You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							83 lines
						
					
					
						
							2.5 KiB
						
					
					
				
			
		
		
	
	
							83 lines
						
					
					
						
							2.5 KiB
						
					
					
				| var jwt = require('../index');
 | |
| 
 | |
| var expect = require('chai').expect;
 | |
| var assert = require('chai').assert;
 | |
| 
 | |
| describe('HS256', function() {
 | |
| 
 | |
|   describe('when signing a token', function() {
 | |
|     var secret = 'shhhhhh';
 | |
| 
 | |
|     var token = jwt.sign({ foo: 'bar' }, secret, { algorithm: 'HS256' });
 | |
| 
 | |
|     it('should be syntactically valid', function() {
 | |
|       expect(token).to.be.a('string');
 | |
|       expect(token.split('.')).to.have.length(3);
 | |
|     });
 | |
| 
 | |
|     it('should without options', function(done) {
 | |
|       var callback = function(err, decoded) {
 | |
|         assert.ok(decoded.foo);
 | |
|         assert.equal('bar', decoded.foo);
 | |
|         done();
 | |
|       };
 | |
|       callback.issuer = "shouldn't affect";
 | |
|       jwt.verify(token, secret, callback );
 | |
|     });
 | |
| 
 | |
|     it('should validate with secret', function(done) {
 | |
|       jwt.verify(token, secret, function(err, decoded) {
 | |
|         assert.ok(decoded.foo);
 | |
|         assert.equal('bar', decoded.foo);
 | |
|         done();
 | |
|       });
 | |
|     });
 | |
| 
 | |
|     it('should throw with invalid secret', function(done) {
 | |
|       jwt.verify(token, 'invalid secret', function(err, decoded) {
 | |
|         assert.isUndefined(decoded);
 | |
|         assert.isNotNull(err);
 | |
|         done();
 | |
|       });
 | |
|     });
 | |
| 
 | |
|     it('should throw with secret and token not signed', function(done) {
 | |
|       var signed = jwt.sign({ foo: 'bar' }, secret, { algorithm: 'none' });
 | |
|       var unsigned = signed.split('.')[0] + '.' + signed.split('.')[1] + '.';
 | |
|       jwt.verify(unsigned, 'secret', function(err, decoded) {
 | |
|         assert.isUndefined(decoded);
 | |
|         assert.isNotNull(err);
 | |
|         done();
 | |
|       });
 | |
|     });
 | |
| 
 | |
|     it('should throw when verifying null', function(done) {
 | |
|       jwt.verify(null, 'secret', function(err, decoded) {
 | |
|         assert.isUndefined(decoded);
 | |
|         assert.isNotNull(err);
 | |
|         done();
 | |
|       });
 | |
|     });
 | |
| 
 | |
|     it('should return an error when the token is expired', function(done) {
 | |
|       var token = jwt.sign({ exp: 1 }, secret, { algorithm: 'HS256' });
 | |
|       jwt.verify(token, secret, { algorithm: 'HS256' }, function(err, decoded) {
 | |
|         assert.isUndefined(decoded);
 | |
|         assert.isNotNull(err);
 | |
|         done();
 | |
|       });
 | |
|     });
 | |
| 
 | |
|     it('should NOT return an error when the token is expired with "ignoreExpiration"', function(done) {
 | |
|       var token = jwt.sign({ exp: 1, foo: 'bar' }, secret, { algorithm: 'HS256' });
 | |
|       jwt.verify(token, secret, { algorithm: 'HS256', ignoreExpiration: true }, function(err, decoded) {
 | |
|         assert.ok(decoded.foo);
 | |
|         assert.equal('bar', decoded.foo);
 | |
|         assert.isNull(err);
 | |
|         done();
 | |
|       });
 | |
|     });
 | |
| 
 | |
|   });
 | |
| });
 |