-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathserverauth_test.go
More file actions
89 lines (74 loc) · 2.59 KB
/
serverauth_test.go
File metadata and controls
89 lines (74 loc) · 2.59 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/*
Copyright 2021 Acacio Cruz acacio@acacio.coom
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package grpcutil
import (
"context"
"testing"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/metadata"
"google.golang.org/grpc/status"
)
func TestCheckRPCAuth_NoMetadata(t *testing.T) {
ctx := context.Background()
err := CheckRPCAuth(ctx)
if err == nil {
t.Fatal("expected error when no metadata is present")
}
st, ok := status.FromError(err)
if !ok {
t.Fatalf("expected gRPC status error, got: %T %v", err, err)
}
if st.Code() != codes.InvalidArgument {
t.Errorf("expected InvalidArgument, got: %s", st.Code())
}
}
func TestCheckRPCAuth_NoAuthorizationHeader(t *testing.T) {
md := metadata.Pairs("content-type", "application/grpc")
ctx := metadata.NewIncomingContext(context.Background(), md)
err := CheckRPCAuth(ctx)
if err == nil {
t.Fatal("expected error when authorization header is absent")
}
st, _ := status.FromError(err)
if st.Code() != codes.InvalidArgument {
t.Errorf("expected InvalidArgument, got: %s", st.Code())
}
}
func TestCheckRPCAuth_WithAuthorizationHeader(t *testing.T) {
md := metadata.Pairs("authorization", "Bearer sometoken")
ctx := metadata.NewIncomingContext(context.Background(), md)
err := CheckRPCAuth(ctx)
if err != nil {
t.Errorf("expected nil error when authorization header is present, got: %v", err)
}
}
func TestCheckRPCAuth_MultipleMetadataValues(t *testing.T) {
// Multiple authorization values — should not error as long as key exists
md := metadata.MD{
"authorization": []string{"Bearer token1", "Bearer token2"},
}
ctx := metadata.NewIncomingContext(context.Background(), md)
err := CheckRPCAuth(ctx)
if err != nil {
t.Errorf("expected nil error with multiple auth values, got: %v", err)
}
}
func TestCheckRPCAuth_EmptyAuthorizationValue(t *testing.T) {
// Key present but empty value — still considered present
md := metadata.Pairs("authorization", "")
ctx := metadata.NewIncomingContext(context.Background(), md)
err := CheckRPCAuth(ctx)
if err != nil {
t.Errorf("expected nil error when authorization key exists (even empty), got: %v", err)
}
}