|
var fs = require('fs');
|
|
var path = require('path');
|
|
var jwt = require('../index');
|
|
var JsonWebTokenError = require('../lib/JsonWebTokenError');
|
|
var expect = require('chai').expect;
|
|
|
|
|
|
var pub = fs.readFileSync(path.join(__dirname, 'pub.pem'), 'utf8');
|
|
// priv is never used
|
|
// var priv = fs.readFileSync(path.join(__dirname, 'priv.pem'));
|
|
|
|
var TOKEN = 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmb28iOiJiYXIiLCJpYXQiOjE0MjY1NDY5MTl9.ETgkTn8BaxIX4YqvUWVFPmum3moNZ7oARZtSBXb_vP4';
|
|
|
|
describe('when setting a wrong `header.alg`', function () {
|
|
|
|
describe('signing with pub key as symmetric', function () {
|
|
it('should not verify', function () {
|
|
expect(function () {
|
|
jwt.verify(TOKEN, pub);
|
|
}).to.throw(JsonWebTokenError, /invalid algorithm/);
|
|
});
|
|
});
|
|
|
|
describe('signing with pub key as HS256 and whitelisting only RS256', function () {
|
|
it('should not verify', function () {
|
|
expect(function () {
|
|
jwt.verify(TOKEN, pub, {algorithms: ['RS256']});
|
|
}).to.throw(JsonWebTokenError, /invalid algorithm/);
|
|
});
|
|
});
|
|
|
|
describe('signing with HS256 and checking with HS384', function () {
|
|
it('should not verify', function () {
|
|
expect(function () {
|
|
var token = jwt.sign({foo: 'bar'}, 'secret', {algorithm: 'HS256'});
|
|
jwt.verify(token, 'some secret', {algorithms: ['HS384']});
|
|
}).to.throw(JsonWebTokenError, /invalid algorithm/);
|
|
});
|
|
});
|
|
|
|
|
|
});
|