func TestParseRequest(t *testing.T) { // load keys from disk privateKey := test.LoadRSAPrivateKeyFromDisk("../test/sample_key") publicKey := test.LoadRSAPublicKeyFromDisk("../test/sample_key.pub") keyfunc := func(*jwt.Token) (interface{}, error) { return publicKey, nil } // Bearer token request for _, data := range requestTestData { // Make token from claims tokenString := test.MakeSampleToken(data.claims, privateKey) // Make query string for k, vv := range data.query { for i, v := range vv { if strings.Contains(v, "%v") { data.query[k][i] = fmt.Sprintf(v, tokenString) } } } // Make request from test struct r, _ := http.NewRequest("GET", fmt.Sprintf("/?%v", data.query.Encode()), nil) for k, v := range data.headers { if strings.Contains(v, "%v") { r.Header.Set(k, fmt.Sprintf(v, tokenString)) } else { r.Header.Set(k, tokenString) } } token, err := ParseFromRequestWithClaims(r, data.extractor, jwt.MapClaims{}, keyfunc) if token == nil { t.Errorf("[%v] Token was not found: %v", data.name, err) continue } if !reflect.DeepEqual(data.claims, token.Claims) { t.Errorf("[%v] Claims mismatch. Expecting: %v Got: %v", data.name, data.claims, token.Claims) } if data.valid && err != nil { t.Errorf("[%v] Error while verifying token: %v", data.name, err) } if !data.valid && err == nil { t.Errorf("[%v] Invalid token passed validation", data.name) } } }
func TestParser_Parse(t *testing.T) { privateKey := test.LoadRSAPrivateKeyFromDisk("test/sample_key") // Iterate over test data set and run tests for _, data := range jwtTestData { // If the token string is blank, use helper function to generate string if data.tokenString == "" { data.tokenString = test.MakeSampleToken(data.claims, privateKey) } // Parse the token var token *jwt.Token var err error var parser = data.parser if parser == nil { parser = new(jwt.Parser) } // Figure out correct claims type switch data.claims.(type) { case jwt.MapClaims: token, err = parser.ParseWithClaims(data.tokenString, jwt.MapClaims{}, data.keyfunc) case *jwt.StandardClaims: token, err = parser.ParseWithClaims(data.tokenString, &jwt.StandardClaims{}, data.keyfunc) } // Verify result matches expectation if !reflect.DeepEqual(data.claims, token.Claims) { t.Errorf("[%v] Claims mismatch. Expecting: %v Got: %v", data.name, data.claims, token.Claims) } if data.valid && err != nil { t.Errorf("[%v] Error while verifying token: %T:%v", data.name, err, err) } if !data.valid && err == nil { t.Errorf("[%v] Invalid token passed validation", data.name) } if (err == nil && !token.Valid) || (err != nil && token.Valid) { t.Errorf("[%v] Inconsistent behavior between returned error and token.Valid", data.name) } if data.errors != 0 { if err == nil { t.Errorf("[%v] Expecting error. Didn't get one.", data.name) } else { ve := err.(*jwt.ValidationError) // compare the bitfield part of the error if e := ve.Errors; e != data.errors { t.Errorf("[%v] Errors don't match expectation. %v != %v", data.name, e, data.errors) } if err.Error() == keyFuncError.Error() && ve.Inner != keyFuncError { t.Errorf("[%v] Inner error does not match expectation. %v != %v", data.name, ve.Inner, keyFuncError) } } } if data.valid && token.Signature == "" { t.Errorf("[%v] Signature is left unpopulated after parsing", data.name) } } }