|
1 | 1 | import { ApolloServer, HeaderMap } from "@apollo/server";
|
2 | 2 | import { GatewayAuthPlugin } from "./gateway";
|
3 | 3 | import {
|
4 |
| - PublicFederatedToken, |
5 |
| - PublicFederatedTokenContext, |
6 |
| - TokenSigner, |
| 4 | + PublicFederatedToken, |
| 5 | + PublicFederatedTokenContext, |
| 6 | + TokenSigner, |
7 | 7 | } from "./jwt";
|
8 | 8 | import { assert, describe, expect, it } from "vitest";
|
9 | 9 | import httpMocks from "node-mocks-http";
|
10 |
| -import { HeaderTokenSource } from "./tokensource"; |
| 10 | +import { HeaderTokenSource } from "./tokensource/headers"; |
11 | 11 |
|
12 | 12 | describe("GatewayAuthPlugin", () => {
|
13 |
| - const signer = new TokenSigner({ |
14 |
| - audience: "exampleAudience", |
15 |
| - issuer: "exampleIssuer", |
16 |
| - encryptKey: "foo", |
17 |
| - signKey: "bar", |
18 |
| - }); |
| 13 | + const signer = new TokenSigner({ |
| 14 | + audience: "exampleAudience", |
| 15 | + issuer: "exampleIssuer", |
| 16 | + encryptKey: "foo", |
| 17 | + signKey: "bar", |
| 18 | + }); |
19 | 19 |
|
20 |
| - const plugin = new GatewayAuthPlugin({ |
21 |
| - signer: signer, |
22 |
| - source: new HeaderTokenSource(), |
23 |
| - }); |
| 20 | + const plugin = new GatewayAuthPlugin({ |
| 21 | + signer: signer, |
| 22 | + source: new HeaderTokenSource(), |
| 23 | + }); |
24 | 24 |
|
25 |
| - const typeDefs = `#graphql |
| 25 | + const typeDefs = `#graphql |
26 | 26 | type Query {
|
27 | 27 | testToken(create: Boolean): String!
|
28 | 28 | refreshToken: String!
|
29 | 29 | }
|
30 | 30 | `;
|
31 |
| - const resolvers = { |
32 |
| - Query: { |
33 |
| - testToken: ( |
34 |
| - _: any, |
35 |
| - { create }: { create: boolean }, |
36 |
| - context: PublicFederatedTokenContext |
37 |
| - ) => { |
38 |
| - if (!context.federatedToken) { |
39 |
| - throw new Error("No federated token"); |
40 |
| - } |
41 |
| - if (create) { |
42 |
| - context.federatedToken.setAccessToken("foo", { |
43 |
| - token: "bar", |
44 |
| - exp: Date.now() + 1000, |
45 |
| - }); |
46 |
| - context.federatedToken.setRefreshToken("foo", "bar"); |
47 |
| - } |
48 |
| - return JSON.stringify(context.federatedToken); |
49 |
| - }, |
50 |
| - refreshToken: (_: any, context: PublicFederatedTokenContext) => { |
51 |
| - context.federatedToken?.setAccessToken("foo", { |
52 |
| - token: "bar", |
53 |
| - exp: Date.now() + 1000, |
54 |
| - }); |
55 |
| - return JSON.stringify(context.federatedToken); |
56 |
| - }, |
57 |
| - }, |
58 |
| - }; |
| 31 | + const resolvers = { |
| 32 | + Query: { |
| 33 | + testToken: ( |
| 34 | + _: any, |
| 35 | + { create }: { create: boolean }, |
| 36 | + context: PublicFederatedTokenContext |
| 37 | + ) => { |
| 38 | + if (!context.federatedToken) { |
| 39 | + throw new Error("No federated token"); |
| 40 | + } |
| 41 | + if (create) { |
| 42 | + context.federatedToken.setAccessToken("foo", { |
| 43 | + token: "bar", |
| 44 | + exp: Date.now() + 1000, |
| 45 | + }); |
| 46 | + context.federatedToken.setRefreshToken("foo", "bar"); |
| 47 | + } |
| 48 | + return JSON.stringify(context.federatedToken); |
| 49 | + }, |
| 50 | + refreshToken: (_: any, context: PublicFederatedTokenContext) => { |
| 51 | + context.federatedToken?.setAccessToken("foo", { |
| 52 | + token: "bar", |
| 53 | + exp: Date.now() + 1000, |
| 54 | + }); |
| 55 | + return JSON.stringify(context.federatedToken); |
| 56 | + }, |
| 57 | + }, |
| 58 | + }; |
59 | 59 |
|
60 |
| - const testServer = new ApolloServer({ |
61 |
| - typeDefs, |
62 |
| - resolvers, |
63 |
| - plugins: [plugin], |
64 |
| - }); |
| 60 | + const testServer = new ApolloServer({ |
| 61 | + typeDefs, |
| 62 | + resolvers, |
| 63 | + plugins: [plugin], |
| 64 | + }); |
65 | 65 |
|
66 |
| - it("should return the plugin instance", async () => { |
67 |
| - const context = { |
68 |
| - federatedToken: new PublicFederatedToken(), |
69 |
| - res: httpMocks.createResponse(), |
70 |
| - req: httpMocks.createRequest(), |
71 |
| - }; |
72 |
| - await testServer.executeOperation( |
73 |
| - { |
74 |
| - query: "query testToken { testToken(create: true) }", |
75 |
| - http: { |
76 |
| - headers: new HeaderMap(), |
77 |
| - method: "POST", |
78 |
| - search: "", |
79 |
| - body: "", |
80 |
| - }, |
81 |
| - }, |
82 |
| - { |
83 |
| - contextValue: context, |
84 |
| - } |
85 |
| - ); |
86 |
| - expect(context.res.statusCode).toBe(200); |
87 |
| - expect(context.res.get("x-access-token")).toBeDefined(); |
88 |
| - expect(context.res.get("x-refresh-token")).toBeDefined(); |
89 |
| - }); |
| 66 | + it("should return the plugin instance", async () => { |
| 67 | + const context = { |
| 68 | + federatedToken: new PublicFederatedToken(), |
| 69 | + res: httpMocks.createResponse(), |
| 70 | + req: httpMocks.createRequest(), |
| 71 | + }; |
| 72 | + await testServer.executeOperation( |
| 73 | + { |
| 74 | + query: "query testToken { testToken(create: true) }", |
| 75 | + http: { |
| 76 | + headers: new HeaderMap(), |
| 77 | + method: "POST", |
| 78 | + search: "", |
| 79 | + body: "", |
| 80 | + }, |
| 81 | + }, |
| 82 | + { |
| 83 | + contextValue: context, |
| 84 | + } |
| 85 | + ); |
| 86 | + expect(context.res.statusCode).toBe(200); |
| 87 | + expect(context.res.get("x-access-token")).toBeDefined(); |
| 88 | + expect(context.res.get("x-refresh-token")).toBeDefined(); |
| 89 | + }); |
90 | 90 |
|
91 |
| - it("Use generated token", async () => { |
92 |
| - let context = { |
93 |
| - federatedToken: new PublicFederatedToken(), |
94 |
| - res: httpMocks.createResponse(), |
95 |
| - req: httpMocks.createRequest(), |
96 |
| - }; |
97 |
| - await testServer.executeOperation( |
98 |
| - { |
99 |
| - query: "query testToken { testToken(create: true) }", |
100 |
| - http: { |
101 |
| - headers: new HeaderMap(), |
102 |
| - method: "POST", |
103 |
| - search: "", |
104 |
| - body: "", |
105 |
| - }, |
106 |
| - }, |
107 |
| - { |
108 |
| - contextValue: context, |
109 |
| - } |
110 |
| - ); |
111 |
| - expect(context.res.statusCode).toBe(200); |
112 |
| - expect(context.res.get("x-access-token")).toBeDefined(); |
113 |
| - expect(context.res.get("x-refresh-token")).toBeDefined(); |
114 |
| - const accessToken = context.res.get("x-access-token"); |
| 91 | + it("Use generated token", async () => { |
| 92 | + let context = { |
| 93 | + federatedToken: new PublicFederatedToken(), |
| 94 | + res: httpMocks.createResponse(), |
| 95 | + req: httpMocks.createRequest(), |
| 96 | + }; |
| 97 | + await testServer.executeOperation( |
| 98 | + { |
| 99 | + query: "query testToken { testToken(create: true) }", |
| 100 | + http: { |
| 101 | + headers: new HeaderMap(), |
| 102 | + method: "POST", |
| 103 | + search: "", |
| 104 | + body: "", |
| 105 | + }, |
| 106 | + }, |
| 107 | + { |
| 108 | + contextValue: context, |
| 109 | + } |
| 110 | + ); |
| 111 | + expect(context.res.statusCode).toBe(200); |
| 112 | + expect(context.res.get("x-access-token")).toBeDefined(); |
| 113 | + expect(context.res.get("x-refresh-token")).toBeDefined(); |
| 114 | + const accessToken = context.res.get("x-access-token"); |
115 | 115 |
|
116 |
| - // Set received token |
117 |
| - const newContext = { |
118 |
| - federatedToken: new PublicFederatedToken(), |
119 |
| - res: httpMocks.createResponse(), |
120 |
| - req: httpMocks.createRequest({ |
121 |
| - headers: { |
122 |
| - "x-access-token": `Bearer ${accessToken}`, |
123 |
| - }, |
124 |
| - }), |
125 |
| - }; |
126 |
| - const response = await testServer.executeOperation( |
127 |
| - { |
128 |
| - query: "query testToken { testToken(create: false) }", |
129 |
| - http: { |
130 |
| - headers: new HeaderMap(), |
131 |
| - method: "POST", |
132 |
| - search: "", |
133 |
| - body: "", |
134 |
| - }, |
135 |
| - }, |
136 |
| - { |
137 |
| - contextValue: newContext, |
138 |
| - } |
139 |
| - ); |
140 |
| - expect(response.body.kind).toBe("single"); |
141 |
| - assert(response.body.kind === "single"); // Make typescript happy |
142 |
| - expect(response.body.singleResult).toBeDefined(); |
| 116 | + // Set received token |
| 117 | + const newContext = { |
| 118 | + federatedToken: new PublicFederatedToken(), |
| 119 | + res: httpMocks.createResponse(), |
| 120 | + req: httpMocks.createRequest({ |
| 121 | + headers: { |
| 122 | + "x-access-token": `Bearer ${accessToken}`, |
| 123 | + }, |
| 124 | + }), |
| 125 | + }; |
| 126 | + const response = await testServer.executeOperation( |
| 127 | + { |
| 128 | + query: "query testToken { testToken(create: false) }", |
| 129 | + http: { |
| 130 | + headers: new HeaderMap(), |
| 131 | + method: "POST", |
| 132 | + search: "", |
| 133 | + body: "", |
| 134 | + }, |
| 135 | + }, |
| 136 | + { |
| 137 | + contextValue: newContext, |
| 138 | + } |
| 139 | + ); |
| 140 | + expect(response.body.kind).toBe("single"); |
| 141 | + assert(response.body.kind === "single"); // Make typescript happy |
| 142 | + expect(response.body.singleResult).toBeDefined(); |
143 | 143 |
|
144 |
| - const token = JSON.parse( |
145 |
| - response.body.singleResult.data?.testToken as string |
146 |
| - ) as PublicFederatedToken; |
147 |
| - expect(token.tokens.foo.token).toBe("bar"); |
148 |
| - expect(newContext.res.get("x-access-token")).toBeUndefined(); |
149 |
| - expect(newContext.res.get("x-refresh-token")).toBeUndefined(); |
150 |
| - }); |
| 144 | + const token = JSON.parse( |
| 145 | + response.body.singleResult.data?.testToken as string |
| 146 | + ) as PublicFederatedToken; |
| 147 | + expect(token.tokens.foo.token).toBe("bar"); |
| 148 | + expect(newContext.res.get("x-access-token")).toBeUndefined(); |
| 149 | + expect(newContext.res.get("x-refresh-token")).toBeUndefined(); |
| 150 | + }); |
151 | 151 | });
|
0 commit comments