2
1
mirror of https://github.com/Thream/socketio-jwt.git synced 2024-07-21 09:38:31 +02:00

going to be adding new options but want it within the same general authorizer test suite - DK/MW

This commit is contained in:
Mathew Woods 2016-10-20 10:38:43 -05:00 committed by Fabian Arndt
parent c694bee8f5
commit 2d390e66e6

View File

@ -2,86 +2,89 @@ var fixture = require('./fixture');
var request = require('request'); var request = require('request');
var io = require('socket.io-client'); var io = require('socket.io-client');
describe('authorizer', function () { describe('authorizer', () => {
//start and stop the server describe('authorizer all auth types allowed', () => {
before(done => {
fixture.start({ }, done)
});
after(fixture.stop);
describe('when the user is not logged in', function () { //start and stop the server
before(done => {
fixture.start({ }, done)
});
after(fixture.stop);
it('should emit error with unauthorized handshake', function (done){ describe('when the user is not logged in', function () {
var socket = io.connect('http://localhost:9000?token=boooooo', {
'forceNew': true it('should emit error with unauthorized handshake', function (done){
var socket = io.connect('http://localhost:9000?token=boooooo', {
'forceNew': true
});
socket.on('error', function(err){
err.message.should.eql("jwt malformed");
err.code.should.eql("invalid_token");
socket.close();
done();
});
}); });
socket.on('error', function(err){ });
err.message.should.eql("jwt malformed");
err.code.should.eql("invalid_token"); describe('when the user is logged in', function() {
socket.close();
done(); before(function (done) {
request.post({
url: 'http://localhost:9000/login',
form: { username: 'jose', password: 'Pa123' },
json: true
}, function (err, resp, body) {
this.token = body.token;
done();
}.bind(this));
});
it('auth headers are supported', function (done){
var socket = io.connect('http://localhost:9000', {
'forceNew':true,
'extraHeaders': {'Authorization': `Bearer ${this.token}`}
});
socket.on('connect', function(){
socket.close();
done();
}).on('error', done);
});
it('should do the handshake and connect', function (done){
var socket = io.connect('http://localhost:9000', {
'forceNew':true,
'query': 'token=' + this.token
});
socket.on('connect', function(){
socket.close();
done();
}).on('error', done);
});
});
describe('unsgined token', function() {
beforeEach(function () {
this.token = 'eyJhbGciOiJub25lIiwiY3R5IjoiSldUIn0.eyJuYW1lIjoiSm9obiBGb28ifQ.';
});
it('should not do the handshake and connect', function (done){
var socket = io.connect('http://localhost:9000', {
'forceNew':true,
'query': 'token=' + this.token
});
socket.on('connect', function () {
socket.close();
done(new Error('this shouldnt happen'));
}).on('error', function (err) {
socket.close();
err.message.should.eql("jwt signature is required");
done();
});
}); });
}); });
}); });
describe('when the user is logged in', function() {
before(function (done) {
request.post({
url: 'http://localhost:9000/login',
form: { username: 'jose', password: 'Pa123' },
json: true
}, function (err, resp, body) {
this.token = body.token;
done();
}.bind(this));
});
it('auth headers are supported', function (done){
var socket = io.connect('http://localhost:9000', {
'forceNew':true,
'extraHeaders': {'Authorization': `Bearer ${this.token}`}
});
socket.on('connect', function(){
socket.close();
done();
}).on('error', done);
});
it('should do the handshake and connect', function (done){
var socket = io.connect('http://localhost:9000', {
'forceNew':true,
'query': 'token=' + this.token
});
socket.on('connect', function(){
socket.close();
done();
}).on('error', done);
});
});
describe('unsgined token', function() {
beforeEach(function () {
this.token = 'eyJhbGciOiJub25lIiwiY3R5IjoiSldUIn0.eyJuYW1lIjoiSm9obiBGb28ifQ.';
});
it('should not do the handshake and connect', function (done){
var socket = io.connect('http://localhost:9000', {
'forceNew':true,
'query': 'token=' + this.token
});
socket.on('connect', function () {
socket.close();
done(new Error('this shouldnt happen'));
}).on('error', function (err) {
socket.close();
err.message.should.eql("jwt signature is required");
done();
});
});
});
}); });