mirror of
https://github.com/oven-sh/bun
synced 2026-02-13 20:39:05 +00:00
* oops * createSecretKey but weird error * use the right prototype, do not add a function called export lol * HMAC JWT export + base64 fix * Fix Equals, Fix Get KeySize, add complete export RSA * fix RSA export * add EC exports * X25519 and ED25519 export + fixes * fix default exports * better asymmetricKeyType * fix private exports * fix symmetricKeySize * createPublicKey validations + refactor * jwt + der fixes * oopsies * add PEM into createPublicKey * cleanup * WIP * bunch of fixes * public from private + private OKP * encrypted keys fixes * oops * fix clear tls error, add some support to jwk and other formats on publicEncrypt/publicDecrypt * more fixes and tests working * more fixes more tests * more clear hmac errors * more tests and fixes * add generateKeyPair * more tests passing, some skips * fix EC key from private * fix OKP JWK * nodejs ignores ext and key_ops on KeyObject.exports * add EC sign verify test * some fixes * add crypto.generateKeyPairSync(type, options) * more fixes and more tests * fix hmac tests * jsonwebtoken tests * oops * oops2 * generated files * revert package.json * vm tests * todos instead of failues * toBunString -> toString * undo simdutf * improvements * unlikely * cleanup * cleanup 2 * oops * move _generateKeyPairSync checks to native
63 lines
1.8 KiB
JavaScript
63 lines
1.8 KiB
JavaScript
"use strict";
|
|
|
|
import jwt from "jsonwebtoken";
|
|
import { expect, describe, it, beforeEach, afterEach } from "bun:test";
|
|
import util from "util";
|
|
import sinon from "sinon";
|
|
|
|
describe("maxAge option", function () {
|
|
let token;
|
|
|
|
let fakeClock;
|
|
beforeEach(function () {
|
|
fakeClock = sinon.useFakeTimers({ now: 60000 });
|
|
token = jwt.sign({ iat: 70 }, "secret", { algorithm: "HS256" });
|
|
});
|
|
|
|
afterEach(function () {
|
|
fakeClock.uninstall();
|
|
});
|
|
|
|
[
|
|
{
|
|
description: "should work with a positive string value",
|
|
maxAge: "3s",
|
|
},
|
|
{
|
|
description: "should work with a negative string value",
|
|
maxAge: "-3s",
|
|
},
|
|
{
|
|
description: "should work with a positive numeric value",
|
|
maxAge: 3,
|
|
},
|
|
{
|
|
description: "should work with a negative numeric value",
|
|
maxAge: -3,
|
|
},
|
|
].forEach(testCase => {
|
|
it(testCase.description, function (done) {
|
|
expect(() => jwt.verify(token, "secret", { maxAge: "3s", algorithm: "HS256" })).not.toThrow();
|
|
jwt.verify(token, "secret", { maxAge: testCase.maxAge, algorithm: "HS256" }, err => {
|
|
expect(err).toBeNull();
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
[true, "invalid", [], ["foo"], {}, { foo: "bar" }].forEach(maxAge => {
|
|
it(`should error with value ${util.inspect(maxAge)}`, function (done) {
|
|
expect(() => jwt.verify(token, "secret", { maxAge, algorithm: "HS256" })).toThrow(
|
|
'"maxAge" should be a number of seconds or string representing a timespan eg: "1d", "20h", 60',
|
|
);
|
|
jwt.verify(token, "secret", { maxAge, algorithm: "HS256" }, err => {
|
|
expect(err).toBeInstanceOf(jwt.JsonWebTokenError);
|
|
expect(err.message).toEqual(
|
|
'"maxAge" should be a number of seconds or string representing a timespan eg: "1d", "20h", 60',
|
|
);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
});
|