mirror of
https://github.com/n8n-io/n8n.git
synced 2024-11-14 16:44:07 -08:00
3460eb5eeb
HELP-394
63 lines
2 KiB
TypeScript
63 lines
2 KiB
TypeScript
import jwt from 'jsonwebtoken';
|
|
import type { InstanceSettings } from 'n8n-core';
|
|
import { mock } from 'jest-mock-extended';
|
|
import config from '@/config';
|
|
import { JwtService } from '@/services/jwt.service';
|
|
|
|
describe('JwtService', () => {
|
|
const iat = 1699984313;
|
|
const jwtSecret = 'random-string';
|
|
const payload = { sub: 1 };
|
|
const signedToken =
|
|
'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOjEsImlhdCI6MTY5OTk4NDMxM30.xNZOAmcidW5ovEF_mwIOzCWkJ70FEO6MFNLK2QRDOeQ';
|
|
|
|
const instanceSettings = mock<InstanceSettings>({ encryptionKey: 'test-key' });
|
|
|
|
beforeEach(() => {
|
|
jest.clearAllMocks();
|
|
});
|
|
|
|
describe('secret initialization', () => {
|
|
it('should read the secret from config, when set', () => {
|
|
config.set('userManagement.jwtSecret', jwtSecret);
|
|
const jwtService = new JwtService(instanceSettings);
|
|
expect(jwtService.jwtSecret).toEqual(jwtSecret);
|
|
});
|
|
|
|
it('should derive the secret from encryption key when not set in config', () => {
|
|
config.set('userManagement.jwtSecret', '');
|
|
const jwtService = new JwtService(instanceSettings);
|
|
expect(jwtService.jwtSecret).toEqual(
|
|
'e9e2975005eddefbd31b2c04a0b0f2d9c37d9d718cf3676cddf76d65dec555cb',
|
|
);
|
|
});
|
|
});
|
|
|
|
describe('with a secret set', () => {
|
|
config.set('userManagement.jwtSecret', jwtSecret);
|
|
const jwtService = new JwtService(instanceSettings);
|
|
|
|
beforeAll(() => {
|
|
jest.useFakeTimers().setSystemTime(new Date(iat * 1000));
|
|
});
|
|
|
|
afterAll(() => jest.useRealTimers());
|
|
|
|
it('should sign', () => {
|
|
const token = jwtService.sign(payload);
|
|
expect(token).toEqual(signedToken);
|
|
});
|
|
|
|
it('should decode and verify payload', () => {
|
|
const decodedToken = jwtService.verify(signedToken);
|
|
expect(decodedToken.sub).toEqual(1);
|
|
expect(decodedToken.iat).toEqual(iat);
|
|
});
|
|
|
|
it('should throw an error on verify if the token is expired', () => {
|
|
const expiredToken = jwt.sign(payload, jwtSecret, { expiresIn: -10 });
|
|
expect(() => jwtService.verify(expiredToken)).toThrow(jwt.TokenExpiredError);
|
|
});
|
|
});
|
|
});
|