debian-mirror-gitlab/spec/lib/omni_auth/strategies/jwt_spec.rb

88 lines
2.2 KiB
Ruby
Raw Normal View History

2018-05-09 12:01:36 +05:30
require 'spec_helper'
describe OmniAuth::Strategies::Jwt do
include Rack::Test::Methods
include DeviseHelpers
2019-01-03 12:48:30 +05:30
context '.decoded' do
let(:strategy) { described_class.new({}) }
2018-05-09 12:01:36 +05:30
let(:timestamp) { Time.now.to_i }
let(:jwt_config) { Devise.omniauth_configs[:jwt] }
2019-01-03 12:48:30 +05:30
let(:key) { JWT.encode(claims, jwt_config.strategy.secret) }
2018-05-09 12:01:36 +05:30
let(:claims) do
{
id: 123,
name: "user_example",
email: "user@example.com",
iat: timestamp
}
end
before do
2019-01-03 12:48:30 +05:30
allow_any_instance_of(OmniAuth::Strategy).to receive(:options).and_return(jwt_config.strategy)
allow_any_instance_of(Rack::Request).to receive(:params).and_return({ 'jwt' => key })
2018-05-09 12:01:36 +05:30
end
2019-01-03 12:48:30 +05:30
it 'decodes the user information' do
result = strategy.decoded
2018-05-09 12:01:36 +05:30
2019-01-03 12:48:30 +05:30
expect(result["id"]).to eq(123)
expect(result["name"]).to eq("user_example")
expect(result["email"]).to eq("user@example.com")
expect(result["iat"]).to eq(timestamp)
2018-05-09 12:01:36 +05:30
end
context 'required claims is missing' do
let(:claims) do
{
id: 123,
email: "user@example.com",
iat: timestamp
}
end
it 'raises error' do
2019-01-03 12:48:30 +05:30
expect { strategy.decoded }.to raise_error(OmniAuth::Strategies::Jwt::ClaimInvalid)
2018-05-09 12:01:36 +05:30
end
end
context 'when valid_within is specified but iat attribute is missing in response' do
let(:claims) do
{
id: 123,
name: "user_example",
email: "user@example.com"
}
end
before do
2019-01-03 12:48:30 +05:30
jwt_config.strategy.valid_within = Time.now.to_i
2018-05-09 12:01:36 +05:30
end
it 'raises error' do
2019-01-03 12:48:30 +05:30
expect { strategy.decoded }.to raise_error(OmniAuth::Strategies::Jwt::ClaimInvalid)
2018-05-09 12:01:36 +05:30
end
end
context 'when timestamp claim is too skewed from present' do
let(:claims) do
{
id: 123,
name: "user_example",
email: "user@example.com",
iat: timestamp - 10.minutes.to_i
}
end
before do
2019-01-03 12:48:30 +05:30
jwt_config.strategy.valid_within = 2.seconds
2018-05-09 12:01:36 +05:30
end
it 'raises error' do
2019-01-03 12:48:30 +05:30
expect { strategy.decoded }.to raise_error(OmniAuth::Strategies::Jwt::ClaimInvalid)
2018-05-09 12:01:36 +05:30
end
end
end
end