Files
anchorage/internal/pkg/token/token_test.go
William Gill 12bf35caf8 anchorage v1.0 initial tree
Greenfield Go multi-tenant IPFS Pinning Service wire-compatible with the
IPFS Pinning Services API spec. Paired 1:1 with Kubo over localhost RPC,
clustered via embedded NATS JetStream, Postgres source-of-truth with
RLS-enforced tenancy, Fiber + huma v2 for the HTTP surface, Authentik
OIDC for session login with kid-rotated HS256 JWT API tokens.

Feature-complete against the 22-milestone build plan, including the
ship-it v1.0 gap items:

  * admin CLIs: drain/uncordon, maintenance, mint-token, rotate-key,
    prune-denylist, rebalance --dry-run, cache-stats, cluster-presences
  * TTL leader election via NATS KV, fence tokens, JetStream dedup
  * rebalancer (plan/apply split), reconciler, requeue sweeper
  * ristretto caches with NATS-backed cross-node invalidation
    (placements live-nodes + token denylist)
  * maintenance watchdog for stuck cluster-pause flag
  * Prometheus /metrics with CIDR ACL, HTTP/pin/scheduler/cache gauges
  * rate limiting: session (10/min) + anonymous global (120/min)
  * integration tests: rebalance, refcount multi-org, RLS belt
  * goreleaser (tar + deb/rpm/apk + Alpine Docker) targeting Gitea

Stack: Cobra/Viper, Fiber v2 + huma v2, embedded NATS JetStream,
pgx/sqlc/golang-migrate, ristretto, TypeID, prometheus/client_golang,
testcontainers-go.
2026-04-16 18:13:36 -05:00

106 lines
2.6 KiB
Go

package token_test
import (
"context"
"testing"
"time"
"anchorage/internal/pkg/ids"
"anchorage/internal/pkg/store"
"anchorage/internal/pkg/store/memstore"
"anchorage/internal/pkg/token"
)
func newSigner(t *testing.T) (*token.Signer, *memstore.Store) {
t.Helper()
s := memstore.New()
sg, err := token.NewSigner(
[]token.SigningKey{{
ID: "test-kid",
Key: []byte("0123456789abcdef0123456789abcdef"),
Primary: true,
}},
"https://anchorage.test/",
"anchorage",
s.Tokens(),
)
if err != nil {
t.Fatalf("NewSigner: %v", err)
}
return sg, s
}
func TestMintAndParseRoundTrip(t *testing.T) {
sg, _ := newSigner(t)
orgID := ids.MustNewOrg()
userID := ids.MustNewUser()
raw, claims, err := sg.Mint(context.Background(), orgID, userID, "orgadmin", []string{"pin:write"}, time.Hour)
if err != nil {
t.Fatalf("Mint: %v", err)
}
if claims.Org != orgID || claims.User != userID {
t.Errorf("claims org/user mismatch")
}
if claims.Role != "orgadmin" {
t.Errorf("role = %q", claims.Role)
}
parsed, err := sg.Parse(context.Background(), raw)
if err != nil {
t.Fatalf("Parse: %v", err)
}
if parsed.Org != orgID {
t.Errorf("parsed.Org = %v", parsed.Org)
}
if parsed.ID != claims.ID {
t.Errorf("jti changed during round-trip")
}
}
func TestParseRejectsExpired(t *testing.T) {
sg, _ := newSigner(t)
raw, _, err := sg.Mint(context.Background(), ids.MustNewOrg(), ids.MustNewUser(), "member", nil, time.Millisecond)
if err != nil {
t.Fatalf("Mint: %v", err)
}
time.Sleep(10 * time.Millisecond)
if _, err := sg.Parse(context.Background(), raw); err == nil {
t.Error("expected expired token to be rejected")
}
}
func TestRevokeAddsToDenylist(t *testing.T) {
sg, s := newSigner(t)
raw, claims, err := sg.Mint(context.Background(), ids.MustNewOrg(), ids.MustNewUser(), "member", nil, time.Hour)
if err != nil {
t.Fatalf("Mint: %v", err)
}
// Write the token metadata to the store so Revoke has something to update.
if err := s.Tokens().Create(context.Background(), &store.APIToken{
JTI: mustParseToken(t, claims.ID), OrgID: claims.Org, UserID: claims.User,
Label: "test", ExpiresAt: claims.ExpiresAt.Time,
}); err != nil {
t.Fatalf("seed token: %v", err)
}
jti := mustParseToken(t, claims.ID)
if err := sg.Revoke(context.Background(), jti, claims.ExpiresAt.Time, "test"); err != nil {
t.Fatalf("Revoke: %v", err)
}
if _, err := sg.Parse(context.Background(), raw); err == nil {
t.Error("expected revoked token to be rejected")
}
}
func mustParseToken(t *testing.T, s string) ids.TokenID {
t.Helper()
id, err := ids.ParseToken(s)
if err != nil {
t.Fatalf("ParseToken(%q): %v", s, err)
}
return id
}