2019-10-13 15:52:14 +02:00
|
|
|
const fixture = require('./fixture/secret_function');
|
|
|
|
const request = require('request');
|
|
|
|
const io = require('socket.io-client');
|
2015-11-18 21:36:24 +01:00
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
describe('authorizer with secret function', () => {
|
2015-11-18 21:36:24 +01:00
|
|
|
|
|
|
|
//start and stop the server
|
|
|
|
before(fixture.start);
|
|
|
|
after(fixture.stop);
|
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
describe('when the user is not logged in', () => {
|
2015-11-18 21:36:24 +01:00
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
it('should emit error with unauthorized handshake', (done) => {
|
2019-10-13 15:52:14 +02:00
|
|
|
const socket = io.connect('http://localhost:9000?token=boooooo', { forceNew: true });
|
2015-11-18 21:36:24 +01:00
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
socket.on('error', (err) => {
|
|
|
|
err.message.should.eql('jwt malformed');
|
|
|
|
err.code.should.eql('invalid_token');
|
2015-11-18 21:36:24 +01:00
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
});
|
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
describe('when the user is logged in', () => {
|
2015-11-18 21:36:24 +01:00
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
beforeEach((done) => {
|
2015-11-18 21:36:24 +01:00
|
|
|
request.post({
|
|
|
|
url: 'http://localhost:9000/login',
|
|
|
|
json: { username: 'valid_signature', password: 'Pa123' }
|
2019-10-14 01:46:30 +02:00
|
|
|
}, (err, resp, body) => {
|
2015-11-18 21:36:24 +01:00
|
|
|
this.token = body.token;
|
|
|
|
done();
|
2019-10-14 01:46:30 +02:00
|
|
|
});
|
2015-11-18 21:36:24 +01:00
|
|
|
});
|
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
it('should do the handshake and connect', (done) => {
|
2019-10-13 15:52:14 +02:00
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
query: 'token=' + this.token
|
2015-11-18 21:36:24 +01:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket
|
2019-10-14 01:46:30 +02:00
|
|
|
.on('connect', () => {
|
2019-10-13 15:52:14 +02:00
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
})
|
|
|
|
.on('error', done);
|
2015-11-18 21:36:24 +01:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
describe('unsigned token', () => {
|
|
|
|
beforeEach(() => {
|
2015-11-18 21:36:24 +01:00
|
|
|
this.token = 'eyJhbGciOiJub25lIiwiY3R5IjoiSldUIn0.eyJuYW1lIjoiSm9obiBGb28ifQ.';
|
|
|
|
});
|
|
|
|
|
2019-10-14 01:46:30 +02:00
|
|
|
it('should not do the handshake and connect', (done) => {
|
2019-10-13 15:52:14 +02:00
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
query: 'token=' + this.token
|
2015-11-18 21:36:24 +01:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket
|
2019-10-14 01:46:30 +02:00
|
|
|
.on('connect', () => {
|
2019-10-13 15:52:14 +02:00
|
|
|
socket.close();
|
|
|
|
done(new Error('this shouldnt happen'));
|
|
|
|
})
|
2019-10-14 01:46:30 +02:00
|
|
|
.on('error', (err) => {
|
2019-10-13 15:52:14 +02:00
|
|
|
socket.close();
|
2019-10-14 01:46:30 +02:00
|
|
|
err.message.should.eql('jwt signature is required');
|
2019-10-13 15:52:14 +02:00
|
|
|
done();
|
|
|
|
});
|
2015-11-18 21:36:24 +01:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
});
|