
||||
}
|
||||
if claims.Role != tc.role {
|
||||
t.Errorf("role = %v, want %v", claims.Role, tc.role)
|
||||
}
|
||||
if claims.Type != tc.tokenType {
|
||||
t.Errorf("type = %v, want %v", claims.Type, tc.tokenType)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestRefreshAccessToken(t *testing.T) {
|
||||
config := auth.JWTConfig{
|
||||
SigningKey: "test-key",
|
||||
AccessTokenExpiry: 15 * time.Minute,
|
||||
RefreshTokenExpiry: 24 * time.Hour,
|
||||
}
|
||||
service, _ := auth.NewJWTService(config)
|
||||
|
||||
testCases := []struct {
|
||||
name string
|
||||
userID int
|
||||
role string
|
||||
wantErr bool
|
||||
setupFunc func() string // Added setup function to handle custom token creation
|
||||
}{
|
||||
{
|
||||
name: "valid refresh token",
|
||||
userID: 1,
|
||||
role: "admin",
|
||||
wantErr: false,
|
||||
setupFunc: func() string {
|
||||
token, _ := service.GenerateRefreshToken(1, "admin")
|
||||
return token
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "expired refresh token",
|
||||
userID: 1,
|
||||
role: "admin",
|
||||
wantErr: true,
|
||||
setupFunc: func() string {
|
||||
// Create a token that's already expired
|
||||
claims := &auth.Claims{
|
||||
RegisteredClaims: jwt.RegisteredClaims{
|
||||
ExpiresAt: jwt.NewNumericDate(time.Now().Add(-time.Hour)), // Expired 1 hour ago
|
||||
IssuedAt: jwt.NewNumericDate(time.Now().Add(-2 * time.Hour)),
|
||||
NotBefore: jwt.NewNumericDate(time.Now().Add(-2 * time.Hour)),
|
||||
},
|
||||
UserID: 1,
|
||||
Role: "admin",
|
||||
Type: auth.RefreshToken,
|
||||
}
|
||||
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||||
tokenString, _ := token.SignedString([]byte(config.SigningKey))
|
||||
return tokenString
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for _, tc := range testCases {
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
refreshToken := tc.setupFunc()
|
||||
newAccessToken, err := service.RefreshAccessToken(refreshToken)
|
||||
|
||||
if tc.wantErr {
|
||||
if err == nil {
|
||||
t.Error("expected error, got nil")
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
|
||||
claims, err := service.ValidateToken(newAccessToken)
|
||||
if err != nil {
|
||||
t.Fatalf("failed to validate new access token: %v", err)
|
||||
}
|
||||
|
||||
if claims.UserID != tc.userID {
|
||||
t.Errorf("userID = %v, want %v", claims.UserID, tc.userID)
|
||||
}
|
||||
if claims.Role != tc.role {
|
||||
t.Errorf("role = %v, want %v", claims.Role, tc.role)
|
||||
}
|
||||
if claims.Type != auth.AccessToken {
|
||||
t.Errorf("token type = %v, want %v", claims.Type, auth.AccessToken)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user