blob: 42f9155cec6935d694864f153b90b950093551a1 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
|
package com.drivergrp.core
import com.drivergrp.core.auth._
import akka.http.scaladsl.testkit.ScalatestRouteTest
import akka.http.scaladsl.server._
import Directives._
import akka.http.scaladsl.model.headers.{HttpChallenges, RawHeader}
import akka.http.scaladsl.server.AuthenticationFailedRejection.CredentialsRejected
import org.scalatest.mock.MockitoSugar
import org.scalatest.{FlatSpec, Matchers}
import scala.concurrent.Future
import scalaz.OptionT
class AuthTest extends FlatSpec with Matchers with MockitoSugar with ScalatestRouteTest {
val authStatusService: AuthService[User] = new AuthService[User] {
override def authStatus(authToken: AuthToken): OptionT[Future, User] = OptionT.optionT[Future] {
Future.successful(Some(new User() {
override def id: Id[User] = Id[User](1L)
override def roles: Set[Role] = Set(PathologistRole)
}))
}
}
import authStatusService._
"'authorize' directive" should "throw error is auth token is not in the request" in {
Get("/naive/attempt") ~>
authorize(CanSignOutReport) {
case (authToken, user) =>
complete("Never going to be here")
} ~>
check {
handled shouldBe false
rejections should contain(MissingHeaderRejection("WWW-Authenticate"))
}
}
it should "throw error is authorized user is not having the requested permission" in {
val referenceAuthToken = AuthToken(Base64("I am a pathologist's token"))
Post("/administration/attempt").addHeader(
RawHeader(AuthService.AuthenticationTokenHeader, referenceAuthToken.value.value)
) ~>
authorize(CanAssignRoles) {
case (authToken, user) =>
complete("Never going to get here")
} ~>
check {
handled shouldBe false
rejections should contain(
AuthenticationFailedRejection(
CredentialsRejected,
HttpChallenges.basic("User does not have the required permission CanAssignRoles")))
}
}
it should "pass and retrieve the token to client code, if token is in request and user has permission" in {
val referenceAuthToken = AuthToken(Base64("I am token"))
Get("/valid/attempt/?a=2&b=5").addHeader(
RawHeader(AuthService.AuthenticationTokenHeader, referenceAuthToken.value.value)
) ~>
authorize(CanSignOutReport) {
case (authToken, user) =>
complete("Alright, \"" + authToken.value.value + "\" is handled")
} ~>
check {
handled shouldBe true
responseAs[String] shouldBe "Alright, \"I am token\" is handled"
}
}
}
|