export token parser for refresh token service
This commit is contained in:
86
rest/token/tokenparser_test.go
Normal file
86
rest/token/tokenparser_test.go
Normal file
@@ -0,0 +1,86 @@
|
||||
package token
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/dgrijalva/jwt-go"
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/tal-tech/go-zero/core/timex"
|
||||
)
|
||||
|
||||
func TestTokenParser(t *testing.T) {
|
||||
const (
|
||||
key = "14F17379-EB8F-411B-8F12-6929002DCA76"
|
||||
prevKey = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
|
||||
)
|
||||
keys := []struct {
|
||||
key string
|
||||
prevKey string
|
||||
}{
|
||||
{
|
||||
key,
|
||||
prevKey,
|
||||
},
|
||||
{
|
||||
key,
|
||||
"",
|
||||
},
|
||||
}
|
||||
|
||||
for _, pair := range keys {
|
||||
req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
|
||||
token, err := buildToken(key, map[string]interface{}{
|
||||
"key": "value",
|
||||
}, 3600)
|
||||
assert.Nil(t, err)
|
||||
req.Header.Set("Authorization", "Bearer "+token)
|
||||
|
||||
parser := NewTokenParser(WithResetDuration(time.Minute))
|
||||
tok, err := parser.ParseToken(req, pair.key, pair.prevKey)
|
||||
assert.Nil(t, err)
|
||||
assert.Equal(t, "value", tok.Claims.(jwt.MapClaims)["key"])
|
||||
}
|
||||
}
|
||||
|
||||
func TestTokenParser_Expired(t *testing.T) {
|
||||
const (
|
||||
key = "14F17379-EB8F-411B-8F12-6929002DCA76"
|
||||
prevKey = "B63F477D-BBA3-4E52-96D3-C0034C27694A"
|
||||
)
|
||||
req := httptest.NewRequest(http.MethodGet, "http://localhost", nil)
|
||||
token, err := buildToken(key, map[string]interface{}{
|
||||
"key": "value",
|
||||
}, 3600)
|
||||
assert.Nil(t, err)
|
||||
req.Header.Set("Authorization", "Bearer "+token)
|
||||
|
||||
parser := NewTokenParser(WithResetDuration(time.Second))
|
||||
tok, err := parser.ParseToken(req, key, prevKey)
|
||||
assert.Nil(t, err)
|
||||
assert.Equal(t, "value", tok.Claims.(jwt.MapClaims)["key"])
|
||||
tok, err = parser.ParseToken(req, key, prevKey)
|
||||
assert.Nil(t, err)
|
||||
assert.Equal(t, "value", tok.Claims.(jwt.MapClaims)["key"])
|
||||
parser.resetTime = timex.Now() - time.Hour
|
||||
tok, err = parser.ParseToken(req, key, prevKey)
|
||||
assert.Nil(t, err)
|
||||
assert.Equal(t, "value", tok.Claims.(jwt.MapClaims)["key"])
|
||||
}
|
||||
|
||||
func buildToken(secretKey string, payloads map[string]interface{}, seconds int64) (string, error) {
|
||||
now := time.Now().Unix()
|
||||
claims := make(jwt.MapClaims)
|
||||
claims["exp"] = now + seconds
|
||||
claims["iat"] = now
|
||||
for k, v := range payloads {
|
||||
claims[k] = v
|
||||
}
|
||||
|
||||
token := jwt.New(jwt.SigningMethodHS256)
|
||||
token.Claims = claims
|
||||
|
||||
return token.SignedString([]byte(secretKey))
|
||||
}
|
||||
Reference in New Issue
Block a user