node: make jwt test less dependent on time (#25016)
This commit is contained in:
parent
2227589f9b
commit
6f075bf6af
@ -314,6 +314,11 @@ func TestJWT(t *testing.T) {
|
|||||||
ss, _ := jwt.NewWithClaims(method, testClaim(input)).SignedString(secret)
|
ss, _ := jwt.NewWithClaims(method, testClaim(input)).SignedString(secret)
|
||||||
return ss
|
return ss
|
||||||
}
|
}
|
||||||
|
srv := createAndStartServer(t, &httpConfig{jwtSecret: []byte("secret")},
|
||||||
|
true, &wsConfig{Origins: []string{"*"}, jwtSecret: []byte("secret")})
|
||||||
|
wsUrl := fmt.Sprintf("ws://%v", srv.listenAddr())
|
||||||
|
htUrl := fmt.Sprintf("http://%v", srv.listenAddr())
|
||||||
|
|
||||||
expOk := []string{
|
expOk := []string{
|
||||||
fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()})),
|
fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()})),
|
||||||
fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + 4})),
|
fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + 4})),
|
||||||
@ -327,6 +332,14 @@ func TestJWT(t *testing.T) {
|
|||||||
"bar": "baz",
|
"bar": "baz",
|
||||||
})),
|
})),
|
||||||
}
|
}
|
||||||
|
for i, token := range expOk {
|
||||||
|
if err := wsRequest(t, wsUrl, "Authorization", token); err != nil {
|
||||||
|
t.Errorf("test %d-ws, token '%v': expected ok, got %v", i, token, err)
|
||||||
|
}
|
||||||
|
if resp := rpcRequest(t, htUrl, "Authorization", token); resp.StatusCode != 200 {
|
||||||
|
t.Errorf("test %d-http, token '%v': expected ok, got %v", i, token, resp.StatusCode)
|
||||||
|
}
|
||||||
|
}
|
||||||
expFail := []string{
|
expFail := []string{
|
||||||
// future
|
// future
|
||||||
fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + 6})),
|
fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + 6})),
|
||||||
@ -351,19 +364,6 @@ func TestJWT(t *testing.T) {
|
|||||||
fmt.Sprintf("Bearer\t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()})),
|
fmt.Sprintf("Bearer\t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()})),
|
||||||
fmt.Sprintf("Bearer \t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()})),
|
fmt.Sprintf("Bearer \t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()})),
|
||||||
}
|
}
|
||||||
srv := createAndStartServer(t, &httpConfig{jwtSecret: []byte("secret")},
|
|
||||||
true, &wsConfig{Origins: []string{"*"}, jwtSecret: []byte("secret")})
|
|
||||||
wsUrl := fmt.Sprintf("ws://%v", srv.listenAddr())
|
|
||||||
htUrl := fmt.Sprintf("http://%v", srv.listenAddr())
|
|
||||||
|
|
||||||
for i, token := range expOk {
|
|
||||||
if err := wsRequest(t, wsUrl, "Authorization", token); err != nil {
|
|
||||||
t.Errorf("test %d-ws, token '%v': expected ok, got %v", i, token, err)
|
|
||||||
}
|
|
||||||
if resp := rpcRequest(t, htUrl, "Authorization", token); resp.StatusCode != 200 {
|
|
||||||
t.Errorf("test %d-http, token '%v': expected ok, got %v", i, token, resp.StatusCode)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for i, token := range expFail {
|
for i, token := range expFail {
|
||||||
if err := wsRequest(t, wsUrl, "Authorization", token); err == nil {
|
if err := wsRequest(t, wsUrl, "Authorization", token); err == nil {
|
||||||
t.Errorf("tc %d-ws, token '%v': expected not to allow, got ok", i, token)
|
t.Errorf("tc %d-ws, token '%v': expected not to allow, got ok", i, token)
|
||||||
|
Loading…
Reference in New Issue
Block a user