2024-02-02 15:25:59 +01:00
|
|
|
// Copyright 2024 The Gitea Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package actions
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
|
2024-03-05 18:34:42 +01:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2024-02-02 15:25:59 +01:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestCreateAuthorizationToken(t *testing.T) {
|
|
|
|
var taskID int64 = 23
|
|
|
|
token, err := CreateAuthorizationToken(taskID, 1, 2)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotEqual(t, "", token)
|
|
|
|
claims := jwt.MapClaims{}
|
2024-04-13 19:32:15 +02:00
|
|
|
_, err = jwt.ParseWithClaims(token, claims, func(t *jwt.Token) (any, error) {
|
2024-02-18 18:39:04 +01:00
|
|
|
return setting.GetGeneralTokenSigningSecret(), nil
|
2024-02-02 15:25:59 +01:00
|
|
|
})
|
|
|
|
assert.Nil(t, err)
|
|
|
|
scp, ok := claims["scp"]
|
|
|
|
assert.True(t, ok, "Has scp claim in jwt token")
|
|
|
|
assert.Contains(t, scp, "Actions.Results:1:2")
|
|
|
|
taskIDClaim, ok := claims["TaskID"]
|
|
|
|
assert.True(t, ok, "Has TaskID claim in jwt token")
|
|
|
|
assert.Equal(t, float64(taskID), taskIDClaim, "Supplied taskid must match stored one")
|
2024-03-05 18:34:42 +01:00
|
|
|
acClaim, ok := claims["ac"]
|
|
|
|
assert.True(t, ok, "Has ac claim in jwt token")
|
|
|
|
ac, ok := acClaim.(string)
|
|
|
|
assert.True(t, ok, "ac claim is a string for buildx gha cache")
|
|
|
|
scopes := []actionsCacheScope{}
|
|
|
|
err = json.Unmarshal([]byte(ac), &scopes)
|
|
|
|
assert.NoError(t, err, "ac claim is a json list for buildx gha cache")
|
|
|
|
assert.GreaterOrEqual(t, len(scopes), 1, "Expected at least one action cache scope for buildx gha cache")
|
2024-02-02 15:25:59 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestParseAuthorizationToken(t *testing.T) {
|
|
|
|
var taskID int64 = 23
|
|
|
|
token, err := CreateAuthorizationToken(taskID, 1, 2)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotEqual(t, "", token)
|
|
|
|
headers := http.Header{}
|
|
|
|
headers.Set("Authorization", "Bearer "+token)
|
|
|
|
rTaskID, err := ParseAuthorizationToken(&http.Request{
|
|
|
|
Header: headers,
|
|
|
|
})
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Equal(t, taskID, rTaskID)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestParseAuthorizationTokenNoAuthHeader(t *testing.T) {
|
|
|
|
headers := http.Header{}
|
|
|
|
rTaskID, err := ParseAuthorizationToken(&http.Request{
|
|
|
|
Header: headers,
|
|
|
|
})
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Equal(t, int64(0), rTaskID)
|
|
|
|
}
|