|
1 | 1 | package goPasetoV4 |
2 | 2 |
|
3 | 3 | import ( |
4 | | - "github.com/stretchr/testify/require" |
5 | 4 | "testing" |
6 | 5 | "time" |
| 6 | + |
| 7 | + "github.com/stretchr/testify/require" |
7 | 8 | ) |
8 | 9 |
|
9 | | -func TestPasetoMakerTokenLifecycle(t *testing.T) { |
10 | | - // Testing token creation and validation lifecycle |
| 10 | +func TestPasetoMaker(t *testing.T) { |
11 | 11 | maker := NewPasetoMaker() |
12 | | - require.NotNil(t, maker, "Maker should not be nil") |
13 | 12 |
|
14 | | - username := "testuser" |
15 | | - duration := time.Minute |
| 13 | + t.Run("CreateToken with Valid Inputs", func(t *testing.T) { |
| 14 | + username := "testuser" |
| 15 | + duration := time.Minute |
16 | 16 |
|
17 | | - token, payload, err := maker.CreateToken(username, duration) |
18 | | - require.NoError(t, err, "Token creation should not error") |
19 | | - require.NotEmpty(t, token, "Token should not be empty") |
20 | | - require.NotEmpty(t, payload, "Payload should not be empty") |
| 17 | + token, payload, err := maker.CreateToken(username, duration) |
| 18 | + require.NoError(t, err) |
| 19 | + require.NotEmpty(t, token) |
| 20 | + require.NotNil(t, payload) |
| 21 | + require.Equal(t, username, payload.Username) |
| 22 | + }) |
21 | 23 |
|
22 | | - payload, err = maker.VerifyToken(token) |
23 | | - require.NoError(t, err, "Token verification should not error") |
24 | | - require.NotEmpty(t, payload, "Payload should not be empty") |
| 24 | + t.Run("VerifyToken with Valid Token", func(t *testing.T) { |
| 25 | + username := "testuser" |
| 26 | + duration := time.Minute |
25 | 27 |
|
26 | | - require.NotZero(t, payload.ID, "Payload ID should not be zero") |
27 | | - require.Equal(t, username, payload.Username, "Username should match") |
28 | | - require.WithinDuration(t, time.Now(), payload.IssuedAt, time.Second, "IssuedAt should be recent") |
29 | | - require.WithinDuration(t, time.Now().Add(duration), payload.ExpiredAt, time.Second, "ExpiredAt should be correct") |
30 | | -} |
| 28 | + token, _, err := maker.CreateToken(username, duration) |
| 29 | + require.NoError(t, err) |
31 | 30 |
|
32 | | -func TestPasetoMakerExpiredToken(t *testing.T) { |
33 | | - // Testing behavior with an expired token |
34 | | - maker := NewPasetoMaker() |
35 | | - require.NotNil(t, maker, "Maker should not be nil") |
| 31 | + payload, err := maker.VerifyToken(token) |
| 32 | + require.NoError(t, err) |
| 33 | + require.NotNil(t, payload) |
| 34 | + require.Equal(t, username, payload.Username) |
| 35 | + }) |
36 | 36 |
|
37 | | - token, payload, err := maker.CreateToken("expireduser", -time.Minute) |
38 | | - require.NoError(t, err, "Expired token creation should not error") |
39 | | - require.NotEmpty(t, token, "Expired token should not be empty") |
| 37 | + t.Run("VerifyToken with Valid Token and Expiration in 24h", func(t *testing.T) { |
| 38 | + username := "testuser" |
| 39 | + //duration is expressed as time.Duration of 24h |
| 40 | + duration := time.Duration(24) * time.Hour |
40 | 41 |
|
41 | | - payload, err = maker.VerifyToken(token) |
42 | | - require.Error(t, err, "Expired token verification should error") |
43 | | - require.EqualError(t, err, ErrExpiredToken.Error(), "Error should be ErrExpiredToken") |
44 | | - require.Nil(t, payload, "Payload should be nil for an expired token") |
45 | | -} |
| 42 | + token, _, err := maker.CreateToken(username, duration) |
| 43 | + require.NoError(t, err) |
46 | 44 |
|
47 | | -func TestPasetoMakerInvalidToken(t *testing.T) { |
48 | | - // Testing behavior with an invalid token |
49 | | - maker := NewPasetoMaker() |
50 | | - require.NotNil(t, maker, "Maker should not be nil") |
| 45 | + payload, err := maker.VerifyToken(token) |
| 46 | + require.NoError(t, err) |
| 47 | + require.NotNil(t, payload) |
| 48 | + require.Equal(t, username, payload.Username) |
| 49 | + }) |
| 50 | + |
| 51 | + t.Run("VerifyToken with Expired Token", func(t *testing.T) { |
| 52 | + username := "testuser" |
| 53 | + //two minutes ago |
| 54 | + expiredDuration := -time.Minute * 2 |
| 55 | + |
| 56 | + token, _, err := maker.CreateToken(username, expiredDuration) |
| 57 | + |
| 58 | + payload, err := maker.VerifyToken(token) |
| 59 | + require.Error(t, err) |
| 60 | + require.Nil(t, payload) |
| 61 | + }) |
| 62 | + |
| 63 | + t.Run("CreateToken with Zero Duration", func(t *testing.T) { |
| 64 | + username := "testuser" |
| 65 | + |
| 66 | + token, payload, err := maker.CreateToken(username, 0) |
| 67 | + require.Error(t, err) |
| 68 | + require.Empty(t, token) |
| 69 | + require.Nil(t, payload) |
| 70 | + }) |
| 71 | + |
| 72 | + t.Run("CreateToken with Negative Duration", func(t *testing.T) { |
| 73 | + username := "testuser" |
| 74 | + |
| 75 | + token, payload, err := maker.CreateToken(username, -time.Minute) |
| 76 | + require.Error(t, err) |
| 77 | + require.Empty(t, token) |
| 78 | + require.Nil(t, payload) |
| 79 | + }) |
| 80 | + |
| 81 | + t.Run("VerifyToken with Altered Token", func(t *testing.T) { |
| 82 | + username := "testuser" |
| 83 | + duration := time.Minute |
| 84 | + |
| 85 | + token, _, err := maker.CreateToken(username, duration) |
| 86 | + require.NoError(t, err) |
51 | 87 |
|
52 | | - payload, err := maker.VerifyToken("invalidtoken") |
53 | | - require.Error(t, err, "Invalid token verification should error") |
54 | | - require.EqualError(t, err, ErrInvalidToken.Error(), "Error should be ErrInvalidToken") |
55 | | - require.Nil(t, payload, "Payload should be nil for an invalid token") |
| 88 | + alteredToken := token + "something-extra" |
| 89 | + payload, err := maker.VerifyToken(alteredToken) |
| 90 | + require.Error(t, err) |
| 91 | + require.Nil(t, payload) |
| 92 | + }) |
56 | 93 | } |
0 commit comments