2016-12-16 23:45:43 +01:00

63 lines
2.0 KiB
JavaScript

'use strict';
const path = require('path');
const expect = require('chai').expect;
const BbPromise = require('bluebird');
const AWS = require('aws-sdk');
const _ = require('lodash');
const fetch = require('node-fetch');
const Utils = require('../../../../../utils/index');
const CF = new AWS.CloudFormation({ region: 'us-east-1' });
BbPromise.promisifyAll(CF, { suffix: 'Promised' });
describe('AWS - API Gateway (Integration: Lambda Proxy): Custom authorizers test', () => {
let stackName;
let endpoint;
beforeAll(() => {
stackName = Utils.createTestService('aws-nodejs', path.join(__dirname, 'service'));
Utils.deployService();
});
it('should expose the endpoint(s) in the CloudFormation Outputs', () =>
CF.describeStacksPromised({ StackName: stackName })
.then((result) => _.find(result.Stacks[0].Outputs,
{ OutputKey: 'ServiceEndpoint' }).OutputValue)
.then((endpointOutput) => {
endpoint = endpointOutput.match(/https:\/\/.+\.execute-api\..+\.amazonaws\.com.+/)[0];
endpoint = `${endpoint}/hello`;
})
);
it('should reject requests without authorization', () =>
fetch(endpoint)
.then((response) => {
expect(response.status).to.equal(401);
})
);
it('should reject requests with wrong authorization', () =>
fetch(endpoint, { headers: { Authorization: 'Bearer ShouldNotBeAuthorized' } })
.then((response) => {
expect(response.status).to.equal(401);
})
);
it('should authorize requests with correct authorization', () =>
fetch(endpoint, { headers: { Authorization: 'Bearer ShouldBeAuthorized' } })
.then(response => response.json())
.then((json) => {
expect(json.message).to.equal('Successfully authorized!');
expect(json.event.requestContext.authorizer.principalId).to.equal('SomeRandomId');
expect(json.event.headers.Authorization).to.equal('Bearer ShouldBeAuthorized');
})
);
afterAll(() => {
Utils.removeService();
});
});