|
| 1 | +package org.vss.auth; |
| 2 | + |
| 3 | +import jakarta.ws.rs.core.HttpHeaders; |
| 4 | +import org.junit.jupiter.api.BeforeEach; |
| 5 | +import org.junit.jupiter.api.Test; |
| 6 | +import org.vss.exception.AuthException; |
| 7 | + |
| 8 | +import static org.junit.jupiter.api.Assertions.*; |
| 9 | +import static org.mockito.Mockito.mock; |
| 10 | +import static org.mockito.Mockito.when; |
| 11 | + |
| 12 | +class JwtAuthorizerTest { |
| 13 | + |
| 14 | + private JwtAuthorizer jwtAuthorizer; |
| 15 | + private HttpHeaders headers; |
| 16 | + |
| 17 | + private static final String PUBLIC_KEY = "-----BEGIN PUBLIC KEY-----\n" + |
| 18 | + "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAysGpKU+I9i9b+QZSANu/\n" + |
| 19 | + "ExaA6w4qiQdFZaXeReiz49r1oDfABwKIFW9gK/kNnrnL9H8P+pYfj7jqUJ/glmgq\n" + |
| 20 | + "MsvBshbbD2FhxytSS0mhsbh6QxUhlanymPcSUUyKBD6v7W0CGUhS5luHlsCFn4ys\n" + |
| 21 | + "lFk4pavcBtGap0DTUc8yz0j/xnmSQbdjWgm0awbHN48uItRO3UhLAOetG+BzlWCR\n" + |
| 22 | + "8YsTa5piV8KgJpG/rwYTGXuu3lcCmnWwjmbeDq1zFFrCDDVkaIHkGJgRuFIDPXaH\n" + |
| 23 | + "yUw5H2HvKlP94ySbvTDLXWZj6TyzHEHDbstqs4DgvurB/bIhi/dQ7zK3EIXL8KRB\n" + |
| 24 | + "hwIDAQAB\n" + |
| 25 | + "-----END PUBLIC KEY-----"; |
| 26 | + |
| 27 | + private static final String VALID_AUTH_HEADER = "Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9." + |
| 28 | + "eyJzdWIiOiJ2YWxpZF91c2VyX2lkIiwiaWF0IjoxNzI5NjM0MjYwLCJuYmYiOjE3Mjk2MzQyNjAsImV4cCI6MzA1" + |
| 29 | + "NTY4OTE1OTQwMzc0NTl9.xBL5BYiv8B-ZN1bCuljuJ7dZeOPocVPPVwkeK_GH4lD5iQqD08zi93WuXw1c6NWWCK4" + |
| 30 | + "jn4ZssYrzSLLL5q3tAYbLKuhQ2-2A-e1HTasfvSnx_jCBUNApbIv3rM19M3rhRVRSxT2s2jI7dJFlM6E_bGMfj9w" + |
| 31 | + "uoZiT_amjIIPQJiRkDKcO2sXnD6eU_yx8EIhH_PemSX3kp9Sx9eTYqGbyCtLrs9jK7nr6GQ_1jc6ie03Uh2dsIzW" + |
| 32 | + "sZqGHh2n_WmdyURWEfwsMYFpepRLzm77dP9q78RgA8eDLZSLNW9ssJMYWY9DRkOZBFFuf4uy-uqC9MWS64DkJSAo" + |
| 33 | + "nH8Zof_tUiQ"; |
| 34 | + |
| 35 | + private static final String VALID_USER_ID = "valid_user_id"; |
| 36 | + |
| 37 | + @BeforeEach |
| 38 | + public void setUp() throws Exception { |
| 39 | + jwtAuthorizer = new JwtAuthorizer(PUBLIC_KEY); |
| 40 | + headers = mock(HttpHeaders.class); |
| 41 | + } |
| 42 | + |
| 43 | + @Test |
| 44 | + public void testValidJwtToken() { |
| 45 | + when(headers.getHeaderString(HttpHeaders.AUTHORIZATION)).thenReturn(VALID_AUTH_HEADER); |
| 46 | + |
| 47 | + AuthResponse authResponse = jwtAuthorizer.verify(headers); |
| 48 | + |
| 49 | + assertNotNull(authResponse); |
| 50 | + |
| 51 | + assertEquals(VALID_USER_ID, authResponse.getUserToken()); |
| 52 | + } |
| 53 | + |
| 54 | + @Test |
| 55 | + public void testMissingAuthorizationHeader() { |
| 56 | + when(headers.getHeaderString(HttpHeaders.AUTHORIZATION)).thenReturn(null); |
| 57 | + |
| 58 | + assertThrows(AuthException.class, () -> jwtAuthorizer.verify(headers)); |
| 59 | + } |
| 60 | + |
| 61 | + @Test |
| 62 | + public void testInvalidAuthorizationHeader() { |
| 63 | + when(headers.getHeaderString(HttpHeaders.AUTHORIZATION)).thenReturn("InvalidHeader"); |
| 64 | + |
| 65 | + assertThrows(AuthException.class, () -> jwtAuthorizer.verify(headers)); |
| 66 | + } |
| 67 | + |
| 68 | + @Test |
| 69 | + public void testInvalidJwtToken() { |
| 70 | + String invalidJwt = "Bearer invalid.jwt.token"; |
| 71 | + when(headers.getHeaderString(HttpHeaders.AUTHORIZATION)).thenReturn(invalidJwt); |
| 72 | + |
| 73 | + assertThrows(AuthException.class, () -> jwtAuthorizer.verify(headers)); |
| 74 | + } |
| 75 | +} |
0 commit comments