mirror of
https://github.com/hatchet-dev/hatchet.git
synced 2026-05-07 10:31:35 -05:00
092f54c64f
* refactor: separate api and engine repositories, change ticker logic * fix: nil error blocks * fix: run migration on load test * fix: generate db package in load test * fix: test.yml * fix: add pnpm to load test * fix: don't lock CTEs with columns that don't get updated * fix: update heartbeat for worker every 4 seconds, not 5 * chore: remove dead code * chore: update python sdk * chore: add back telemetry attributes
207 lines
4.3 KiB
Go
207 lines
4.3 KiB
Go
//go:build integration
|
|
|
|
package token_test
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/hatchet-dev/hatchet/internal/auth/token"
|
|
"github.com/hatchet-dev/hatchet/internal/config/database"
|
|
"github.com/hatchet-dev/hatchet/internal/encryption"
|
|
"github.com/hatchet-dev/hatchet/internal/repository"
|
|
"github.com/hatchet-dev/hatchet/internal/testutils"
|
|
)
|
|
|
|
func TestCreateTenantToken(t *testing.T) { // make sure no cache is used for tests
|
|
testutils.RunTestWithDatabase(t, func(conf *database.Config) error {
|
|
jwtManager := getJWTManager(t, conf)
|
|
|
|
tenantId := uuid.New().String()
|
|
|
|
// create the tenant
|
|
slugSuffix, err := encryption.GenerateRandomBytes(8)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
_, err = conf.APIRepository.Tenant().CreateTenant(&repository.CreateTenantOpts{
|
|
ID: &tenantId,
|
|
Name: "test-tenant",
|
|
Slug: fmt.Sprintf("test-tenant-%s", slugSuffix),
|
|
})
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
token, err := jwtManager.GenerateTenantToken(tenantId, "test token")
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
// validate the token
|
|
newTenantId, err := jwtManager.ValidateTenantToken(token)
|
|
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, tenantId, newTenantId)
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func TestRevokeTenantToken(t *testing.T) {
|
|
_ = os.Setenv("CACHE_DURATION", "0")
|
|
|
|
testutils.RunTestWithDatabase(t, func(conf *database.Config) error {
|
|
jwtManager := getJWTManager(t, conf)
|
|
|
|
tenantId := uuid.New().String()
|
|
|
|
// create the tenant
|
|
slugSuffix, err := encryption.GenerateRandomBytes(8)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
_, err = conf.APIRepository.Tenant().CreateTenant(&repository.CreateTenantOpts{
|
|
ID: &tenantId,
|
|
Name: "test-tenant",
|
|
Slug: fmt.Sprintf("test-tenant-%s", slugSuffix),
|
|
})
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
token, err := jwtManager.GenerateTenantToken(tenantId, "test token")
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
// validate the token
|
|
_, err = jwtManager.ValidateTenantToken(token)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
// revoke the token
|
|
apiTokens, err := conf.APIRepository.APIToken().ListAPITokensByTenant(tenantId)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
assert.Len(t, apiTokens, 1)
|
|
err = conf.APIRepository.APIToken().RevokeAPIToken(apiTokens[0].ID)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
// validate the token again
|
|
_, err = jwtManager.ValidateTenantToken(token)
|
|
|
|
// error as the token was revoked
|
|
assert.Error(t, err)
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func TestRevokeTenantTokenCache(t *testing.T) {
|
|
_ = os.Setenv("CACHE_DURATION", "60s")
|
|
|
|
testutils.RunTestWithDatabase(t, func(conf *database.Config) error {
|
|
jwtManager := getJWTManager(t, conf)
|
|
|
|
tenantId := uuid.New().String()
|
|
|
|
// create the tenant
|
|
slugSuffix, err := encryption.GenerateRandomBytes(8)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
_, err = conf.APIRepository.Tenant().CreateTenant(&repository.CreateTenantOpts{
|
|
ID: &tenantId,
|
|
Name: "test-tenant",
|
|
Slug: fmt.Sprintf("test-tenant-%s", slugSuffix),
|
|
})
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
token, err := jwtManager.GenerateTenantToken(tenantId, "test token")
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
// validate the token
|
|
_, err = jwtManager.ValidateTenantToken(token)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
// revoke the token
|
|
apiTokens, err := conf.APIRepository.APIToken().ListAPITokensByTenant(tenantId)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
assert.Len(t, apiTokens, 1)
|
|
err = conf.APIRepository.APIToken().RevokeAPIToken(apiTokens[0].ID)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
// validate the token again
|
|
_, err = jwtManager.ValidateTenantToken(token)
|
|
|
|
// no error as it is cached
|
|
assert.NoError(t, err)
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func getJWTManager(t *testing.T, conf *database.Config) token.JWTManager {
|
|
t.Helper()
|
|
|
|
masterKeyBytes, privateJWTBytes, publicJWTBytes, err := encryption.GenerateLocalKeys()
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
encryptionService, err := encryption.NewLocalEncryption(masterKeyBytes, privateJWTBytes, publicJWTBytes)
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
tokenRepo := conf.EngineRepository.APIToken()
|
|
|
|
jwtManager, err := token.NewJWTManager(encryptionService, tokenRepo, &token.TokenOpts{
|
|
Issuer: "hatchet",
|
|
Audience: "hatchet",
|
|
})
|
|
|
|
if err != nil {
|
|
t.Fatal(err.Error())
|
|
}
|
|
|
|
return jwtManager
|
|
}
|