1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
|
"use strict";
import jwt from "jsonwebtoken";
import { expect, describe, it, beforeEach, afterEach } from "bun:test";
import util from "util";
import sinon from "sinon";
describe("maxAge option", function () {
let token;
let fakeClock;
beforeEach(function () {
fakeClock = sinon.useFakeTimers({ now: 60000 });
token = jwt.sign({ iat: 70 }, "secret", { algorithm: "HS256" });
});
afterEach(function () {
fakeClock.uninstall();
});
[
{
description: "should work with a positive string value",
maxAge: "3s",
},
{
description: "should work with a negative string value",
maxAge: "-3s",
},
{
description: "should work with a positive numeric value",
maxAge: 3,
},
{
description: "should work with a negative numeric value",
maxAge: -3,
},
].forEach(testCase => {
it(testCase.description, function (done) {
expect(() => jwt.verify(token, "secret", { maxAge: "3s", algorithm: "HS256" })).not.toThrow();
jwt.verify(token, "secret", { maxAge: testCase.maxAge, algorithm: "HS256" }, err => {
expect(err).toBeNull();
done();
});
});
});
[true, "invalid", [], ["foo"], {}, { foo: "bar" }].forEach(maxAge => {
it(`should error with value ${util.inspect(maxAge)}`, function (done) {
expect(() => jwt.verify(token, "secret", { maxAge, algorithm: "HS256" })).toThrow(
'"maxAge" should be a number of seconds or string representing a timespan eg: "1d", "20h", 60',
);
jwt.verify(token, "secret", { maxAge, algorithm: "HS256" }, err => {
expect(err).toBeInstanceOf(jwt.JsonWebTokenError);
expect(err.message).toEqual(
'"maxAge" should be a number of seconds or string representing a timespan eg: "1d", "20h", 60',
);
done();
});
});
});
});
|