Compare commits
7 Commits
Author | SHA1 | Date | |
---|---|---|---|
6a28554b00
|
|||
50c236ca4d
|
|||
b708d66586
|
|||
d1145e5f63
|
|||
487965b9aa
|
|||
108ae8f6fc
|
|||
7d0df02299
|
@ -1,6 +1,7 @@
|
||||
{
|
||||
"extends": ["conventions", "prettier"],
|
||||
"plugins": ["prettier", "import", "unicorn"],
|
||||
"parser": "@typescript-eslint/parser",
|
||||
"parserOptions": {
|
||||
"project": "./tsconfig.json"
|
||||
},
|
||||
|
4
.github/workflows/build.yml
vendored
4
.github/workflows/build.yml
vendored
@ -10,12 +10,12 @@ jobs:
|
||||
build:
|
||||
runs-on: 'ubuntu-latest'
|
||||
steps:
|
||||
- uses: 'actions/checkout@v3.5.2'
|
||||
- uses: 'actions/checkout@v3.5.3'
|
||||
|
||||
- name: 'Setup Node.js'
|
||||
uses: 'actions/setup-node@v3.6.0'
|
||||
with:
|
||||
node-version: 'lts/*'
|
||||
node-version: '20.x'
|
||||
cache: 'npm'
|
||||
|
||||
- name: 'Install dependencies'
|
||||
|
4
.github/workflows/lint.yml
vendored
4
.github/workflows/lint.yml
vendored
@ -10,12 +10,12 @@ jobs:
|
||||
lint:
|
||||
runs-on: 'ubuntu-latest'
|
||||
steps:
|
||||
- uses: 'actions/checkout@v3.5.2'
|
||||
- uses: 'actions/checkout@v3.5.3'
|
||||
|
||||
- name: 'Setup Node.js'
|
||||
uses: 'actions/setup-node@v3.6.0'
|
||||
with:
|
||||
node-version: 'lts/*'
|
||||
node-version: '20.x'
|
||||
cache: 'npm'
|
||||
|
||||
- name: 'Install dependencies'
|
||||
|
4
.github/workflows/release.yml
vendored
4
.github/workflows/release.yml
vendored
@ -13,12 +13,12 @@ jobs:
|
||||
pull-requests: 'write'
|
||||
id-token: 'write'
|
||||
steps:
|
||||
- uses: 'actions/checkout@v3.5.2'
|
||||
- uses: 'actions/checkout@v3.5.3'
|
||||
|
||||
- name: 'Setup Node.js'
|
||||
uses: 'actions/setup-node@v3.6.0'
|
||||
with:
|
||||
node-version: 'lts/*'
|
||||
node-version: '20.x'
|
||||
cache: 'npm'
|
||||
|
||||
- name: 'Install dependencies'
|
||||
|
4
.github/workflows/test.yml
vendored
4
.github/workflows/test.yml
vendored
@ -10,12 +10,12 @@ jobs:
|
||||
test:
|
||||
runs-on: 'ubuntu-latest'
|
||||
steps:
|
||||
- uses: 'actions/checkout@v3.5.2'
|
||||
- uses: 'actions/checkout@v3.5.3'
|
||||
|
||||
- name: 'Setup Node.js'
|
||||
uses: 'actions/setup-node@v3.6.0'
|
||||
with:
|
||||
node-version: 'lts/*'
|
||||
node-version: '20.x'
|
||||
cache: 'npm'
|
||||
|
||||
- name: 'Install dependencies'
|
||||
|
@ -1,5 +0,0 @@
|
||||
{
|
||||
"reporter": ["text", "cobertura"],
|
||||
"src": "./build",
|
||||
"all": true
|
||||
}
|
1
.swcrc
1
.swcrc
@ -1,4 +1,5 @@
|
||||
{
|
||||
"sourceMaps": true,
|
||||
"jsc": {
|
||||
"parser": {
|
||||
"syntax": "typescript",
|
||||
|
9
.taprc
9
.taprc
@ -1,9 +0,0 @@
|
||||
ts: false
|
||||
jsx: false
|
||||
flow: false
|
||||
check-coverage: false
|
||||
coverage: false
|
||||
timeout: 10000
|
||||
|
||||
files:
|
||||
- 'build/**/*.test.js'
|
@ -60,7 +60,7 @@ representative at an online or offline event.
|
||||
|
||||
Instances of abusive, harassing, or otherwise unacceptable behavior may be
|
||||
reported to the community leaders responsible for enforcement at
|
||||
<contact@divlo.fr>.
|
||||
<contact@theoludwig.fr>.
|
||||
All complaints will be reviewed and investigated promptly and fairly.
|
||||
|
||||
All community leaders are obligated to respect the privacy and security of the
|
||||
|
2
LICENSE
2
LICENSE
@ -1,6 +1,6 @@
|
||||
MIT License
|
||||
|
||||
Copyright (c) Auth0, Inc. <support@auth0.com> (http://auth0.com) and Thream contributors
|
||||
Copyright (c) Auth0, Inc. <support@auth0.com> (<https://auth0.com/>) and Thream contributors
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
|
6967
package-lock.json
generated
6967
package-lock.json
generated
File diff suppressed because it is too large
Load Diff
61
package.json
61
package.json
@ -8,7 +8,10 @@
|
||||
"main": "build/index.js",
|
||||
"types": "build/index.d.ts",
|
||||
"files": [
|
||||
"build"
|
||||
"build",
|
||||
"!**/*.test.js",
|
||||
"!**/*.test.d.ts",
|
||||
"!**/*.map"
|
||||
],
|
||||
"engines": {
|
||||
"node": ">=16.0.0",
|
||||
@ -23,7 +26,7 @@
|
||||
"socket.io",
|
||||
"jwt"
|
||||
],
|
||||
"author": "Divlo <contact@divlo.fr>",
|
||||
"author": "Théo LUDWIG <contact@theoludwig.fr>",
|
||||
"repository": {
|
||||
"type": "git",
|
||||
"url": "https://github.com/Thream/socketio-jwt"
|
||||
@ -39,10 +42,10 @@
|
||||
"lint:commit": "commitlint",
|
||||
"lint:editorconfig": "editorconfig-checker",
|
||||
"lint:markdown": "markdownlint-cli2",
|
||||
"lint:eslint": "eslint \"**/*.{js,jsx,ts,tsx}\" --ignore-path \".gitignore\"",
|
||||
"lint:prettier": "prettier \".\" --check --ignore-path \".gitignore\"",
|
||||
"lint:eslint": "eslint . --max-warnings 0 --report-unused-disable-directives --ignore-path .gitignore",
|
||||
"lint:prettier": "prettier . --check",
|
||||
"lint:staged": "lint-staged",
|
||||
"test": "c8 tap",
|
||||
"test": "cross-env NODE_ENV=test node --enable-source-maps --test build/",
|
||||
"release": "semantic-release",
|
||||
"postinstall": "husky install",
|
||||
"prepublishOnly": "pinst --disable",
|
||||
@ -52,41 +55,39 @@
|
||||
"socket.io": ">=3.0.0"
|
||||
},
|
||||
"dependencies": {
|
||||
"jsonwebtoken": "9.0.0"
|
||||
"jsonwebtoken": "9.0.1"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@commitlint/cli": "17.6.3",
|
||||
"@commitlint/config-conventional": "17.6.3",
|
||||
"@commitlint/cli": "17.6.7",
|
||||
"@commitlint/config-conventional": "17.6.7",
|
||||
"@swc/cli": "0.1.62",
|
||||
"@swc/core": "1.3.57",
|
||||
"@swc/core": "1.3.70",
|
||||
"@tsconfig/strictest": "2.0.1",
|
||||
"@types/jsonwebtoken": "9.0.2",
|
||||
"@types/node": "20.1.4",
|
||||
"@types/tap": "15.0.8",
|
||||
"@typescript-eslint/eslint-plugin": "5.59.5",
|
||||
"@typescript-eslint/parser": "5.59.5",
|
||||
"@types/node": "20.4.3",
|
||||
"@typescript-eslint/eslint-plugin": "6.1.0",
|
||||
"@typescript-eslint/parser": "6.1.0",
|
||||
"axios": "1.4.0",
|
||||
"c8": "7.13.0",
|
||||
"editorconfig-checker": "5.0.1",
|
||||
"eslint": "8.40.0",
|
||||
"eslint-config-conventions": "9.0.0",
|
||||
"cross-env": "7.0.3",
|
||||
"editorconfig-checker": "5.1.1",
|
||||
"eslint": "8.45.0",
|
||||
"eslint-config-conventions": "11.0.1",
|
||||
"eslint-config-prettier": "8.8.0",
|
||||
"eslint-plugin-import": "2.27.5",
|
||||
"eslint-plugin-prettier": "4.2.1",
|
||||
"eslint-plugin-prettier": "5.0.0",
|
||||
"eslint-plugin-promise": "6.1.1",
|
||||
"eslint-plugin-unicorn": "47.0.0",
|
||||
"fastify": "4.17.0",
|
||||
"eslint-plugin-unicorn": "48.0.0",
|
||||
"fastify": "4.20.0",
|
||||
"husky": "8.0.3",
|
||||
"lint-staged": "13.2.2",
|
||||
"markdownlint-cli2": "0.7.1",
|
||||
"markdownlint-rule-relative-links": "1.2.0",
|
||||
"lint-staged": "13.2.3",
|
||||
"markdownlint-cli2": "0.8.1",
|
||||
"markdownlint-rule-relative-links": "2.1.0",
|
||||
"pinst": "3.0.0",
|
||||
"prettier": "2.8.8",
|
||||
"rimraf": "5.0.0",
|
||||
"semantic-release": "21.0.2",
|
||||
"socket.io": "4.6.1",
|
||||
"socket.io-client": "4.6.1",
|
||||
"tap": "16.3.4",
|
||||
"typescript": "5.0.4"
|
||||
"prettier": "3.0.0",
|
||||
"rimraf": "5.0.1",
|
||||
"semantic-release": "21.0.7",
|
||||
"socket.io": "4.7.1",
|
||||
"socket.io-client": "4.7.1",
|
||||
"typescript": "5.1.6"
|
||||
}
|
||||
}
|
||||
|
@ -1,4 +1,6 @@
|
||||
import tap from 'tap'
|
||||
import test from 'node:test'
|
||||
import assert from 'node:assert/strict'
|
||||
|
||||
import axios from 'axios'
|
||||
import type { Socket } from 'socket.io-client'
|
||||
import { io } from 'socket.io-client'
|
||||
@ -24,7 +26,7 @@ const secretCallback = async (): Promise<string> => {
|
||||
return 'somesecret'
|
||||
}
|
||||
|
||||
await tap.test('authorize', async (t) => {
|
||||
await test('authorize', async (t) => {
|
||||
await t.test('with secret as string in options', async (t) => {
|
||||
let token = ''
|
||||
let socket: Socket | null = null
|
||||
@ -40,71 +42,76 @@ await tap.test('authorize', async (t) => {
|
||||
await fixtureStop()
|
||||
})
|
||||
|
||||
await t.test('should emit error with no token provided', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with no token provided', () => {
|
||||
socket = io(API_URL)
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(error.data.message, 'no token provided')
|
||||
t.equal(error.data.code, 'credentials_required')
|
||||
assert.strictEqual(error.data.message, 'no token provided')
|
||||
assert.strictEqual(error.data.code, 'credentials_required')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error with bad token format', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with bad token format', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: 'testing' }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(error.data.message, 'Format is Authorization: Bearer [token]')
|
||||
t.equal(error.data.code, 'credentials_bad_format')
|
||||
assert.strictEqual(
|
||||
error.data.message,
|
||||
'Format is Authorization: Bearer [token]'
|
||||
)
|
||||
assert.strictEqual(error.data.code, 'credentials_bad_format')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error with unauthorized handshake', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with unauthorized handshake', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: 'Bearer testing' }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(
|
||||
assert.strictEqual(
|
||||
error.data.message,
|
||||
'Unauthorized: Token is missing or invalid Bearer'
|
||||
)
|
||||
t.equal(error.data.code, 'invalid_token')
|
||||
assert.strictEqual(error.data.code, 'invalid_token')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should connect the user', (t) => {
|
||||
t.plan(1)
|
||||
await t.test('should connect the user', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: `Bearer ${token}` }
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.pass()
|
||||
assert.ok(true)
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.fail(error.message)
|
||||
assert.fail(error.message)
|
||||
})
|
||||
})
|
||||
})
|
||||
@ -124,71 +131,76 @@ await tap.test('authorize', async (t) => {
|
||||
await fixtureStop()
|
||||
})
|
||||
|
||||
await t.test('should emit error with no token provided', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with no token provided', () => {
|
||||
socket = io(API_URL)
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(error.data.message, 'no token provided')
|
||||
t.equal(error.data.code, 'credentials_required')
|
||||
assert.strictEqual(error.data.message, 'no token provided')
|
||||
assert.strictEqual(error.data.code, 'credentials_required')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error with bad token format', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with bad token format', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: 'testing' }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(error.data.message, 'Format is Authorization: Bearer [token]')
|
||||
t.equal(error.data.code, 'credentials_bad_format')
|
||||
assert.strictEqual(
|
||||
error.data.message,
|
||||
'Format is Authorization: Bearer [token]'
|
||||
)
|
||||
assert.strictEqual(error.data.code, 'credentials_bad_format')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error with unauthorized handshake', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with unauthorized handshake', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: 'Bearer testing' }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(
|
||||
assert.strictEqual(
|
||||
error.data.message,
|
||||
'Unauthorized: Token is missing or invalid Bearer'
|
||||
)
|
||||
t.equal(error.data.code, 'invalid_token')
|
||||
assert.strictEqual(error.data.code, 'invalid_token')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should connect the user', (t) => {
|
||||
t.plan(1)
|
||||
await t.test('should connect the user', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: `Bearer ${token}` }
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.pass()
|
||||
assert.ok(true)
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.fail(error.message)
|
||||
assert.fail(error.message)
|
||||
})
|
||||
})
|
||||
})
|
||||
@ -221,104 +233,107 @@ await tap.test('authorize', async (t) => {
|
||||
await fixtureStop()
|
||||
})
|
||||
|
||||
await t.test('should emit error with no token provided', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with no token provided', () => {
|
||||
socket = io(API_URL)
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(error.data.message, 'no token provided')
|
||||
t.equal(error.data.code, 'credentials_required')
|
||||
assert.strictEqual(error.data.message, 'no token provided')
|
||||
assert.strictEqual(error.data.code, 'credentials_required')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error with bad token format', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with bad token format', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: 'testing' }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(error.data.message, 'Format is Authorization: Bearer [token]')
|
||||
t.equal(error.data.code, 'credentials_bad_format')
|
||||
assert.strictEqual(
|
||||
error.data.message,
|
||||
'Format is Authorization: Bearer [token]'
|
||||
)
|
||||
assert.strictEqual(error.data.code, 'credentials_bad_format')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error with unauthorized handshake', (t) => {
|
||||
t.plan(4)
|
||||
await t.test('should emit error with unauthorized handshake', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: 'Bearer testing' }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.equal(isUnauthorizedError(error), true)
|
||||
assert.strictEqual(isUnauthorizedError(error), true)
|
||||
if (isUnauthorizedError(error)) {
|
||||
t.equal(
|
||||
assert.strictEqual(
|
||||
error.data.message,
|
||||
'Unauthorized: Token is missing or invalid Bearer'
|
||||
)
|
||||
t.equal(error.data.code, 'invalid_token')
|
||||
assert.strictEqual(error.data.code, 'invalid_token')
|
||||
assert.ok(true)
|
||||
} else {
|
||||
assert.fail('should be unauthorized error')
|
||||
}
|
||||
t.pass()
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should connect the user', (t) => {
|
||||
t.plan(1)
|
||||
await t.test('should connect the user', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: `Bearer ${token}` }
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.pass()
|
||||
assert.ok(true)
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.fail(error.message)
|
||||
assert.fail(error.message)
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should contains user properties', (t) => {
|
||||
t.plan(2)
|
||||
await t.test('should contains user properties', () => {
|
||||
const socketServer = getSocket()
|
||||
socketServer?.on('connection', (client: any) => {
|
||||
t.equal(client.user.email, basicProfile.email)
|
||||
t.pass()
|
||||
assert.strictEqual(client.user.email, basicProfile.email)
|
||||
assert.ok(true)
|
||||
})
|
||||
socket = io(API_URL, {
|
||||
auth: { token: `Bearer ${token}` }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
t.fail(error.message)
|
||||
assert.fail(error.message)
|
||||
})
|
||||
})
|
||||
|
||||
await t.test('should emit error when user validation fails', (t) => {
|
||||
t.plan(2)
|
||||
await t.test('should emit error when user validation fails', () => {
|
||||
socket = io(API_URL, {
|
||||
auth: { token: `Bearer ${wrongToken}` }
|
||||
})
|
||||
socket.on('connect_error', async (error) => {
|
||||
try {
|
||||
t.equal(error.message, 'Check Field validation failed')
|
||||
t.pass()
|
||||
assert.strictEqual(error.message, 'Check Field validation failed')
|
||||
assert.ok(true)
|
||||
} catch {
|
||||
t.fail()
|
||||
assert.fail(error.message)
|
||||
}
|
||||
})
|
||||
socket.on('connect', async () => {
|
||||
t.fail()
|
||||
assert.fail('should not connect')
|
||||
})
|
||||
})
|
||||
})
|
||||
|
Reference in New Issue
Block a user