2022-03-24 13:51:52 +00:00
|
|
|
package test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
|
|
|
"github.com/authorizerdev/authorizer/server/crypto"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2022-05-30 03:49:55 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/memorystore"
|
2022-03-24 13:51:52 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/resolvers"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func generateJWTkeyTest(t *testing.T, s TestSetup) {
|
|
|
|
t.Helper()
|
|
|
|
req, ctx := createContext(s)
|
|
|
|
t.Run(`generate_jwt_keys`, func(t *testing.T) {
|
|
|
|
t.Run(`should throw unauthorized`, func(t *testing.T) {
|
|
|
|
res, err := resolvers.GenerateJWTKeysResolver(ctx, model.GenerateJWTKeysInput{
|
|
|
|
Type: "HS256",
|
|
|
|
})
|
|
|
|
assert.Error(t, err)
|
|
|
|
assert.Nil(t, res)
|
|
|
|
})
|
|
|
|
t.Run(`should throw invalid`, func(t *testing.T) {
|
|
|
|
res, err := resolvers.GenerateJWTKeysResolver(ctx, model.GenerateJWTKeysInput{
|
|
|
|
Type: "test",
|
|
|
|
})
|
|
|
|
assert.Error(t, err)
|
|
|
|
assert.Nil(t, res)
|
|
|
|
})
|
2022-05-30 07:17:50 +00:00
|
|
|
|
|
|
|
adminSecret, err := memorystore.Provider.GetStringStoreEnvVariable(constants.EnvKeyAdminSecret)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
|
|
|
|
h, err := crypto.EncryptPassword(adminSecret)
|
2022-03-24 13:51:52 +00:00
|
|
|
assert.Nil(t, err)
|
2022-05-30 07:17:50 +00:00
|
|
|
req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h))
|
2022-03-24 13:51:52 +00:00
|
|
|
t.Run(`should generate HS256 secret`, func(t *testing.T) {
|
|
|
|
res, err := resolvers.GenerateJWTKeysResolver(ctx, model.GenerateJWTKeysInput{
|
|
|
|
Type: "HS256",
|
|
|
|
})
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, res.Secret)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run(`should generate RS256 secret`, func(t *testing.T) {
|
|
|
|
res, err := resolvers.GenerateJWTKeysResolver(ctx, model.GenerateJWTKeysInput{
|
|
|
|
Type: "RS256",
|
|
|
|
})
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, res.PrivateKey)
|
|
|
|
assert.NotEmpty(t, res.PublicKey)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run(`should generate ES256 secret`, func(t *testing.T) {
|
|
|
|
res, err := resolvers.GenerateJWTKeysResolver(ctx, model.GenerateJWTKeysInput{
|
|
|
|
Type: "ES256",
|
|
|
|
})
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, res.PrivateKey)
|
|
|
|
assert.NotEmpty(t, res.PublicKey)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|