2023-03-24 23:08:06 +00:00
|
|
|
package auth_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/go-chi/chi/v5"
|
|
|
|
"github.com/stretchr/testify/require"
|
2023-10-03 17:25:41 +00:00
|
|
|
"gitlab.com/manytask/itmo-go/public/middleware/auth"
|
2023-03-24 23:08:06 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type fakeChecker map[string]struct {
|
|
|
|
user *auth.User
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c fakeChecker) CheckToken(ctx context.Context, token string) (*auth.User, error) {
|
|
|
|
res := c[token]
|
|
|
|
return res.user, res.err
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuth(t *testing.T) {
|
|
|
|
m := chi.NewRouter()
|
|
|
|
|
|
|
|
c := fakeChecker{
|
|
|
|
"token0": {
|
|
|
|
user: &auth.User{Name: "Fedor", Email: "dartslon@gmail.com"},
|
|
|
|
},
|
|
|
|
|
|
|
|
"token1": {
|
|
|
|
err: fmt.Errorf("database offline"),
|
|
|
|
},
|
|
|
|
|
|
|
|
"token2": {
|
|
|
|
err: fmt.Errorf("token expired: %w", auth.ErrInvalidToken),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
m.Use(auth.CheckAuth(c))
|
|
|
|
|
|
|
|
var (
|
|
|
|
lastUser *auth.User
|
|
|
|
lastUserOK bool
|
|
|
|
called bool
|
|
|
|
)
|
|
|
|
|
|
|
|
m.Get("/path/ok", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
called = true
|
|
|
|
lastUser, lastUserOK = auth.ContextUser(r.Context())
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
})
|
|
|
|
|
|
|
|
m.Get("/path/error", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
called = true
|
|
|
|
w.WriteHeader(http.StatusConflict)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("NoToken", func(t *testing.T) {
|
|
|
|
called = false
|
|
|
|
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
m.ServeHTTP(w, httptest.NewRequest("GET", "/path/ok", nil))
|
|
|
|
require.Equal(t, w.Code, http.StatusUnauthorized)
|
|
|
|
require.False(t, called)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("InvalidToken", func(t *testing.T) {
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("DatabaseError", func(t *testing.T) {
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("GoodToken", func(t *testing.T) {
|
|
|
|
called = false
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
r := httptest.NewRequest("GET", "/path/ok", nil)
|
|
|
|
r.Header.Add("authorization", "Bearer token0")
|
|
|
|
|
|
|
|
m.ServeHTTP(w, r)
|
|
|
|
require.Equal(t, w.Code, http.StatusOK)
|
|
|
|
require.True(t, called)
|
|
|
|
require.True(t, lastUserOK)
|
|
|
|
require.Equal(t, lastUser, &auth.User{Name: "Fedor", Email: "dartslon@gmail.com"})
|
|
|
|
|
|
|
|
called = false
|
|
|
|
w = httptest.NewRecorder()
|
|
|
|
r = httptest.NewRequest("GET", "/path/error", nil)
|
|
|
|
r.Header.Add("authorization", "Bearer token0")
|
|
|
|
|
|
|
|
m.ServeHTTP(w, r)
|
|
|
|
require.Equal(t, w.Code, http.StatusConflict)
|
|
|
|
require.True(t, called)
|
|
|
|
})
|
|
|
|
}
|