File: user_test.go

package info (click to toggle)
singularity-container 4.0.3%2Bds1-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 21,672 kB
  • sloc: asm: 3,857; sh: 2,125; ansic: 1,677; awk: 414; makefile: 110; python: 99
file content (107 lines) | stat: -rw-r--r-- 2,652 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
// Copyright (c) 2023, Sylabs Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package library

import (
	"fmt"
	"net/http"
	"net/http/httptest"
	"testing"

	scslibrary "github.com/sylabs/scs-library-client/client"
	"gotest.tools/v3/assert"
)

const (
	validToken   = "validToken"
	invalidToken = "not valid"
)

func TestGetOCIToken(t *testing.T) {
	tests := []struct {
		name      string
		password  string
		authToken string
		jsonResp  string
		shallPass bool
	}{
		{
			name:      "happy path",
			shallPass: true,
			authToken: validToken,
			jsonResp: `{
							"admin_role_in_auth": false,
							"comment": "Onboarded via OIDC provider",
							"creation_time": "2023-02-01T21:37:31.626Z",
							"email": "user@sylabs.io",
							"oidc_user_meta": {
								"creation_time": "2023-02-01T21:37:31.626Z",
								"id": 1,
								"secret": "secretsecretsecret",
								"subiss": "subissidhttps://hydra.se.k3s/",
								"update_time": "2023-02-20T23:26:39.841Z",
								"user_id": 3
							},
							"realname": "sylabs-user",
							"sysadmin_flag": true,
							"update_time": "2023-02-07T18:25:40.732Z",
							"user_id": 3,
							"username": "sylabs-user"
						} `,
			password: "secretsecretsecret",
		},
		{
			name:      "invalid token",
			shallPass: false,
			authToken: invalidToken,
			password:  "",
		},
		{
			name:      "empty json response",
			shallPass: false,
			authToken: validToken,
			password:  "",
			jsonResp:  "{}",
		},
		{
			name:      "invalid json response",
			shallPass: false,
			authToken: validToken,
			password:  "",
			jsonResp:  "random non json text",
		},
	}

	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
				isTokenValid := r.Header.Get("Authorization") == "Bearer "+validToken

				if r.URL.Path == userServicePath && isTokenValid {
					w.Header().Set("Content-Type", "application/json")
					fmt.Fprintln(w, tt.jsonResp)
				} else {
					w.WriteHeader(http.StatusNotFound)
					fmt.Fprintln(w, "Not found")
				}
			}))
			defer srv.Close()

			config := &scslibrary.Config{
				BaseURL:   srv.URL,
				AuthToken: tt.authToken,
			}
			actual, err := GetOCIToken(config)
			assert.Equal(t, actual, tt.password)
			if tt.shallPass == true && err != nil {
				t.Fatalf("valid case failed: %s\n", err)
			}

			if tt.shallPass == false && err == nil {
				t.Fatal("invalid case passed")
			}
		})
	}
}