75 lines
2 KiB
Ruby
75 lines
2 KiB
Ruby
# frozen_string_literal: true
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe DependencyProxy::AuthTokenService do
|
|
include DependencyProxyHelpers
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
let_it_be(:deploy_token) { create(:deploy_token) }
|
|
|
|
describe '.user_or_deploy_token_from_jwt' do
|
|
subject { described_class.user_or_deploy_token_from_jwt(token.encoded) }
|
|
|
|
shared_examples 'handling token errors' do
|
|
context 'with a decoding error' do
|
|
before do
|
|
allow(JWT).to receive(:decode).and_raise(JWT::DecodeError)
|
|
end
|
|
|
|
it { is_expected.to eq(nil) }
|
|
end
|
|
|
|
context 'with an immature signature error' do
|
|
before do
|
|
allow(JWT).to receive(:decode).and_raise(JWT::ImmatureSignature)
|
|
end
|
|
|
|
it { is_expected.to eq(nil) }
|
|
end
|
|
|
|
context 'with an expired signature error' do
|
|
it 'returns nil' do
|
|
travel_to(Time.zone.now + Auth::DependencyProxyAuthenticationService.token_expire_at + 1.minute) do
|
|
expect(subject).to eq(nil)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with a user' do
|
|
let_it_be(:token) { build_jwt(user) }
|
|
|
|
it { is_expected.to eq(user) }
|
|
|
|
context 'with an invalid user id' do
|
|
let_it_be(:token) { build_jwt { |jwt| jwt['user_id'] = 'this_is_not_a_user_id' } }
|
|
|
|
it 'raises an not found error' do
|
|
expect { subject }.to raise_error(ActiveRecord::RecordNotFound)
|
|
end
|
|
end
|
|
|
|
it_behaves_like 'handling token errors'
|
|
end
|
|
|
|
context 'with a deploy token' do
|
|
let_it_be(:token) { build_jwt(deploy_token) }
|
|
|
|
it { is_expected.to eq(deploy_token) }
|
|
|
|
context 'with an invalid token' do
|
|
let_it_be(:token) { build_jwt { |jwt| jwt['deploy_token'] = 'this_is_not_a_token' } }
|
|
|
|
it { is_expected.to eq(nil) }
|
|
end
|
|
|
|
it_behaves_like 'handling token errors'
|
|
end
|
|
|
|
context 'with an empty token payload' do
|
|
let_it_be(:token) { build_jwt(nil) }
|
|
|
|
it { is_expected.to eq(nil) }
|
|
end
|
|
end
|
|
end
|