Files
wonderwall/pkg/session/memory_test.go
Trong Huu Nguyen f73b4605a1 refactor: use encrypted cookie as session fallback
Co-Authored-By: Sindre Rødseth Hansen <sindre.rodseth.hansen@nav.no>
2021-10-04 13:17:04 +02:00

42 lines
979 B
Go

package session_test
import (
"context"
"github.com/nais/liberator/pkg/keygen"
"github.com/nais/wonderwall/pkg/cryptutil"
"testing"
"time"
"github.com/nais/wonderwall/pkg/session"
"github.com/stretchr/testify/assert"
)
func TestMemory(t *testing.T) {
key, err := keygen.Keygen(32)
assert.NoError(t, err)
crypter := cryptutil.New(key)
data := session.NewData("myid", "accesstoken", "idtoken")
encryptedData, err := data.Encrypt(crypter)
assert.NoError(t, err)
sess := session.NewMemory()
err = sess.Write(context.Background(), "key", encryptedData, time.Minute)
assert.NoError(t, err)
result, err := sess.Read(context.Background(), "key")
assert.NoError(t, err)
assert.Equal(t, encryptedData, result)
decrypted, err := result.Decrypt(crypter)
assert.NoError(t, err)
assert.Equal(t, data, decrypted)
err = sess.Delete(context.Background(), "key")
result, err = sess.Read(context.Background(), "key")
assert.Error(t, err)
assert.Nil(t, result)
}