package security_test import ( "testing" "github.com/golang-jwt/jwt/v4" "github.com/pocketbase/pocketbase/tools/security" ) func TestParseUnverifiedJWT(t *testing.T) { // invalid formatted JWT token result1, err1 := security.ParseUnverifiedJWT("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9") if err1 == nil { t.Error("Expected error got nil") } if len(result1) > 0 { t.Error("Expected no parsed claims, got", result1) } // properly formatted JWT token with INVALID claims // {"name": "test", "exp": 1516239022} result2, err2 := security.ParseUnverifiedJWT("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTUxNjIzOTAyMn0.xYHirwESfSEW3Cq2BL47CEASvD_p_ps3QCA54XtNktU") if err2 == nil { t.Error("Expected error got nil") } if len(result2) != 2 || result2["name"] != "test" { t.Errorf("Expected to have 2 claims, got %v", result2) } // properly formatted JWT token with VALID claims // {"name": "test"} result3, err3 := security.ParseUnverifiedJWT("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9.ml0QsTms3K9wMygTu41ZhKlTyjmW9zHQtoS8FUsCCjU") if err3 != nil { t.Error("Expected nil, got", err3) } if len(result3) != 1 || result3["name"] != "test" { t.Errorf("Expected to have 2 claims, got %v", result3) } } func TestParseJWT(t *testing.T) { scenarios := []struct { token string secret string expectError bool expectClaims jwt.MapClaims }{ // invalid formatted JWT token { "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9", "test", true, nil, }, // properly formatted JWT token with INVALID claims and INVALID secret // {"name": "test", "exp": 1516239022} { "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTUxNjIzOTAyMn0.xYHirwESfSEW3Cq2BL47CEASvD_p_ps3QCA54XtNktU", "invalid", true, nil, }, // properly formatted JWT token with INVALID claims and VALID secret // {"name": "test", "exp": 1516239022} { "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTUxNjIzOTAyMn0.xYHirwESfSEW3Cq2BL47CEASvD_p_ps3QCA54XtNktU", "test", true, nil, }, // properly formatted JWT token with VALID claims and INVALID secret // {"name": "test", "exp": 1898636137} { "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTg5ODYzNjEzN30.gqRkHjpK5s1PxxBn9qPaWEWxTbpc1PPSD-an83TsXRY", "invalid", true, nil, }, // properly formatted EXPIRED JWT token with VALID secret // {"name": "test", "exp": 1652097610} { "eyJhbGciOiJIUzI1NiJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6OTU3ODczMzc0fQ.0oUUKUnsQHs4nZO1pnxQHahKtcHspHu4_AplN2sGC4A", "test", true, nil, }, // properly formatted JWT token with VALID claims and VALID secret // {"name": "test", "exp": 1898636137} { "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTg5ODYzNjEzN30.gqRkHjpK5s1PxxBn9qPaWEWxTbpc1PPSD-an83TsXRY", "test", false, jwt.MapClaims{"name": "test", "exp": 1898636137.0}, }, // properly formatted JWT token with VALID claims (without exp) and VALID secret // {"name": "test"} { "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9.ml0QsTms3K9wMygTu41ZhKlTyjmW9zHQtoS8FUsCCjU", "test", false, jwt.MapClaims{"name": "test"}, }, } for i, scenario := range scenarios { result, err := security.ParseJWT(scenario.token, scenario.secret) if scenario.expectError && err == nil { t.Errorf("(%d) Expected error got nil", i) } if !scenario.expectError && err != nil { t.Errorf("(%d) Expected nil got error %v", i, err) } if len(result) != len(scenario.expectClaims) { t.Errorf("(%d) Expected %v got %v", i, scenario.expectClaims, result) } for k, v := range scenario.expectClaims { v2, ok := result[k] if !ok { t.Errorf("(%d) Missing expected claim %q", i, k) } if v != v2 { t.Errorf("(%d) Expected %v for %q claim, got %v", i, v, k, v2) } } } } func TestNewJWT(t *testing.T) { scenarios := []struct { claims jwt.MapClaims key string duration int64 expectError bool }{ // empty, zero duration {jwt.MapClaims{}, "", 0, true}, // empty, 10 seconds duration {jwt.MapClaims{}, "", 10, false}, // non-empty, 10 seconds duration {jwt.MapClaims{"name": "test"}, "test", 10, false}, } for i, scenario := range scenarios { token, tokenErr := security.NewJWT(scenario.claims, scenario.key, scenario.duration) if tokenErr != nil { t.Errorf("(%d) Expected NewJWT to succeed, got error %v", i, tokenErr) continue } claims, parseErr := security.ParseJWT(token, scenario.key) hasParseErr := parseErr != nil if hasParseErr != scenario.expectError { t.Errorf("(%d) Expected hasParseErr to be %v, got %v (%v)", i, scenario.expectError, hasParseErr, parseErr) continue } if scenario.expectError { continue } if _, ok := claims["exp"]; !ok { t.Errorf("(%d) Missing required claim exp, got %v", i, claims) } // clear exp claim to match with the scenario ones delete(claims, "exp") if len(claims) != len(scenario.claims) { t.Errorf("(%d) Expected %v claims, got %v", i, scenario.claims, claims) } for j, k := range claims { if claims[j] != scenario.claims[j] { t.Errorf("(%d) Expected %v for %q claim, got %v", i, claims[j], k, scenario.claims[j]) } } } }