mirror of
https://github.com/oven-sh/bun
synced 2026-02-15 13:22:07 +00:00
* oops * createSecretKey but weird error * use the right prototype, do not add a function called export lol * HMAC JWT export + base64 fix * Fix Equals, Fix Get KeySize, add complete export RSA * fix RSA export * add EC exports * X25519 and ED25519 export + fixes * fix default exports * better asymmetricKeyType * fix private exports * fix symmetricKeySize * createPublicKey validations + refactor * jwt + der fixes * oopsies * add PEM into createPublicKey * cleanup * WIP * bunch of fixes * public from private + private OKP * encrypted keys fixes * oops * fix clear tls error, add some support to jwk and other formats on publicEncrypt/publicDecrypt * more fixes and tests working * more fixes more tests * more clear hmac errors * more tests and fixes * add generateKeyPair * more tests passing, some skips * fix EC key from private * fix OKP JWK * nodejs ignores ext and key_ops on KeyObject.exports * add EC sign verify test * some fixes * add crypto.generateKeyPairSync(type, options) * more fixes and more tests * fix hmac tests * jsonwebtoken tests * oops * oops2 * generated files * revert package.json * vm tests * todos instead of failues * toBunString -> toString * undo simdutf * improvements * unlikely * cleanup * cleanup 2 * oops * move _generateKeyPairSync checks to native
56 lines
1.9 KiB
JavaScript
56 lines
1.9 KiB
JavaScript
"use strict";
|
|
|
|
import { expect, describe, it } from "bun:test";
|
|
import util from "util";
|
|
import testUtils from "./test-utils";
|
|
|
|
function signWithPayload(payload, callback) {
|
|
testUtils.signJWTHelper(payload, "secret", { algorithm: "HS256" }, callback);
|
|
}
|
|
|
|
describe("with a private claim", function () {
|
|
[true, false, null, -1, 0, 1, -1.1, 1.1, "", "private claim", "UTF8 - José", [], ["foo"], {}, { foo: "bar" }].forEach(
|
|
privateClaim => {
|
|
it(`should sign and verify with claim of ${util.inspect(privateClaim)}`, function (done) {
|
|
signWithPayload({ privateClaim }, (e1, token) => {
|
|
testUtils.verifyJWTHelper(token, "secret", {}, (e2, decoded) => {
|
|
testUtils.asyncCheck(done, () => {
|
|
expect(e1).toBeNull();
|
|
expect(e2).toBeNull();
|
|
expect(decoded).toHaveProperty("privateClaim", privateClaim);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
},
|
|
);
|
|
|
|
// these values JSON.stringify to null
|
|
[-Infinity, Infinity, NaN].forEach(privateClaim => {
|
|
it(`should sign and verify with claim of ${util.inspect(privateClaim)}`, function (done) {
|
|
signWithPayload({ privateClaim }, (e1, token) => {
|
|
testUtils.verifyJWTHelper(token, "secret", {}, (e2, decoded) => {
|
|
testUtils.asyncCheck(done, () => {
|
|
expect(e1).toBeNull();
|
|
expect(e2).toBeNull();
|
|
expect(decoded).toHaveProperty("privateClaim", null);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
// private claims with value undefined are not added to the payload
|
|
it(`should sign and verify with claim of undefined`, function (done) {
|
|
signWithPayload({ privateClaim: undefined }, (e1, token) => {
|
|
testUtils.verifyJWTHelper(token, "secret", {}, (e2, decoded) => {
|
|
testUtils.asyncCheck(done, () => {
|
|
expect(e1).toBeNull();
|
|
expect(e2).toBeNull();
|
|
expect(decoded).not.toHaveProperty("privateClaim");
|
|
});
|
|
});
|
|
});
|
|
});
|
|
});
|