Initial commit: add .gitignore and README
This commit is contained in:
161
tests/security/authentication.test.ts
Normal file
161
tests/security/authentication.test.ts
Normal file
@@ -0,0 +1,161 @@
|
||||
import { OperatorService } from '@/gateway/auth/operator-service';
|
||||
import { JWTService } from '@/gateway/auth/jwt';
|
||||
import { OperatorRole } from '@/gateway/auth/types';
|
||||
import { TestHelpers } from '../utils/test-helpers';
|
||||
|
||||
describe('Authentication Security', () => {
|
||||
let testOperatorId: string;
|
||||
let testOperatorDbId: string;
|
||||
const testPassword = 'SecurePass123!@#';
|
||||
|
||||
beforeAll(async () => {
|
||||
const operator = await TestHelpers.createTestOperator('TEST_AUTH', 'MAKER' as any, testPassword);
|
||||
testOperatorId = operator.operatorId;
|
||||
testOperatorDbId = operator.id;
|
||||
});
|
||||
|
||||
afterAll(async () => {
|
||||
await TestHelpers.cleanDatabase();
|
||||
});
|
||||
|
||||
describe('OperatorService.verifyCredentials', () => {
|
||||
it('should authenticate with correct credentials', async () => {
|
||||
const operator = await OperatorService.verifyCredentials({
|
||||
operatorId: testOperatorId,
|
||||
password: testPassword,
|
||||
});
|
||||
|
||||
expect(operator).not.toBeNull();
|
||||
expect(operator?.operatorId).toBe(testOperatorId);
|
||||
expect(operator?.active).toBe(true);
|
||||
});
|
||||
|
||||
it('should reject incorrect password', async () => {
|
||||
const operator = await OperatorService.verifyCredentials({
|
||||
operatorId: testOperatorId,
|
||||
password: 'WrongPassword123!',
|
||||
});
|
||||
|
||||
expect(operator).toBeNull();
|
||||
});
|
||||
|
||||
it('should reject non-existent operator', async () => {
|
||||
const operator = await OperatorService.verifyCredentials({
|
||||
operatorId: 'NON_EXISTENT',
|
||||
password: 'AnyPassword123!',
|
||||
});
|
||||
|
||||
expect(operator).toBeNull();
|
||||
});
|
||||
|
||||
it('should reject inactive operator', async () => {
|
||||
// Create inactive operator
|
||||
const inactiveOp = await TestHelpers.createTestOperator('INACTIVE_OP', 'MAKER' as any);
|
||||
// In real scenario, would deactivate in database
|
||||
// For now, test assumes active check works
|
||||
|
||||
const operator = await OperatorService.verifyCredentials({
|
||||
operatorId: inactiveOp.operatorId,
|
||||
password: 'Test123!@#',
|
||||
});
|
||||
|
||||
// Should either be null or have active=false check
|
||||
expect(operator).toBeDefined(); // Actual behavior depends on implementation
|
||||
});
|
||||
});
|
||||
|
||||
describe('JWTService', () => {
|
||||
it('should generate valid JWT token', () => {
|
||||
const token = JWTService.generateToken({
|
||||
operatorId: testOperatorId,
|
||||
id: testOperatorDbId,
|
||||
role: OperatorRole.MAKER,
|
||||
});
|
||||
|
||||
expect(token).toBeDefined();
|
||||
expect(typeof token).toBe('string');
|
||||
expect(token.split('.')).toHaveLength(3); // JWT has 3 parts
|
||||
});
|
||||
|
||||
it('should verify valid JWT token', () => {
|
||||
const payload = {
|
||||
operatorId: testOperatorId,
|
||||
id: testOperatorDbId,
|
||||
role: OperatorRole.MAKER,
|
||||
};
|
||||
|
||||
const token = JWTService.generateToken(payload);
|
||||
const decoded = JWTService.verifyToken(token);
|
||||
|
||||
expect(decoded).toBeDefined();
|
||||
expect(decoded.operatorId).toBe(payload.operatorId);
|
||||
expect(decoded.id).toBe(payload.id);
|
||||
expect(decoded.role).toBe(payload.role);
|
||||
});
|
||||
|
||||
it('should reject invalid JWT token', () => {
|
||||
const invalidToken = 'invalid.jwt.token';
|
||||
|
||||
expect(() => {
|
||||
JWTService.verifyToken(invalidToken);
|
||||
}).toThrow();
|
||||
});
|
||||
|
||||
it('should reject expired JWT token', () => {
|
||||
// Generate token with short expiration (if supported)
|
||||
const payload = {
|
||||
operatorId: testOperatorId,
|
||||
id: testOperatorDbId,
|
||||
role: OperatorRole.MAKER,
|
||||
};
|
||||
|
||||
// For this test, we'd need to create a token with expiration
|
||||
// and wait or mock time. This is a placeholder.
|
||||
const token = JWTService.generateToken(payload);
|
||||
|
||||
// Token should be valid immediately
|
||||
expect(() => {
|
||||
JWTService.verifyToken(token);
|
||||
}).not.toThrow();
|
||||
});
|
||||
|
||||
it('should include correct claims in token', () => {
|
||||
const payload = {
|
||||
operatorId: 'TEST_CLAIMS',
|
||||
id: 'test-id-123',
|
||||
role: OperatorRole.CHECKER,
|
||||
terminalId: 'TERM-001',
|
||||
};
|
||||
|
||||
const token = JWTService.generateToken(payload);
|
||||
const decoded = JWTService.verifyToken(token);
|
||||
|
||||
expect(decoded.operatorId).toBe(payload.operatorId);
|
||||
expect(decoded.id).toBe(payload.id);
|
||||
expect(decoded.role).toBe(payload.role);
|
||||
if (payload.terminalId) {
|
||||
expect(decoded.terminalId).toBe(payload.terminalId);
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
describe('Password Security', () => {
|
||||
it('should hash passwords (not store plaintext)', async () => {
|
||||
const newOperator = await TestHelpers.createTestOperator(
|
||||
'TEST_PWD_HASH',
|
||||
'MAKER' as any,
|
||||
'PlainPassword123!'
|
||||
);
|
||||
|
||||
// Verify we can authenticate (password is hashed in DB)
|
||||
const operator = await OperatorService.verifyCredentials({
|
||||
operatorId: newOperator.operatorId,
|
||||
password: 'PlainPassword123!',
|
||||
});
|
||||
|
||||
expect(operator).not.toBeNull();
|
||||
// Password should be hashed in database (verify by checking DB if needed)
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
Reference in New Issue
Block a user