UNPKG

hapi-auth-jwt2

Version:

Hapi.js Authentication Plugin/Scheme using JSON Web Tokens (JWT)

91 lines (79 loc) 3.47 kB
const test = require('tape'); const JWT = require('jsonwebtoken'); const server = require('./dynamic_key_server.cjs'); // test server which in turn loads our module test("Access restricted content with a valid token and tenant", async function(t) { // use the token as the 'authorization' header in requests const token = JWT.sign({ id: 123, "name": "Charlie", "tenant": "dunderMifflin" }, 'michaelscott'); const options = { method: "POST", url: "/privado", headers: { authorization: "Bearer " + token } }; // server.inject lets us simulate an http request const response = await server.inject(options); // console.log(" - - - - RESPONSE: "); // console.log(response.result); t.equal(response.statusCode, 200, "VALID Token should succeed!"); t.equal(response.result.data.additional, 'something extra here if needed', 'extraInfo should be passed through'); t.end(); }); test("Access restricted content with an invalid token and tenant", async function(t) { // use the token as the 'authorization' header in requests const token = JWT.sign({ id: 123, "name": "Charlie", "tenant": "dunderMifflin" }, 'dwightschrute'); const options = { method: "POST", url: "/privado", headers: { authorization: "Bearer " + token } }; // server.inject lets us simulate an http request const response = await server.inject(options); // console.log(" - - - - RESPONSE: "); // console.log(response.result); t.equal(response.statusCode, 401, "INVALID Token should fail!"); t.end(); }); test("Access restricted content with a valid token and tenant but user is not allowed", async function(t) { // use the token as the 'authorization' header in requests const token = JWT.sign({ id: 321, "name": "Old Gregg", "tenant": "wernhamHogg" }, 'davidbrent'); const options = { method: "POST", url: "/privado", headers: { authorization: "Bearer " + token } }; // server.inject lets us simulate an http request const response = await server.inject(options); // console.log(" - - - - RESPONSE: "); // console.log(response.result); t.equal(response.statusCode, 401, "Not allowed user should fail!"); t.end(); }); test("Access restricted content without tenant specified in token", async function(t) { // use the token as the 'authorization' header in requests const token = JWT.sign({ id: 123, "name": "Charlie" }, 'michaelscott'); const options = { method: "POST", url: "/privado", headers: { authorization: "Bearer " + token } }; // server.inject lets us simulate an http request const response = await server.inject(options); // console.log(" - - - - RESPONSE1: "); // console.log(response.result); t.equal(response.statusCode, 400, "No tenant specified should fail!"); t.end(); }); test("Access restricted content with non-existent tenant specified", async function(t) { // use the token as the 'authorization' header in requests const token = JWT.sign({ id: 123, "name": "Charlie", "tenant": "princeFamilyPaper" }, 'michaelscott'); const options = { method: "POST", url: "/privado", headers: { authorization: "Bearer " + token } }; // server.inject lets us simulate an http request const response = await server.inject(options); // console.log(" - - - - RESPONSE: "); // console.log(response.result); t.equal(response.statusCode, 401, "No tentant found should fail!"); t.end(); });