|
1 | 1 | require 'active_support/time' |
2 | 2 | require 'spec_helper' |
| 3 | +require 'jwt' |
3 | 4 |
|
4 | 5 | describe IntercomRails::ScriptTag do |
5 | 6 | ScriptTag = IntercomRails::ScriptTag |
@@ -301,4 +302,97 @@ def user |
301 | 302 | end |
302 | 303 | end |
303 | 304 |
|
| 305 | + context 'JWT authentication' do |
| 306 | + before(:each) do |
| 307 | + IntercomRails.config.app_id = 'jwt_test' |
| 308 | + IntercomRails.config.api_secret = 'super-secret' |
| 309 | + end |
| 310 | + |
| 311 | + it 'does not include JWT when jwt_enabled is false' do |
| 312 | + script_tag = ScriptTag.new( |
| 313 | + user_details: { user_id: '1234' }, |
| 314 | + jwt_enabled: false |
| 315 | + ) |
| 316 | + expect(script_tag.intercom_settings[:intercom_user_jwt]).to be_nil |
| 317 | + end |
| 318 | + |
| 319 | + it 'includes JWT when jwt_enabled is true' do |
| 320 | + script_tag = ScriptTag.new( |
| 321 | + user_details: { user_id: '1234' }, |
| 322 | + jwt_enabled: true |
| 323 | + ) |
| 324 | + expect(script_tag.intercom_settings[:intercom_user_jwt]).to be_present |
| 325 | + end |
| 326 | + |
| 327 | + it 'does not include user_hash when JWT is enabled' do |
| 328 | + script_tag = ScriptTag.new( |
| 329 | + user_details: { user_id: '1234' }, |
| 330 | + jwt_enabled: true |
| 331 | + ) |
| 332 | + expect(script_tag.intercom_settings[:user_hash]).to be_nil |
| 333 | + end |
| 334 | + |
| 335 | + it 'generates a valid JWT with correct payload' do |
| 336 | + user_id = '1234' |
| 337 | + script_tag = ScriptTag.new( |
| 338 | + user_details: { user_id: user_id }, |
| 339 | + jwt_enabled: true |
| 340 | + ) |
| 341 | + |
| 342 | + jwt = script_tag.intercom_settings[:intercom_user_jwt] |
| 343 | + decoded_payload = JWT.decode(jwt, 'super-secret', true, { algorithm: 'HS256' })[0] |
| 344 | + |
| 345 | + expect(decoded_payload['user_id']).to eq(user_id) |
| 346 | + expect(decoded_payload['exp']).to be_within(5).of(24.hours.from_now.to_i) |
| 347 | + end |
| 348 | + |
| 349 | + it 'does not generate JWT when user_id is missing' do |
| 350 | + script_tag = ScriptTag.new( |
| 351 | + user_details: { email: '[email protected]' }, |
| 352 | + jwt_enabled: true |
| 353 | + ) |
| 354 | + expect(script_tag.intercom_settings[:intercom_user_jwt]).to be_nil |
| 355 | + end |
| 356 | + |
| 357 | + it 'does not generate JWT when api_secret is missing' do |
| 358 | + IntercomRails.config.api_secret = nil |
| 359 | + script_tag = ScriptTag.new( |
| 360 | + user_details: { user_id: '1234' }, |
| 361 | + jwt_enabled: true |
| 362 | + ) |
| 363 | + expect(script_tag.intercom_settings[:intercom_user_jwt]).to be_nil |
| 364 | + end |
| 365 | + |
| 366 | + it 'removes user_id from payload when using JWT' do |
| 367 | + script_tag = ScriptTag.new( |
| 368 | + user_details: { |
| 369 | + user_id: '1234', |
| 370 | + |
| 371 | + name: 'Test User' |
| 372 | + }, |
| 373 | + jwt_enabled: true |
| 374 | + ) |
| 375 | + |
| 376 | + expect(script_tag.intercom_settings[:intercom_user_jwt]).to be_present |
| 377 | + expect(script_tag.intercom_settings[:user_id]).to be_nil |
| 378 | + expect(script_tag.intercom_settings[:email]).to eq('[email protected]') |
| 379 | + expect(script_tag.intercom_settings[:name]).to eq('Test User') |
| 380 | + end |
| 381 | + |
| 382 | + it 'keeps user_id in payload when not using JWT' do |
| 383 | + script_tag = ScriptTag.new( |
| 384 | + user_details: { |
| 385 | + user_id: '1234', |
| 386 | + |
| 387 | + name: 'Test User' |
| 388 | + }, |
| 389 | + jwt_enabled: false |
| 390 | + ) |
| 391 | + |
| 392 | + expect(script_tag.intercom_settings[:user_id]).to eq('1234') |
| 393 | + expect(script_tag.intercom_settings[:email]).to eq('[email protected]') |
| 394 | + expect(script_tag.intercom_settings[:name]).to eq('Test User') |
| 395 | + end |
| 396 | + end |
| 397 | + |
304 | 398 | end |
0 commit comments