public void Should_RevokeStringToken() { // mock user manager Mock <IUserStore <User> > userStore = new Mock <IUserStore <User> >(); // create test token var claims = new List <Claim> { new Claim(JwtRegisteredClaimNames.Sub, "*****@*****.**"), new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString()), }; var token = new JwtSecurityToken ( issuer: _configuration["JWT_ISSUER"], audience: _configuration["JWT_AUDIENCE"], claims: claims, expires: DateTime.UtcNow.AddMinutes(10), notBefore: DateTime.UtcNow, signingCredentials: new SigningCredentials( new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_configuration["JWT_KEY"])), SecurityAlgorithms.HmacSha256) ); JwtSecurityTokenHandler handler = new JwtSecurityTokenHandler(); string stringToken = handler.WriteToken(token); IJwtManager jwtManager = new InMemoryJwtManager(_configuration); Assert.True(jwtManager.RevokeToken(stringToken)); }
public void Should_CheckTokenIsRevoked_ReturnTrue() { IJwtManager jwtManager = new InMemoryJwtManager(_configuration); // create test token var claims = new List <Claim> { new Claim(JwtRegisteredClaimNames.Sub, "*****@*****.**"), new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString()), }; var token = new JwtSecurityToken ( issuer: _configuration["JWT_ISSUER"], audience: _configuration["JWT_AUDIENCE"], claims: claims, expires: DateTime.UtcNow.AddMinutes(10), notBefore: DateTime.UtcNow, signingCredentials: new SigningCredentials( new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_configuration["JWT_KEY"])), SecurityAlgorithms.HmacSha256) ); // add mocked token jwtManager.RevokeToken(token); Assert.True(jwtManager.IsRevoked(token)); }