CoastalCommitsPastes/server/node_modules/express-jwt/test/multitenancy.test.js
2022-03-06 16:46:59 -08:00

76 lines
1.9 KiB
JavaScript

var jwt = require('jsonwebtoken');
var assert = require('assert');
var expressjwt = require('../lib');
var UnauthorizedError = require('../lib/errors/UnauthorizedError');
describe('multitenancy', function(){
var req = {};
var res = {};
var tenants = {
'a': {
secret: 'secret-a'
}
};
var secretCallback = function(req, payload, cb){
var issuer = payload.iss;
if (tenants[issuer]){
return cb(null, tenants[issuer].secret);
}
return cb(new UnauthorizedError('missing_secret',
{ message: 'Could not find secret for issuer.' }));
};
var middleware = expressjwt({
secret: secretCallback,
algorithms: ['HS256']
});
it ('should retrieve secret using callback', function(){
var token = jwt.sign({ iss: 'a', foo: 'bar'}, tenants.a.secret);
req.headers = {};
req.headers.authorization = 'Bearer ' + token;
middleware(req, res, function() {
assert.equal('bar', req.user.foo);
});
});
it ('should throw if an error ocurred when retrieving the token', function(){
var secret = 'shhhhhh';
var token = jwt.sign({ iss: 'inexistent', foo: 'bar'}, secret);
req.headers = {};
req.headers.authorization = 'Bearer ' + token;
middleware(req, res, function(err) {
assert.ok(err);
assert.equal(err.code, 'missing_secret');
assert.equal(err.message, 'Could not find secret for issuer.');
});
});
it ('should fail if token is revoked', function(){
var token = jwt.sign({ iss: 'a', foo: 'bar'}, tenants.a.secret);
req.headers = {};
req.headers.authorization = 'Bearer ' + token;
expressjwt({
secret: secretCallback,
algorithms: ['HS256'],
isRevoked: function(req, payload, done){
done(null, true);
}
})(req, res, function(err) {
assert.ok(err);
assert.equal(err.code, 'revoked_token');
assert.equal(err.message, 'The token has been revoked.');
});
});
});