125 lines
3.5 KiB
Ruby
125 lines
3.5 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe OmniAuth::Strategies::Jwt do
|
|
include Rack::Test::Methods
|
|
include DeviseHelpers
|
|
|
|
context '#decoded' do
|
|
subject { described_class.new({}) }
|
|
let(:timestamp) { Time.now.to_i }
|
|
let(:jwt_config) { Devise.omniauth_configs[:jwt] }
|
|
let(:claims) do
|
|
{
|
|
id: 123,
|
|
name: "user_example",
|
|
email: "user@example.com",
|
|
iat: timestamp
|
|
}
|
|
end
|
|
let(:algorithm) { 'HS256' }
|
|
let(:secret) { jwt_config.strategy.secret }
|
|
let(:private_key) { secret }
|
|
let(:payload) { JWT.encode(claims, private_key, algorithm) }
|
|
|
|
before do
|
|
subject.options[:secret] = secret
|
|
subject.options[:algorithm] = algorithm
|
|
|
|
# We use Rack::Request instead of ActionDispatch::Request because
|
|
# Rack::Test::Methods enables testing of this module.
|
|
expect_next_instance_of(Rack::Request) do |rack_request|
|
|
expect(rack_request).to receive(:params).and_return('jwt' => payload)
|
|
end
|
|
end
|
|
|
|
ECDSA_NAMED_CURVES = {
|
|
'ES256' => 'prime256v1',
|
|
'ES384' => 'secp384r1',
|
|
'ES512' => 'secp521r1'
|
|
}.freeze
|
|
|
|
{
|
|
OpenSSL::PKey::RSA => %w[RS256 RS384 RS512],
|
|
OpenSSL::PKey::EC => %w[ES256 ES384 ES512],
|
|
String => %w[HS256 HS384 HS512]
|
|
}.each do |private_key_class, algorithms|
|
|
algorithms.each do |algorithm|
|
|
context "when the #{algorithm} algorithm is used" do
|
|
let(:algorithm) { algorithm }
|
|
let(:secret) do
|
|
if private_key_class == OpenSSL::PKey::RSA
|
|
private_key_class.generate(2048)
|
|
.to_pem
|
|
elsif private_key_class == OpenSSL::PKey::EC
|
|
private_key_class.new(ECDSA_NAMED_CURVES[algorithm])
|
|
.tap { |key| key.generate_key! }
|
|
.to_pem
|
|
else
|
|
private_key_class.new(jwt_config.strategy.secret)
|
|
end
|
|
end
|
|
let(:private_key) { private_key_class ? private_key_class.new(secret) : secret }
|
|
|
|
it 'decodes the user information' do
|
|
result = subject.decoded
|
|
|
|
expect(result).to eq(claims.stringify_keys)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'required claims is missing' do
|
|
let(:claims) do
|
|
{
|
|
id: 123,
|
|
email: "user@example.com",
|
|
iat: timestamp
|
|
}
|
|
end
|
|
|
|
it 'raises error' do
|
|
expect { subject.decoded }.to raise_error(OmniAuth::Strategies::Jwt::ClaimInvalid)
|
|
end
|
|
end
|
|
|
|
context 'when valid_within is specified but iat attribute is missing in response' do
|
|
let(:claims) do
|
|
{
|
|
id: 123,
|
|
name: "user_example",
|
|
email: "user@example.com"
|
|
}
|
|
end
|
|
|
|
before do
|
|
# Omniauth config values are always strings!
|
|
subject.options[:valid_within] = 2.days.to_s
|
|
end
|
|
|
|
it 'raises error' do
|
|
expect { subject.decoded }.to raise_error(OmniAuth::Strategies::Jwt::ClaimInvalid)
|
|
end
|
|
end
|
|
|
|
context 'when timestamp claim is too skewed from present' do
|
|
let(:claims) do
|
|
{
|
|
id: 123,
|
|
name: "user_example",
|
|
email: "user@example.com",
|
|
iat: timestamp - 10.minutes.to_i
|
|
}
|
|
end
|
|
|
|
before do
|
|
# Omniauth config values are always strings!
|
|
subject.options[:valid_within] = 2.seconds.to_s
|
|
end
|
|
|
|
it 'raises error' do
|
|
expect { subject.decoded }.to raise_error(OmniAuth::Strategies::Jwt::ClaimInvalid)
|
|
end
|
|
end
|
|
end
|
|
end
|