2019-10-13 15:52:14 +02:00
|
|
|
const Q = require('q');
|
|
|
|
const fixture = require('./fixture');
|
|
|
|
const request = require('request');
|
|
|
|
const io = require('socket.io-client');
|
2012-11-16 16:43:12 +01:00
|
|
|
|
2016-10-20 18:48:52 +02:00
|
|
|
describe('authorizer', function() {
|
2016-10-20 18:13:23 +02:00
|
|
|
//start and stop the server
|
2016-10-20 18:48:52 +02:00
|
|
|
before(function(done) { fixture.start({ }, done) });
|
2016-10-20 18:13:23 +02:00
|
|
|
after(fixture.stop);
|
2012-11-16 16:43:12 +01:00
|
|
|
|
2016-10-20 18:13:23 +02:00
|
|
|
describe('when the user is not logged in', function () {
|
2019-10-13 15:52:14 +02:00
|
|
|
it('should emit error with unauthorized handshake', function (done) {
|
|
|
|
const socket = io.connect('http://localhost:9000?token=boooooo', {
|
|
|
|
forceNew: true
|
2016-10-20 18:13:23 +02:00
|
|
|
});
|
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
socket.on('error', function(err) {
|
2016-10-20 18:13:23 +02:00
|
|
|
err.message.should.eql("jwt malformed");
|
|
|
|
err.code.should.eql("invalid_token");
|
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
2014-01-13 20:00:21 +01:00
|
|
|
|
2016-10-20 18:13:23 +02:00
|
|
|
describe('when the user is logged in', function() {
|
|
|
|
before(function (done) {
|
|
|
|
request.post({
|
|
|
|
url: 'http://localhost:9000/login',
|
|
|
|
form: { username: 'jose', password: 'Pa123' },
|
|
|
|
json: true
|
|
|
|
}, function (err, resp, body) {
|
|
|
|
this.token = body.token;
|
|
|
|
done();
|
|
|
|
}.bind(this));
|
2012-11-16 16:43:12 +01:00
|
|
|
});
|
|
|
|
|
2016-10-20 18:48:52 +02:00
|
|
|
describe('authorizer disallows query string token when specified in startup options', function() {
|
|
|
|
before(function(done) {
|
2016-10-20 18:13:23 +02:00
|
|
|
Q.ninvoke(fixture, 'stop')
|
2016-10-20 18:48:52 +02:00
|
|
|
.then(function() { return Q.ninvoke(fixture, 'start', { auth_header_required: true })})
|
2016-10-20 18:13:23 +02:00
|
|
|
.done(done);
|
2014-01-13 20:00:21 +01:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
2016-10-20 18:48:52 +02:00
|
|
|
after(function(done) {
|
2016-10-20 18:13:23 +02:00
|
|
|
Q.ninvoke(fixture, 'stop')
|
2016-10-20 18:48:52 +02:00
|
|
|
.then(function() { return Q.ninvoke(fixture, 'start', { })})
|
2016-10-20 18:13:23 +02:00
|
|
|
.done(done);
|
2019-10-13 15:52:14 +02:00
|
|
|
});
|
2012-11-16 16:43:12 +01:00
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
it('auth headers are supported', function (done) {
|
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
extraHeaders: { Authorization: 'Bearer ' + this.token}
|
2016-10-20 17:38:43 +02:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket
|
|
|
|
.on('connect', function() {
|
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
})
|
|
|
|
.on('error', done);
|
2016-10-20 18:13:23 +02:00
|
|
|
});
|
2016-10-20 17:38:43 +02:00
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
it('auth token in query string is disallowed', function (done) {
|
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
query: 'token=' + this.token
|
2016-10-20 18:13:23 +02:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket.on('error', function(err) {
|
2016-10-20 18:13:23 +02:00
|
|
|
err.message.should.eql("Server requires Authorization Header");
|
|
|
|
err.code.should.eql("missing_authorization_header");
|
2016-10-20 17:38:43 +02:00
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
});
|
|
|
|
});
|
2016-10-20 18:13:23 +02:00
|
|
|
})
|
2012-11-16 16:43:12 +01:00
|
|
|
|
2016-10-20 18:48:52 +02:00
|
|
|
describe('authorizer all auth types allowed', function() {
|
|
|
|
before(function(done) {
|
2016-10-20 18:13:23 +02:00
|
|
|
Q.ninvoke(fixture, 'stop')
|
2016-10-20 18:48:52 +02:00
|
|
|
.then(function() { return Q.ninvoke(fixture, 'start', {})})
|
2016-10-20 18:13:23 +02:00
|
|
|
.done(done);
|
|
|
|
})
|
2016-10-20 17:22:11 +02:00
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
it('auth headers are supported', function (done) {
|
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
extraHeaders: { Authorization: 'Bearer ' + this.token }
|
2016-10-20 17:38:43 +02:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket
|
|
|
|
.on('connect', function() {
|
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
})
|
|
|
|
.on('error', done);
|
2014-01-13 20:00:21 +01:00
|
|
|
});
|
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
it('should do the handshake and connect', function (done) {
|
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
query: 'token=' + this.token
|
2016-10-20 17:38:43 +02:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket
|
|
|
|
.on('connect', function() {
|
|
|
|
socket.close();
|
|
|
|
done();
|
|
|
|
})
|
|
|
|
.on('error', done);
|
2016-10-20 17:38:43 +02:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
2014-07-17 01:29:39 +02:00
|
|
|
});
|
2016-10-20 18:13:23 +02:00
|
|
|
});
|
2014-07-17 01:29:39 +02:00
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
describe('unsigned token', function() {
|
2016-10-20 18:13:23 +02:00
|
|
|
beforeEach(function () {
|
|
|
|
this.token = 'eyJhbGciOiJub25lIiwiY3R5IjoiSldUIn0.eyJuYW1lIjoiSm9obiBGb28ifQ.';
|
|
|
|
});
|
2016-10-20 17:38:43 +02:00
|
|
|
|
2019-10-13 15:52:14 +02:00
|
|
|
it('should not do the handshake and connect', function (done) {
|
|
|
|
const socket = io.connect('http://localhost:9000', {
|
|
|
|
forceNew: true,
|
|
|
|
query: 'token=' + this.token
|
2014-07-17 01:29:39 +02:00
|
|
|
});
|
2019-10-13 15:52:14 +02:00
|
|
|
|
|
|
|
socket
|
|
|
|
.on('connect', function () {
|
|
|
|
socket.close();
|
|
|
|
done(new Error('this shouldnt happen'));
|
|
|
|
})
|
|
|
|
.on('error', function (err) {
|
|
|
|
socket.close();
|
|
|
|
err.message.should.eql("jwt signature is required");
|
|
|
|
done();
|
|
|
|
});
|
2014-07-17 01:29:39 +02:00
|
|
|
});
|
2016-10-20 17:38:43 +02:00
|
|
|
});
|
2014-07-17 03:14:07 +02:00
|
|
|
});
|