@@ -5,16 +5,16 @@ const assert = require('assert');
55const sinon = require ( 'sinon' ) ;
66const auth = require ( '../../' ) ;
77
8- const mongo = require ( '../support/ mongo' ) ;
9- const redis = require ( '../support/ redis' ) ;
8+ const mongo = require ( '@turbasen/db- mongo' ) ;
9+ const redis = require ( '@turbasen/db- redis' ) ;
1010
1111const AuthUser = require ( '../../lib/User' ) . AuthUser ;
1212const UnauthUser = require ( '../../lib/User' ) . UnauthUser ;
1313
1414describe ( 'auth' , ( ) => {
1515 describe ( 'getUserByToken()' , ( ) => {
1616 it ( 'rejects invalid token' , done => {
17- auth . getUserByToken ( redis , mongo . users , 'prod' , 'invalid' )
17+ auth . getUserByToken ( 'invalid' )
1818 . then ( ( ) => process . nextTick ( ( ) => assert . fail ( ) ) )
1919 . catch ( error => process . nextTick ( ( ) => {
2020 assert ( error instanceof HttpError ) ;
@@ -25,7 +25,7 @@ describe('auth', () => {
2525 } ) ;
2626
2727 it ( 'saves invalid token to redis cache' , done => {
28- auth . getUserByToken ( redis , mongo . users , 'prod' , 'invalid' )
28+ auth . getUserByToken ( 'invalid' )
2929 . then ( ( ) => process . nextTick ( ( ) => assert . fail ( ) ) )
3030 . catch ( ( ) => process . nextTick ( ( ) => {
3131 redis . hgetall ( 'api:token:invalid' , ( err , data ) => {
@@ -37,7 +37,7 @@ describe('auth', () => {
3737 } ) ;
3838
3939 it ( 'caches invalid token for 24 hours' , done => {
40- auth . getUserByToken ( redis , mongo . users , 'prod' , 'invalid' )
40+ auth . getUserByToken ( 'invalid' )
4141 . then ( ( ) => process . nextTick ( ( ) => assert . fail ( ) ) )
4242 . catch ( ( ) => process . nextTick ( ( ) => {
4343 redis . ttl ( 'api:token:invalid' , ( err , ttl ) => {
@@ -52,7 +52,7 @@ describe('auth', () => {
5252 redis . hset ( 'api:token:invalid' , 'access' , 'false' , err => {
5353 assert . ifError ( err ) ;
5454
55- auth . getUserByToken ( redis , mongo . users , 'prod' , 'invalid' )
55+ auth . getUserByToken ( 'invalid' )
5656 . then ( ( ) => process . nextTick ( ( ) => assert . fail ( ) ) )
5757 . catch ( error => process . nextTick ( ( ) => {
5858 assert . equal ( error . code , 401 ) ;
@@ -64,15 +64,15 @@ describe('auth', () => {
6464 } ) ;
6565
6666 it ( 'returns user for valid token' , done => {
67- auth . getUserByToken ( redis , mongo . users , 'prod' , 'foo_app1_prod ')
67+ auth . getUserByToken ( 'foo_app1_test ')
6868 . then ( user => process . nextTick ( ( ) => {
6969 assert ( user instanceof AuthUser ) ;
7070
71- assert . equal ( user . key , 'foo_app1_prod ' ) ;
71+ assert . equal ( user . key , 'foo_app1_test ' ) ;
7272 assert . equal ( user . provider , 'FOO' ) ;
7373 assert . equal ( user . app , 'foo_app1' ) ;
74- assert . equal ( user . limit , 5000 ) ;
75- assert . equal ( user . remaining , 5000 ) ;
74+ assert . equal ( user . limit , 499 ) ;
75+ assert . equal ( user . remaining , 499 ) ;
7676
7777 const expire = Math . floor ( new Date ( ) . getTime ( ) / 1000 ) ;
7878 assert ( user . reset > expire ) ;
@@ -85,16 +85,16 @@ describe('auth', () => {
8585 } ) ;
8686
8787 it ( 'saves valid token to redis chache' , done => {
88- auth . getUserByToken ( redis , mongo . users , 'prod' , 'foo_app1_prod ')
88+ auth . getUserByToken ( 'foo_app1_test ')
8989 . then ( ( ) => process . nextTick ( ( ) => {
90- redis . hgetall ( 'api:token:foo_app1_prod ' , ( err , data ) => {
90+ redis . hgetall ( 'api:token:foo_app1_test ' , ( err , data ) => {
9191 assert . ifError ( err ) ;
9292 assert . deepEqual ( data , {
9393 access : 'true' ,
9494 app : 'foo_app1' ,
95- limit : '5000 ' ,
95+ limit : '499 ' ,
9696 provider : 'FOO' ,
97- remaining : '5000 ' ,
97+ remaining : '499 ' ,
9898 reset : data . reset ,
9999 } ) ;
100100
@@ -108,9 +108,9 @@ describe('auth', () => {
108108 } ) ;
109109
110110 it ( 'caches valid token for 1 hour' , done => {
111- auth . getUserByToken ( redis , mongo . users , 'prod' , 'foo_app1_prod ')
111+ auth . getUserByToken ( 'foo_app1_test ')
112112 . then ( ( ) => process . nextTick ( ( ) => {
113- redis . ttl ( 'api:token:foo_app1_prod ' , ( err , ttl ) => {
113+ redis . ttl ( 'api:token:foo_app1_test ' , ( err , ttl ) => {
114114 assert . ifError ( err ) ;
115115 assert ( ttl >= 3590 && ttl <= 3610 ) ; // 24h ± 10s
116116 done ( ) ;
@@ -176,7 +176,7 @@ describe('auth', () => {
176176
177177 it ( 'looks up user by Authorization header' , done => {
178178 req . headers . authorization = 'Token abc123' ;
179- auth . getUserByToken = ( r , m , env , token ) => {
179+ auth . getUserByToken = ( token ) => {
180180 assert . equal ( token , 'abc123' ) ;
181181 done ( ) ;
182182
@@ -188,7 +188,7 @@ describe('auth', () => {
188188
189189 it ( 'looks up user by URL query parameter' , done => {
190190 req . query . api_key = 'abc123' ;
191- auth . getUserByToken = ( r , m , env , token ) => {
191+ auth . getUserByToken = ( token ) => {
192192 assert . equal ( token , 'abc123' ) ;
193193 done ( ) ;
194194
@@ -200,7 +200,7 @@ describe('auth', () => {
200200
201201 it ( 'looks up user by remote IP' , done => {
202202 req . connection . remoteAddres = '123.456.789' ;
203- auth . getUserByIp = ( r , m , env , token ) => {
203+ auth . getUserByIp = ( token ) => {
204204 assert . equal ( token , '123.456.789' ) ;
205205 done ( ) ;
206206
@@ -214,7 +214,7 @@ describe('auth', () => {
214214 req . connection . remoteAddres = '127.0.0.1' ;
215215 req . headers [ 'x-forwarded-for' ] = '123.456.789' ;
216216
217- auth . getUserByIp = ( r , m , env , token ) => {
217+ auth . getUserByIp = ( token ) => {
218218 assert . equal ( token , '123.456.789' ) ;
219219 done ( ) ;
220220
@@ -226,7 +226,7 @@ describe('auth', () => {
226226
227227 it ( 'sets X-RateLimit headers for valid user' , done => {
228228 req . connection . remoteAddres = '127.0.0.1' ;
229- auth . getUserByIp = ( r , m , env , token ) => Promise . resolve (
229+ auth . getUserByIp = ( token ) => Promise . resolve (
230230 new UnauthUser ( token , {
231231 limit : 100 ,
232232 remaining : 49 ,
0 commit comments