Catalyst-Plugin-OIDC
view release on metacpan or search on metacpan
t/resource-server-IT.t view on Meta::CPAN
#!/usr/bin/env perl
use utf8;
use strict;
use warnings;
use Test::More;
use Test::MockModule;
use HTTP::Request::Common;
use FindBin qw($Bin);
use lib "$Bin/resource-server-IT/MyCatalystApp/lib";
local $ENV{MOJO_LOG_LEVEL} = 'error';
local @ARGV = ('version');
my $provider_app = require "$Bin/resource-server-IT/MyProviderApp/app.pl";
my $mock_oidc_client = Test::MockModule->new('OIDC::Client');
$mock_oidc_client->redefine('user_agent' => $provider_app->ua);
my $mock_crypt_jwt = Test::MockModule->new('Crypt::JWT');
$mock_crypt_jwt->redefine('decode_jwt' => sub {
my %params = @_;
my %claims = $params{token} eq 'Doe'
? (iss => 'my_issuer',
exp => 12345,
aud => 'my_id',
sub => 'DOEJ',
firstName => 'John',
lastName => 'Doe',
roles => [qw/app.role1 app.role2/])
: $params{token} eq 'Smith'
? (iss => 'my_issuer',
exp => 12345,
aud => 'my_id',
sub => 'SMITHL',
firstName => 'Liam',
lastName => 'Smith',
roles => [qw/app.role3/])
: die 'invalid token';
return (
$params{decode_header} ? {} : (),
\%claims,
);
});
require Catalyst::Test;
Catalyst::Test->import('MyCatalystApp');
subtest 'Get resource - unknown user' => sub {
my $res = request(GET '/my-resource',
Authorization => 'Bearer Unknown');
is($res->code, 401, 'Expected error code');
is($res->content, '{"error":"Unauthorized"}', 'Expected response content');
};
subtest 'Get resource - user with insufficient roles' => sub {
my $res = request(GET '/my-resource',
Authorization => 'Bearer Smith');
is($res->code, 403, 'Expected error code');
is($res->content, '{"error":"Forbidden"}', 'Expected response content');
};
subtest 'Get resource - known user with sufficient roles' => sub {
my $res = request(GET '/my-resource',
Authorization => 'Bearer Doe');
is($res->code, 200, 'Expected code');
is($res->content, '{"user_login":"DOEJ"}', 'Expected response content');
( run in 2.735 seconds using v1.01-cache-2.11-cpan-5837b0d9d2c )