Skip to content

Commit

Permalink
remove invalid tests now that header cache has been removed
Browse files Browse the repository at this point in the history
  • Loading branch information
johndagostino committed Mar 18, 2022
1 parent b78e85d commit ff8a47d
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 26 deletions.
4 changes: 1 addition & 3 deletions packages/asap-core/src/fetch.ts
Original file line number Diff line number Diff line change
Expand Up @@ -40,9 +40,7 @@ export function createPublicKeyFetcher({
})
);

return async function getPublicKey(
keyId: string
): Promise<string | undefined> {
return async function getPublicKey(keyId: string): Promise<string> {
let value = cache.get<string>(keyId);

if (value) {
Expand Down
25 changes: 2 additions & 23 deletions packages/asap-core/test/generate_test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -99,16 +99,6 @@ describe('createAuthHeaderGenerator', () => {
expect(token).to.not.be.undefined;
});

it('generates the same token if called twice within 9 minutes', () => {
const generator = createAuthHeaderGenerator(jwtConfig);

const firstToken = generateToken(generator);
currentTime += 9 * 60 * 1000;
const secondToken = generateToken(generator);

expect(firstToken).to.deep.equal(secondToken);
});

it('generates unique tokens if called after 9 minutes', () => {
const generator = createAuthHeaderGenerator(jwtConfig);

Expand All @@ -119,17 +109,6 @@ describe('createAuthHeaderGenerator', () => {
expect(firstToken).not.to.equal(secondToken);
});

it('generates the same token if called twice within custom age', () => {
jwtConfig.tokenMaxAgeMs = 10 * 60 * 1000 - 1;
const generator = createAuthHeaderGenerator(jwtConfig);

const firstToken = generateToken(generator);
currentTime += 10 * 60 * 1000 - 1;
const secondToken = generateToken(generator);

expect(firstToken).to.deep.equal(secondToken);
});

it('fails if missing keyId', () => {
delete jwtConfig.keyId;

Expand Down Expand Up @@ -157,15 +136,15 @@ describe('createAuthHeaderGenerator', () => {
it('fails if invalid privateKey', () => {
jwtConfig.privateKey = 'this is not a valid key';

expect(() => createAuthHeaderGenerator(jwtConfig)).to.throw(
expect(() => createAuthHeaderGenerator(jwtConfig)()).to.throw(
/PEM.*no start line/
);
});

it('fails if missing audience', () => {
delete jwtConfig.audience;

expect(() => createAuthHeaderGenerator(jwtConfig)).to.throw(
expect(() => createAuthHeaderGenerator(jwtConfig)()).to.throw(
/audience must be set/
);
});
Expand Down

0 comments on commit ff8a47d

Please sign in to comment.