mirror of
https://github.com/oven-sh/bun
synced 2026-02-11 03:18:53 +00:00
* oops * createSecretKey but weird error * use the right prototype, do not add a function called export lol * HMAC JWT export + base64 fix * Fix Equals, Fix Get KeySize, add complete export RSA * fix RSA export * add EC exports * X25519 and ED25519 export + fixes * fix default exports * better asymmetricKeyType * fix private exports * fix symmetricKeySize * createPublicKey validations + refactor * jwt + der fixes * oopsies * add PEM into createPublicKey * cleanup * WIP * bunch of fixes * public from private + private OKP * encrypted keys fixes * oops * fix clear tls error, add some support to jwk and other formats on publicEncrypt/publicDecrypt * more fixes and tests working * more fixes more tests * more clear hmac errors * more tests and fixes * add generateKeyPair * more tests passing, some skips * fix EC key from private * fix OKP JWK * nodejs ignores ext and key_ops on KeyObject.exports * add EC sign verify test * some fixes * add crypto.generateKeyPairSync(type, options) * more fixes and more tests * fix hmac tests * jsonwebtoken tests * oops * oops2 * generated files * revert package.json * vm tests * todos instead of failues * toBunString -> toString * undo simdutf * improvements * unlikely * cleanup * cleanup 2 * oops * move _generateKeyPairSync checks to native
55 lines
1.7 KiB
JavaScript
55 lines
1.7 KiB
JavaScript
import jwt from "jsonwebtoken";
|
|
import { expect, describe, it } from "bun:test";
|
|
|
|
describe("invalid expiration", function () {
|
|
it("should fail with string", function (done) {
|
|
var broken_token =
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOiIxMjMiLCJmb28iOiJhZGFzIn0.cDa81le-pnwJMcJi3o3PBwB7cTJMiXCkizIhxbXAKRg";
|
|
|
|
jwt.verify(broken_token, "123", function (err) {
|
|
expect(err.name).toEqual("JsonWebTokenError");
|
|
done();
|
|
});
|
|
});
|
|
|
|
it("should fail with 0", function (done) {
|
|
var broken_token =
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOjAsImZvbyI6ImFkYXMifQ.UKxix5T79WwfqAA0fLZr6UrhU-jMES2unwCOFa4grEA";
|
|
|
|
jwt.verify(broken_token, "123", function (err) {
|
|
expect(err.name).toEqual("TokenExpiredError");
|
|
done();
|
|
});
|
|
});
|
|
|
|
it("should fail with false", function (done) {
|
|
var broken_token =
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOmZhbHNlLCJmb28iOiJhZGFzIn0.iBn33Plwhp-ZFXqppCd8YtED77dwWU0h68QS_nEQL8I";
|
|
|
|
jwt.verify(broken_token, "123", function (err) {
|
|
expect(err.name).toEqual("JsonWebTokenError");
|
|
done();
|
|
});
|
|
});
|
|
|
|
it("should fail with true", function (done) {
|
|
var broken_token =
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOnRydWUsImZvbyI6ImFkYXMifQ.eOWfZCTM5CNYHAKSdFzzk2tDkPQmRT17yqllO-ItIMM";
|
|
|
|
jwt.verify(broken_token, "123", function (err) {
|
|
expect(err.name).toEqual("JsonWebTokenError");
|
|
done();
|
|
});
|
|
});
|
|
|
|
it("should fail with object", function (done) {
|
|
var broken_token =
|
|
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOnt9LCJmb28iOiJhZGFzIn0.1JjCTsWLJ2DF-CfESjLdLfKutUt3Ji9cC7ESlcoBHSY";
|
|
|
|
jwt.verify(broken_token, "123", function (err) {
|
|
expect(err.name).toEqual("JsonWebTokenError");
|
|
done();
|
|
});
|
|
});
|
|
});
|