1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107
|
// Copyright (c) 2023, Sylabs Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package library
import (
"fmt"
"net/http"
"net/http/httptest"
"testing"
scslibrary "github.com/sylabs/scs-library-client/client"
"gotest.tools/v3/assert"
)
const (
validToken = "validToken"
invalidToken = "not valid"
)
func TestGetOCIToken(t *testing.T) {
tests := []struct {
name string
password string
authToken string
jsonResp string
shallPass bool
}{
{
name: "happy path",
shallPass: true,
authToken: validToken,
jsonResp: `{
"admin_role_in_auth": false,
"comment": "Onboarded via OIDC provider",
"creation_time": "2023-02-01T21:37:31.626Z",
"email": "user@sylabs.io",
"oidc_user_meta": {
"creation_time": "2023-02-01T21:37:31.626Z",
"id": 1,
"secret": "secretsecretsecret",
"subiss": "subissidhttps://hydra.se.k3s/",
"update_time": "2023-02-20T23:26:39.841Z",
"user_id": 3
},
"realname": "sylabs-user",
"sysadmin_flag": true,
"update_time": "2023-02-07T18:25:40.732Z",
"user_id": 3,
"username": "sylabs-user"
} `,
password: "secretsecretsecret",
},
{
name: "invalid token",
shallPass: false,
authToken: invalidToken,
password: "",
},
{
name: "empty json response",
shallPass: false,
authToken: validToken,
password: "",
jsonResp: "{}",
},
{
name: "invalid json response",
shallPass: false,
authToken: validToken,
password: "",
jsonResp: "random non json text",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
isTokenValid := r.Header.Get("Authorization") == "Bearer "+validToken
if r.URL.Path == userServicePath && isTokenValid {
w.Header().Set("Content-Type", "application/json")
fmt.Fprintln(w, tt.jsonResp)
} else {
w.WriteHeader(http.StatusNotFound)
fmt.Fprintln(w, "Not found")
}
}))
defer srv.Close()
config := &scslibrary.Config{
BaseURL: srv.URL,
AuthToken: tt.authToken,
}
actual, err := GetOCIToken(config)
assert.Equal(t, actual, tt.password)
if tt.shallPass == true && err != nil {
t.Fatalf("valid case failed: %s\n", err)
}
if tt.shallPass == false && err == nil {
t.Fatal("invalid case passed")
}
})
}
}
|