| 
 | 1 | +package auth  | 
 | 2 | + | 
 | 3 | +import (  | 
 | 4 | +	"errors"  | 
 | 5 | +	"net/url"  | 
 | 6 | +	"testing"  | 
 | 7 | +	"time"  | 
 | 8 | + | 
 | 9 | +	"github.com/diggerhq/digger/opentaco/internal/config"  | 
 | 10 | +)  | 
 | 11 | + | 
 | 12 | +// helper: set mock config for each test  | 
 | 13 | +func withMockConfig(t *testing.T, secret string, err error, fn func()) {  | 
 | 14 | +	orig := config.GetConfig() // capture current provider  | 
 | 15 | + | 
 | 16 | +	config.SetConfig(&config.MockConfig{  | 
 | 17 | +		Secret: secret,  | 
 | 18 | +		Err:    err,  | 
 | 19 | +	})  | 
 | 20 | + | 
 | 21 | +	t.Cleanup(func() {  | 
 | 22 | +		config.SetConfig(orig)  | 
 | 23 | +	})  | 
 | 24 | + | 
 | 25 | +	fn()  | 
 | 26 | +}  | 
 | 27 | + | 
 | 28 | +func TestSignAndVerify_Success(t *testing.T) {  | 
 | 29 | +	withMockConfig(t, "test-secret", nil, func() {  | 
 | 30 | +		exp := time.Now().Add(1 * time.Hour)  | 
 | 31 | + | 
 | 32 | +		signed, err := SignURL("https://example.com", "/files/123", exp)  | 
 | 33 | +		if err != nil {  | 
 | 34 | +			t.Fatalf("SignURL() unexpected error: %v", err)  | 
 | 35 | +		}  | 
 | 36 | + | 
 | 37 | +		if err := VerifySignedUrl(signed); err != nil {  | 
 | 38 | +			t.Fatalf("VerifySignedUrl() unexpected error: %v", err)  | 
 | 39 | +		}  | 
 | 40 | +	})  | 
 | 41 | +}  | 
 | 42 | + | 
 | 43 | +func TestVerifySignedUrl_Expired(t *testing.T) {  | 
 | 44 | +	withMockConfig(t, "test-secret", nil, func() {  | 
 | 45 | +		expired := time.Now().Add(-2 * time.Minute)  | 
 | 46 | + | 
 | 47 | +		signed, err := SignURL("https://example.com", "/files/123", expired)  | 
 | 48 | +		if err != nil {  | 
 | 49 | +			t.Fatalf("SignURL() unexpected error: %v", err)  | 
 | 50 | +		}  | 
 | 51 | + | 
 | 52 | +		if err := VerifySignedUrl(signed); err == nil {  | 
 | 53 | +			t.Fatalf("expected error for expired URL, got nil")  | 
 | 54 | +		}  | 
 | 55 | +	})  | 
 | 56 | +}  | 
 | 57 | + | 
 | 58 | +func TestVerifySignedUrl_TamperedPath(t *testing.T) {  | 
 | 59 | +	withMockConfig(t, "test-secret", nil, func() {  | 
 | 60 | +		exp := time.Now().Add(1 * time.Hour)  | 
 | 61 | + | 
 | 62 | +		signed, err := SignURL("https://example.com", "/files/123", exp)  | 
 | 63 | +		if err != nil {  | 
 | 64 | +			t.Fatalf("SignURL() unexpected error: %v", err)  | 
 | 65 | +		}  | 
 | 66 | + | 
 | 67 | +		// parse and change the path AFTER signing  | 
 | 68 | +		u, _ := url.Parse(signed)  | 
 | 69 | +		u.Path = "/files/999" // attacker changes resource  | 
 | 70 | +		tampered := u.String()  | 
 | 71 | + | 
 | 72 | +		if err := VerifySignedUrl(tampered); err == nil {  | 
 | 73 | +			t.Fatalf("expected invalid signature error for tampered path, got nil")  | 
 | 74 | +		}  | 
 | 75 | +	})  | 
 | 76 | +}  | 
 | 77 | + | 
 | 78 | +func TestVerifySignedUrl_TamperedSignature(t *testing.T) {  | 
 | 79 | +	withMockConfig(t, "test-secret", nil, func() {  | 
 | 80 | +		exp := time.Now().Add(1 * time.Hour)  | 
 | 81 | + | 
 | 82 | +		signed, err := SignURL("https://example.com", "/files/123", exp)  | 
 | 83 | +		if err != nil {  | 
 | 84 | +			t.Fatalf("SignURL() unexpected error: %v", err)  | 
 | 85 | +		}  | 
 | 86 | + | 
 | 87 | +		u, _ := url.Parse(signed)  | 
 | 88 | +		q := u.Query()  | 
 | 89 | +		q.Set("sig", "definitely-wrong-signature")  | 
 | 90 | +		u.RawQuery = q.Encode()  | 
 | 91 | +		tampered := u.String()  | 
 | 92 | + | 
 | 93 | +		if err := VerifySignedUrl(tampered); err == nil {  | 
 | 94 | +			t.Fatalf("expected invalid signature error for tampered signature, got nil")  | 
 | 95 | +		}  | 
 | 96 | +	})  | 
 | 97 | +}  | 
 | 98 | + | 
 | 99 | +func TestVerifySignedUrl_BadExpiryFormat(t *testing.T) {  | 
 | 100 | +	withMockConfig(t, "test-secret", nil, func() {  | 
 | 101 | +		exp := time.Now().Add(1 * time.Hour)  | 
 | 102 | + | 
 | 103 | +		signed, err := SignURL("https://example.com", "/files/123", exp)  | 
 | 104 | +		if err != nil {  | 
 | 105 | +			t.Fatalf("SignURL() unexpected error: %v", err)  | 
 | 106 | +		}  | 
 | 107 | + | 
 | 108 | +		u, _ := url.Parse(signed)  | 
 | 109 | +		q := u.Query()  | 
 | 110 | +		q.Set("exp", "not-a-timestamp") // break exp  | 
 | 111 | +		u.RawQuery = q.Encode()  | 
 | 112 | +		bad := u.String()  | 
 | 113 | + | 
 | 114 | +		if err := VerifySignedUrl(bad); err == nil {  | 
 | 115 | +			t.Fatalf("expected error for bad exp format, got nil")  | 
 | 116 | +		}  | 
 | 117 | +	})  | 
 | 118 | +}  | 
 | 119 | + | 
 | 120 | +func TestSignURL_SecretError(t *testing.T) {  | 
 | 121 | +	withMockConfig(t, "", errors.New("nope"), func() {  | 
 | 122 | +		_, err := SignURL("https://example.com", "/files/123", time.Now().Add(time.Hour))  | 
 | 123 | +		if err == nil {  | 
 | 124 | +			t.Fatalf("expected error because secret retrieval failed in SignURL, got nil")  | 
 | 125 | +		}  | 
 | 126 | +	})  | 
 | 127 | +}  | 
 | 128 | + | 
 | 129 | +func TestVerifySignedUrl_SecretError(t *testing.T) {  | 
 | 130 | +	withMockConfig(t, "", errors.New("nope"), func() {  | 
 | 131 | +		// doesn't matter if URL shape is valid, config will fail first  | 
 | 132 | +		testURL := "https://example.com/files/123?exp=123&sig=abc"  | 
 | 133 | + | 
 | 134 | +		if err := VerifySignedUrl(testURL); err == nil {  | 
 | 135 | +			t.Fatalf("expected error because secret retrieval failed in VerifySignedUrl, got nil")  | 
 | 136 | +		}  | 
 | 137 | +	})  | 
 | 138 | +}  | 
 | 139 | + | 
0 commit comments