mirror of
https://github.com/pocketbase/pocketbase.git
synced 2024-11-21 13:35:49 +02:00
180 lines
5.2 KiB
Go
180 lines
5.2 KiB
Go
package security_test
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
"github.com/pocketbase/pocketbase/tools/security"
|
|
)
|
|
|
|
func TestParseUnverifiedJWT(t *testing.T) {
|
|
// invalid formatted JWT
|
|
result1, err1 := security.ParseUnverifiedJWT("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9")
|
|
if err1 == nil {
|
|
t.Error("Expected error got nil")
|
|
}
|
|
if len(result1) > 0 {
|
|
t.Error("Expected no parsed claims, got", result1)
|
|
}
|
|
|
|
// properly formatted JWT with INVALID claims
|
|
// {"name": "test", "exp": 1516239022}
|
|
result2, err2 := security.ParseUnverifiedJWT("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTUxNjIzOTAyMn0.xYHirwESfSEW3Cq2BL47CEASvD_p_ps3QCA54XtNktU")
|
|
if err2 == nil {
|
|
t.Error("Expected error got nil")
|
|
}
|
|
if len(result2) != 2 || result2["name"] != "test" {
|
|
t.Errorf("Expected to have 2 claims, got %v", result2)
|
|
}
|
|
|
|
// properly formatted JWT with VALID claims
|
|
// {"name": "test"}
|
|
result3, err3 := security.ParseUnverifiedJWT("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9.ml0QsTms3K9wMygTu41ZhKlTyjmW9zHQtoS8FUsCCjU")
|
|
if err3 != nil {
|
|
t.Error("Expected nil, got", err3)
|
|
}
|
|
if len(result3) != 1 || result3["name"] != "test" {
|
|
t.Errorf("Expected to have 2 claims, got %v", result3)
|
|
}
|
|
}
|
|
|
|
func TestParseJWT(t *testing.T) {
|
|
scenarios := []struct {
|
|
token string
|
|
secret string
|
|
expectError bool
|
|
expectClaims jwt.MapClaims
|
|
}{
|
|
// invalid formatted JWT
|
|
{
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9",
|
|
"test",
|
|
true,
|
|
nil,
|
|
},
|
|
// properly formatted JWT with INVALID claims and INVALID secret
|
|
// {"name": "test", "exp": 1516239022}
|
|
{
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTUxNjIzOTAyMn0.xYHirwESfSEW3Cq2BL47CEASvD_p_ps3QCA54XtNktU",
|
|
"invalid",
|
|
true,
|
|
nil,
|
|
},
|
|
// properly formatted JWT with INVALID claims and VALID secret
|
|
// {"name": "test", "exp": 1516239022}
|
|
{
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTUxNjIzOTAyMn0.xYHirwESfSEW3Cq2BL47CEASvD_p_ps3QCA54XtNktU",
|
|
"test",
|
|
true,
|
|
nil,
|
|
},
|
|
// properly formatted JWT with VALID claims and INVALID secret
|
|
// {"name": "test", "exp": 1898636137}
|
|
{
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTg5ODYzNjEzN30.gqRkHjpK5s1PxxBn9qPaWEWxTbpc1PPSD-an83TsXRY",
|
|
"invalid",
|
|
true,
|
|
nil,
|
|
},
|
|
// properly formatted EXPIRED JWT with VALID secret
|
|
// {"name": "test", "exp": 1652097610}
|
|
{
|
|
"eyJhbGciOiJIUzI1NiJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6OTU3ODczMzc0fQ.0oUUKUnsQHs4nZO1pnxQHahKtcHspHu4_AplN2sGC4A",
|
|
"test",
|
|
true,
|
|
nil,
|
|
},
|
|
// properly formatted JWT with VALID claims and VALID secret
|
|
// {"name": "test", "exp": 1898636137}
|
|
{
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCIsImV4cCI6MTg5ODYzNjEzN30.gqRkHjpK5s1PxxBn9qPaWEWxTbpc1PPSD-an83TsXRY",
|
|
"test",
|
|
false,
|
|
jwt.MapClaims{"name": "test", "exp": 1898636137.0},
|
|
},
|
|
// properly formatted JWT with VALID claims (without exp) and VALID secret
|
|
// {"name": "test"}
|
|
{
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9.ml0QsTms3K9wMygTu41ZhKlTyjmW9zHQtoS8FUsCCjU",
|
|
"test",
|
|
false,
|
|
jwt.MapClaims{"name": "test"},
|
|
},
|
|
}
|
|
|
|
for i, scenario := range scenarios {
|
|
result, err := security.ParseJWT(scenario.token, scenario.secret)
|
|
if scenario.expectError && err == nil {
|
|
t.Errorf("(%d) Expected error got nil", i)
|
|
}
|
|
if !scenario.expectError && err != nil {
|
|
t.Errorf("(%d) Expected nil got error %v", i, err)
|
|
}
|
|
if len(result) != len(scenario.expectClaims) {
|
|
t.Errorf("(%d) Expected %v got %v", i, scenario.expectClaims, result)
|
|
}
|
|
for k, v := range scenario.expectClaims {
|
|
v2, ok := result[k]
|
|
if !ok {
|
|
t.Errorf("(%d) Missing expected claim %q", i, k)
|
|
}
|
|
if v != v2 {
|
|
t.Errorf("(%d) Expected %v for %q claim, got %v", i, v, k, v2)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNewJWT(t *testing.T) {
|
|
scenarios := []struct {
|
|
claims jwt.MapClaims
|
|
key string
|
|
duration int64
|
|
expectError bool
|
|
}{
|
|
// empty, zero duration
|
|
{jwt.MapClaims{}, "", 0, true},
|
|
// empty, 10 seconds duration
|
|
{jwt.MapClaims{}, "", 10, false},
|
|
// non-empty, 10 seconds duration
|
|
{jwt.MapClaims{"name": "test"}, "test", 10, false},
|
|
}
|
|
|
|
for i, scenario := range scenarios {
|
|
token, tokenErr := security.NewJWT(scenario.claims, scenario.key, scenario.duration)
|
|
if tokenErr != nil {
|
|
t.Errorf("(%d) Expected NewJWT to succeed, got error %v", i, tokenErr)
|
|
continue
|
|
}
|
|
|
|
claims, parseErr := security.ParseJWT(token, scenario.key)
|
|
|
|
hasParseErr := parseErr != nil
|
|
if hasParseErr != scenario.expectError {
|
|
t.Errorf("(%d) Expected hasParseErr to be %v, got %v (%v)", i, scenario.expectError, hasParseErr, parseErr)
|
|
continue
|
|
}
|
|
|
|
if scenario.expectError {
|
|
continue
|
|
}
|
|
|
|
if _, ok := claims["exp"]; !ok {
|
|
t.Errorf("(%d) Missing required claim exp, got %v", i, claims)
|
|
}
|
|
|
|
// clear exp claim to match with the scenario ones
|
|
delete(claims, "exp")
|
|
|
|
if len(claims) != len(scenario.claims) {
|
|
t.Errorf("(%d) Expected %v claims, got %v", i, scenario.claims, claims)
|
|
}
|
|
|
|
for j, k := range claims {
|
|
if claims[j] != scenario.claims[j] {
|
|
t.Errorf("(%d) Expected %v for %q claim, got %v", i, claims[j], k, scenario.claims[j])
|
|
}
|
|
}
|
|
}
|
|
}
|