Files
bun.sh/test/js/third_party/jsonwebtoken/wrong_alg.test.js
Ciro Spaciari 35109160ca feat(KeyObject) (#5940)
* oops

* createSecretKey but weird error

* use the right prototype, do not add a function called export lol

* HMAC JWT export + base64 fix

* Fix Equals, Fix Get KeySize, add complete export RSA

* fix RSA export

* add EC exports

* X25519 and ED25519 export + fixes

* fix default exports

* better asymmetricKeyType

* fix private exports

* fix symmetricKeySize

* createPublicKey validations + refactor

* jwt + der fixes

* oopsies

* add PEM into createPublicKey

* cleanup

* WIP

* bunch of fixes

* public from private + private OKP

* encrypted keys fixes

* oops

* fix clear tls error, add some support to jwk and other formats on publicEncrypt/publicDecrypt

* more fixes and tests working

* more fixes more tests

* more clear hmac errors

* more tests and fixes

* add generateKeyPair

* more tests passing, some skips

* fix EC key from private

* fix OKP JWK

* nodejs ignores ext and key_ops on KeyObject.exports

* add EC sign verify test

* some fixes

* add crypto.generateKeyPairSync(type, options)

* more fixes and more tests

* fix hmac tests

* jsonwebtoken tests

* oops

* oops2

* generated files

* revert package.json

* vm tests

* todos instead of failues

* toBunString -> toString

* undo simdutf

* improvements

* unlikely

* cleanup

* cleanup 2

* oops

* move _generateKeyPairSync checks to native
2023-10-07 15:22:45 -07:00

50 lines
1.6 KiB
JavaScript

var PS_SUPPORTED = true;
import jwt from "jsonwebtoken";
import { expect, describe, it } from "bun:test";
import path from "path";
import fs from "fs";
var pub = fs.readFileSync(path.join(__dirname, "pub.pem"), "utf8");
// priv is never used
// var priv = fs.readFileSync(path.join(__dirname, 'priv.pem'));
var TOKEN =
"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmb28iOiJiYXIiLCJpYXQiOjE0MjY1NDY5MTl9.ETgkTn8BaxIX4YqvUWVFPmum3moNZ7oARZtSBXb_vP4";
describe("when setting a wrong `header.alg`", function () {
describe("signing with pub key as symmetric", function () {
it("should not verify", function () {
expect(function () {
jwt.verify(TOKEN, pub);
}).toThrow(/invalid algorithm/);
});
});
describe("signing with pub key as HS256 and whitelisting only RS256", function () {
it("should not verify", function () {
expect(function () {
jwt.verify(TOKEN, pub, { algorithms: ["RS256"] });
}).toThrow(/invalid algorithm/);
});
});
if (PS_SUPPORTED) {
describe("signing with pub key as HS256 and whitelisting only PS256", function () {
it("should not verify", function () {
expect(function () {
jwt.verify(TOKEN, pub, { algorithms: ["PS256"] });
}).toThrow(/invalid algorithm/);
});
});
}
describe("signing with HS256 and checking with HS384", function () {
it("should not verify", function () {
expect(function () {
var token = jwt.sign({ foo: "bar" }, "secret", { algorithm: "HS256" });
jwt.verify(token, "some secret", { algorithms: ["HS384"] });
}).toThrow(/invalid algorithm/);
});
});
});