-
-
Notifications
You must be signed in to change notification settings - Fork 99
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: Async key provider and errors should be resolved internally -- d…
…ynamic JWTs in tests (#338) * test: Async key provider should be resolved internaly * test: Async key provider errors should be resolved internaly * test: Async key provider errors should be resolved internally * feat: Async key provider * test: generate JWTs dynamically --------- Co-authored-by: NikitaFedorov1 <[email protected]> Co-authored-by: NikitaIT <[email protected]>
- Loading branch information
1 parent
54be35b
commit ad9317b
Showing
2 changed files
with
164 additions
and
21 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,135 @@ | ||
'use strict' | ||
|
||
const test = require('tap').test | ||
const Fastify = require('fastify') | ||
const jwt = require('../jwt') | ||
const { createSigner } = require('fast-jwt') | ||
|
||
test('Async key provider should be resolved internally', async function (t) { | ||
const fastify = Fastify() | ||
fastify.register(jwt, { | ||
secret: { | ||
private: 'supersecret', | ||
public: async () => Promise.resolve('supersecret') | ||
}, | ||
verify: { | ||
extractToken: (request) => request.headers.jwt, | ||
key: () => Promise.resolve('supersecret') | ||
} | ||
}) | ||
fastify.get('/', async function (request, reply) { | ||
const token = await reply.jwtSign({ user: 'test' }) | ||
request.headers.jwt = token | ||
await request.jwtVerify() | ||
return reply.send(request.user) | ||
}) | ||
const response = await fastify.inject({ | ||
method: 'get', | ||
url: '/', | ||
headers: { | ||
jwt: 'supersecret' | ||
} | ||
}) | ||
t.ok(response) | ||
t.comment("Should be 'undefined'") | ||
t.match(response.json(), { user: 'test' }) | ||
}) | ||
|
||
test('Async key provider errors should be resolved internally', async function (t) { | ||
const fastify = Fastify() | ||
fastify.register(jwt, { | ||
secret: { | ||
public: async () => Promise.resolve('key used per request, false not allowed') | ||
}, | ||
verify: { | ||
extractToken: (request) => request.headers.jwt, | ||
key: () => Promise.resolve('key not used') | ||
} | ||
}) | ||
fastify.get('/', async function (request, reply) { | ||
const signSync = createSigner({ key: 'invalid signature error' }) | ||
request.headers.jwt = signSync({ sub: '1234567890', name: 'John Doe', iat: 1516239022 }) | ||
// call to local verifier without cache | ||
await request.jwtVerify() | ||
return reply.send(typeof request.user.then) | ||
}) | ||
const response = await fastify.inject({ | ||
method: 'get', | ||
url: '/' | ||
}) | ||
|
||
t.equal(response.statusCode, 401) | ||
}) | ||
|
||
test('Async key provider should be resolved internally with cache', async function (t) { | ||
const fastify = Fastify() | ||
fastify.register(jwt, { | ||
secret: { | ||
private: 'this secret reused from cache', | ||
public: async () => false | ||
}, | ||
verify: { | ||
extractToken: (request) => request.headers.jwt, | ||
key: () => Promise.resolve('this secret reused from cache') | ||
} | ||
}) | ||
fastify.get('/', async function (request, reply) { | ||
const signSync = createSigner({ key: 'this secret reused from cache' }) | ||
request.headers.jwt = signSync({ sub: '1234567890', name: 'John Doe', iat: 1516239022 }) | ||
await new Promise((resolve, reject) => request.jwtVerify((err, payload) => { | ||
if (err) { | ||
reject(err) | ||
return | ||
} | ||
resolve(payload) | ||
})) | ||
await new Promise((resolve, reject) => request.jwtVerify((err, payload) => { | ||
if (err) { | ||
reject(err) | ||
return | ||
} | ||
resolve(payload) | ||
})) | ||
return reply.send(request.user) | ||
}) | ||
const response = await fastify.inject({ | ||
method: 'get', | ||
url: '/' | ||
}) | ||
t.equal(response.statusCode, 200) | ||
t.match(response.json(), { name: 'John Doe' }) | ||
}) | ||
|
||
test('Async key provider errors should be resolved internally with cache', async function (t) { | ||
const fastify = Fastify() | ||
fastify.register(jwt, { | ||
secret: { | ||
public: async () => false | ||
}, | ||
verify: { | ||
extractToken: (request) => request.headers.jwt, | ||
key: () => Promise.resolve('this secret reused from cache') | ||
} | ||
}) | ||
fastify.get('/', async function (request, reply) { | ||
const signSync = createSigner({ key: 'invalid signature error' }) | ||
request.headers.jwt = signSync({ sub: '1234567890', name: 'John Doe', iat: 1516239022 }) | ||
// request.headers.jwt = | ||
// 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c' | ||
// call to plugin root level verifier | ||
await new Promise((resolve, reject) => request.jwtVerify((err, payload) => { | ||
if (err) { | ||
reject(err) | ||
return | ||
} | ||
resolve(payload) | ||
})) | ||
return reply.send(typeof request.user.then) | ||
}) | ||
const response = await fastify.inject({ | ||
method: 'get', | ||
url: '/' | ||
}) | ||
|
||
t.equal(response.statusCode, 401) | ||
}) |