test: tighten device bootstrap assertions

This commit is contained in:
Peter Steinberger
2026-05-11 09:25:49 +01:00
parent 413197238b
commit 0dbdbc1372

View File

@@ -67,14 +67,12 @@ describe("device bootstrap tokens", () => {
profile: { roles: string[]; scopes: string[] };
}
>;
expect(parsed[issued.token]).toMatchObject({
token: issued.token,
ts: Date.now(),
issuedAtMs: Date.now(),
profile: {
roles: ["node", "operator"],
scopes: ["operator.approvals", "operator.read", "operator.talk.secrets", "operator.write"],
},
expect(parsed[issued.token]?.token).toBe(issued.token);
expect(parsed[issued.token]?.ts).toBe(Date.now());
expect(parsed[issued.token]?.issuedAtMs).toBe(Date.now());
expect(parsed[issued.token]?.profile).toEqual({
roles: ["node", "operator"],
scopes: ["operator.approvals", "operator.read", "operator.talk.secrets", "operator.write"],
});
});
@@ -94,11 +92,9 @@ describe("device bootstrap tokens", () => {
publicKey?: string;
}
>;
expect(parsed[issued.token]).toMatchObject({
token: issued.token,
deviceId: "device-123",
publicKey: "public-key-123",
});
expect(parsed[issued.token]?.token).toBe(issued.token);
expect(parsed[issued.token]?.deviceId).toBe("device-123");
expect(parsed[issued.token]?.publicKey).toBe("public-key-123");
});
it("loads the issued bootstrap profile for a valid token", async () => {
@@ -190,11 +186,8 @@ describe("device bootstrap tokens", () => {
const first = await issueDeviceBootstrapToken({ baseDir });
const second = await issueDeviceBootstrapToken({ baseDir });
await expect(
revokeDeviceBootstrapToken({ baseDir, token: first.token }),
).resolves.toMatchObject({
removed: true,
});
const revoked = await revokeDeviceBootstrapToken({ baseDir, token: first.token });
expect(revoked.removed).toBe(true);
await expect(verifyBootstrapToken(baseDir, first.token)).resolves.toEqual({
ok: false,
@@ -241,11 +234,9 @@ describe("device bootstrap tokens", () => {
string,
{ token: string; deviceId?: string; publicKey?: string }
>;
expect(parsed["legacy-key"]).toMatchObject({
token: issued.token,
deviceId: "device-123",
publicKey: "public-key-123",
});
expect(parsed["legacy-key"]?.token).toBe(issued.token);
expect(parsed["legacy-key"]?.deviceId).toBe("device-123");
expect(parsed["legacy-key"]?.publicKey).toBe("public-key-123");
});
it("keeps the token when required verification fields are blank", async () => {