feat: implement mcpd core server framework with Fastify
Add Fastify server with config validation (Zod), health/healthz endpoints, auth middleware (Bearer token + session lookup), security plugins (CORS, Helmet, rate limiting), error handler, audit logging, and graceful shutdown. 36 tests passing. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
101
src/mcpd/tests/auth.test.ts
Normal file
101
src/mcpd/tests/auth.test.ts
Normal file
@@ -0,0 +1,101 @@
|
||||
import { describe, it, expect, vi, afterEach } from 'vitest';
|
||||
import Fastify from 'fastify';
|
||||
import type { FastifyInstance } from 'fastify';
|
||||
import { createAuthMiddleware } from '../src/middleware/auth.js';
|
||||
|
||||
let app: FastifyInstance;
|
||||
|
||||
afterEach(async () => {
|
||||
if (app) await app.close();
|
||||
});
|
||||
|
||||
function setupApp(findSession: (token: string) => Promise<{ userId: string; expiresAt: Date } | null>) {
|
||||
app = Fastify({ logger: false });
|
||||
const authMiddleware = createAuthMiddleware({ findSession });
|
||||
|
||||
app.addHook('preHandler', authMiddleware);
|
||||
app.get('/protected', async (request) => {
|
||||
return { userId: request.userId };
|
||||
});
|
||||
|
||||
return app.ready();
|
||||
}
|
||||
|
||||
describe('auth middleware', () => {
|
||||
it('returns 401 when no Authorization header', async () => {
|
||||
await setupApp(async () => null);
|
||||
const res = await app.inject({ method: 'GET', url: '/protected' });
|
||||
expect(res.statusCode).toBe(401);
|
||||
expect(res.json<{ error: string }>().error).toContain('Authorization');
|
||||
});
|
||||
|
||||
it('returns 401 when header is not Bearer', async () => {
|
||||
await setupApp(async () => null);
|
||||
const res = await app.inject({
|
||||
method: 'GET',
|
||||
url: '/protected',
|
||||
headers: { authorization: 'Basic abc123' },
|
||||
});
|
||||
expect(res.statusCode).toBe(401);
|
||||
});
|
||||
|
||||
it('returns 401 when token is empty', async () => {
|
||||
await setupApp(async () => null);
|
||||
const res = await app.inject({
|
||||
method: 'GET',
|
||||
url: '/protected',
|
||||
headers: { authorization: 'Bearer ' },
|
||||
});
|
||||
expect(res.statusCode).toBe(401);
|
||||
expect(res.json<{ error: string }>().error).toContain('Empty');
|
||||
});
|
||||
|
||||
it('returns 401 when token not found', async () => {
|
||||
await setupApp(async () => null);
|
||||
const res = await app.inject({
|
||||
method: 'GET',
|
||||
url: '/protected',
|
||||
headers: { authorization: 'Bearer invalid-token' },
|
||||
});
|
||||
expect(res.statusCode).toBe(401);
|
||||
expect(res.json<{ error: string }>().error).toContain('Invalid');
|
||||
});
|
||||
|
||||
it('returns 401 when token is expired', async () => {
|
||||
const pastDate = new Date(Date.now() - 86400_000);
|
||||
await setupApp(async () => ({ userId: 'user-1', expiresAt: pastDate }));
|
||||
const res = await app.inject({
|
||||
method: 'GET',
|
||||
url: '/protected',
|
||||
headers: { authorization: 'Bearer expired-token' },
|
||||
});
|
||||
expect(res.statusCode).toBe(401);
|
||||
expect(res.json<{ error: string }>().error).toContain('expired');
|
||||
});
|
||||
|
||||
it('passes valid token and sets userId', async () => {
|
||||
const futureDate = new Date(Date.now() + 86400_000);
|
||||
await setupApp(async () => ({ userId: 'user-42', expiresAt: futureDate }));
|
||||
const res = await app.inject({
|
||||
method: 'GET',
|
||||
url: '/protected',
|
||||
headers: { authorization: 'Bearer valid-token' },
|
||||
});
|
||||
expect(res.statusCode).toBe(200);
|
||||
expect(res.json<{ userId: string }>().userId).toBe('user-42');
|
||||
});
|
||||
|
||||
it('calls findSession with the token', async () => {
|
||||
const findSession = vi.fn(async () => ({
|
||||
userId: 'user-1',
|
||||
expiresAt: new Date(Date.now() + 86400_000),
|
||||
}));
|
||||
await setupApp(findSession);
|
||||
await app.inject({
|
||||
method: 'GET',
|
||||
url: '/protected',
|
||||
headers: { authorization: 'Bearer my-token' },
|
||||
});
|
||||
expect(findSession).toHaveBeenCalledWith('my-token');
|
||||
});
|
||||
});
|
||||
Reference in New Issue
Block a user