@@ -45,7 +45,7 @@ I3OrgFkoqk03cpX4AL2GYC2ejytAqboL6pFTfmTgg2UtvKIeaTyF
45
45
describe ( 'jwt plugin' , ( ) => {
46
46
test ( 'incoming http request is reject when auth token is not present' , async ( ) => {
47
47
const test = createTestServer ( {
48
- singingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
48
+ signingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
49
49
} ) ;
50
50
const response = await test . queryWithoutAuth ( ) ;
51
51
expect ( response . status ) . toBe ( 401 ) ;
@@ -62,7 +62,7 @@ describe('jwt plugin', () => {
62
62
63
63
test ( 'should allow to continue if reject.missingToken is set to false' , async ( ) => {
64
64
const test = createTestServer ( {
65
- singingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
65
+ signingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
66
66
reject : {
67
67
missingToken : false ,
68
68
invalidToken : true ,
@@ -75,7 +75,7 @@ describe('jwt plugin', () => {
75
75
test ( 'any prefix is supported when strict prefix validation is not configured' , async ( ) => {
76
76
const secret = 'topsecret' ;
77
77
const test = createTestServer ( {
78
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
78
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
79
79
tokenLookupLocations : [
80
80
extractFromHeader ( {
81
81
name : 'Authorization' ,
@@ -89,7 +89,7 @@ describe('jwt plugin', () => {
89
89
90
90
test ( 'incoming http has a token but prefix does not match or missing' , async ( ) => {
91
91
const test = createTestServer ( {
92
- singingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
92
+ signingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
93
93
} ) ;
94
94
// does not match prefix
95
95
let response = await test . queryWithAuth ( 'Basic 123' ) ;
@@ -120,7 +120,7 @@ describe('jwt plugin', () => {
120
120
121
121
test ( 'token provided but jwt token is not valid for decoding' , async ( ) => {
122
122
const test = createTestServer ( {
123
- singingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
123
+ signingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
124
124
} ) ;
125
125
const response = await test . queryWithAuth ( 'Bearer BadJwt' ) ;
126
126
expect ( response . status ) . toBe ( 400 ) ;
@@ -137,7 +137,7 @@ describe('jwt plugin', () => {
137
137
138
138
test ( 'invalid token can be accepted when reject.invalidToken=false is set' , async ( ) => {
139
139
const test = createTestServer ( {
140
- singingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
140
+ signingKeyProviders : [ createInlineSigningKeyProvider ( 'topsecret' ) ] ,
141
141
reject : {
142
142
invalidToken : false ,
143
143
} ,
@@ -149,7 +149,7 @@ describe('jwt plugin', () => {
149
149
it ( 'should not allow non matching issuer' , async ( ) => {
150
150
const secret = 'topsecret' ;
151
151
const server = createTestServer ( {
152
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
152
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
153
153
tokenVerification : {
154
154
issuer : [ 'http://yoga' ] ,
155
155
} ,
@@ -168,7 +168,7 @@ describe('jwt plugin', () => {
168
168
it ( 'should allow matching issuer' , async ( ) => {
169
169
const secret = 'topsecret' ;
170
170
const server = createTestServer ( {
171
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
171
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
172
172
tokenVerification : {
173
173
issuer : [ 'http://yoga' ] ,
174
174
} ,
@@ -182,7 +182,7 @@ describe('jwt plugin', () => {
182
182
it ( 'should not allow non matching audience' , async ( ) => {
183
183
const secret = 'topsecret' ;
184
184
const server = createTestServer ( {
185
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
185
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
186
186
tokenVerification : {
187
187
audience : 'my.app' ,
188
188
} ,
@@ -203,7 +203,7 @@ describe('jwt plugin', () => {
203
203
it ( 'should allow matching audience' , async ( ) => {
204
204
const secret = 'topsecret' ;
205
205
const server = createTestServer ( {
206
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
206
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
207
207
tokenVerification : {
208
208
audience : 'my.app' ,
209
209
} ,
@@ -234,7 +234,7 @@ describe('jwt plugin', () => {
234
234
235
235
try {
236
236
const server = createTestServer ( {
237
- singingKeyProviders : [
237
+ signingKeyProviders : [
238
238
createRemoteJwksSigningKeyProvider ( {
239
239
jwksUri : `http://localhost:${ ( jwksServer . address ( ) as any ) . port } ` ,
240
240
} ) ,
@@ -259,7 +259,7 @@ describe('jwt plugin', () => {
259
259
it ( 'should not accept token without algorithm' , async ( ) => {
260
260
const secret = 'topsecret' ;
261
261
const server = createTestServer ( {
262
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
262
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
263
263
} ) ;
264
264
265
265
const response = await server . queryWithAuth ( buildJWTWithoutAlg ( ) ) ;
@@ -276,7 +276,7 @@ describe('jwt plugin', () => {
276
276
test ( 'valid token is injected to the GraphQL context' , async ( ) => {
277
277
const secret = 'topsecret' ;
278
278
const test = createTestServer ( {
279
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
279
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
280
280
} ) ;
281
281
const token = buildJWT ( { sub : '123' , scopes : [ 'users.read' ] } , { key : secret } ) ;
282
282
const response = await test . queryWithAuth ( token ) ;
@@ -302,7 +302,7 @@ describe('jwt plugin', () => {
302
302
test ( 'valid token is injected to the GraphQL context (custom field)' , async ( ) => {
303
303
const secret = 'topsecret' ;
304
304
const test = createTestServer ( {
305
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
305
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
306
306
extendContext : 'my_jwt' ,
307
307
} ) ;
308
308
const token = buildJWT ( { sub : '123' , scopes : [ 'users.read' ] } , { key : secret } ) ;
@@ -329,7 +329,7 @@ describe('jwt plugin', () => {
329
329
test ( 'auth is passing when token is valid (HS256)' , async ( ) => {
330
330
const secret = 'topsecret' ;
331
331
const test = createTestServer ( {
332
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
332
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
333
333
} ) ;
334
334
const token = buildJWT ( { sub : '123' } , { key : secret } ) ;
335
335
const response = await test . queryWithAuth ( token ) ;
@@ -353,7 +353,7 @@ describe('jwt plugin', () => {
353
353
354
354
test ( 'auth is passing when token is valid (RS256)' , async ( ) => {
355
355
const test = createTestServer ( {
356
- singingKeyProviders : [ createInlineSigningKeyProvider ( JWKS_RSA512_PRIVATE_PEM ) ] ,
356
+ signingKeyProviders : [ createInlineSigningKeyProvider ( JWKS_RSA512_PRIVATE_PEM ) ] ,
357
357
} ) ;
358
358
const token = buildJWT ( { sub : '123' } , { key : JWKS_RSA512_PRIVATE_PEM , algorithm : 'RS256' } ) ;
359
359
const response = await test . queryWithAuth ( token ) ;
@@ -397,7 +397,7 @@ describe('jwt plugin', () => {
397
397
398
398
try {
399
399
const test = createTestServer ( {
400
- singingKeyProviders : [
400
+ signingKeyProviders : [
401
401
createRemoteJwksSigningKeyProvider ( {
402
402
jwksUri : `http://localhost:${ ( jwksServer . address ( ) as any ) . port } ` ,
403
403
} ) ,
@@ -438,7 +438,7 @@ describe('jwt plugin', () => {
438
438
439
439
try {
440
440
const test = createTestServer ( {
441
- singingKeyProviders : [
441
+ signingKeyProviders : [
442
442
// Remote, invalid
443
443
createRemoteJwksSigningKeyProvider ( {
444
444
jwksUri : `http://localhost:${ ( jwksServer . address ( ) as any ) . port } ` ,
@@ -476,7 +476,7 @@ describe('jwt plugin', () => {
476
476
test ( 'should throw when lookup is configured for cookie but no cookie store available' , async ( ) => {
477
477
const secret = 'topsecret' ;
478
478
const test = createTestServer ( {
479
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
479
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
480
480
tokenLookupLocations : [ extractFromCookie ( { name : 'auth' } ) ] ,
481
481
} ) ;
482
482
const token = buildJWT ( { sub : '123' } , { key : secret } ) ;
@@ -495,7 +495,7 @@ describe('jwt plugin', () => {
495
495
const secret = 'topsecret' ;
496
496
const test = createTestServer (
497
497
{
498
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
498
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
499
499
tokenLookupLocations : [ extractFromCookie ( { name : 'auth' } ) ] ,
500
500
} ,
501
501
[ useCookies < any > ( ) ] ,
@@ -508,7 +508,7 @@ describe('jwt plugin', () => {
508
508
test ( 'custom getToken functiFailed to verify authentication token. Verifon' , async ( ) => {
509
509
const secret = 'topsecret' ;
510
510
const test = createTestServer ( {
511
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
511
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
512
512
tokenLookupLocations : [
513
513
async payload => {
514
514
expect ( payload . request ) . toBeDefined ( ) ;
@@ -539,7 +539,7 @@ describe('jwt plugin', () => {
539
539
const secret = 'topsecret' ;
540
540
const test = createTestServer (
541
541
{
542
- singingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
542
+ signingKeyProviders : [ createInlineSigningKeyProvider ( secret ) ] ,
543
543
tokenLookupLocations : [
544
544
extractFromHeader ( {
545
545
name : 'Authorization' ,
0 commit comments