Skip to content

Commit

Permalink
Merge pull request #3 from lushc/patch/update-jsonwebtoken-deps
Browse files Browse the repository at this point in the history
Update node-jsonwebtoken deps to fix a critical vulnerability
  • Loading branch information
pbuyle committed Apr 1, 2015
2 parents 112fdeb + b147120 commit b55a641
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@
"url": "http://www.opensource.org/licenses/MIT"
},
"dependencies": {
"jsonwebtoken": "^1.2.0",
"jsonwebtoken": "^4.2.2",
"passport-http-bearer": "^1.0.1"
},
"devDependencies": {
Expand Down
4 changes: 2 additions & 2 deletions test/strategy.normal.js
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ describe('Strategy', function() {
chai.passport.use(new Strategy(secret, {audience: 'foo'}, function(token, done) { done(null, false)}))
.fail(function(challenge) {;
expect(challenge).to.be.a.string;
expect(challenge).to.equal('Bearer realm="Users", error="invalid_token", error_description="Invalid token (jwt audience invalid. expected: bar)"');
expect(challenge).to.equal('Bearer realm="Users", error="invalid_token", error_description="Invalid token (jwt audience invalid. expected: foo)"');
done();
})
.req(function(req) {
Expand All @@ -172,7 +172,7 @@ describe('Strategy', function() {
chai.passport.use(new Strategy(secret, {issuer: 'foo'}, function(token, done) { done(null, false)}))
.fail(function(challenge) {;
expect(challenge).to.be.a.string;
expect(challenge).to.equal('Bearer realm="Users", error="invalid_token", error_description="Invalid token (jwt issuer invalid. expected: bar)"');
expect(challenge).to.equal('Bearer realm="Users", error="invalid_token", error_description="Invalid token (jwt issuer invalid. expected: foo)"');
done();
})
.req(function(req) {
Expand Down

0 comments on commit b55a641

Please sign in to comment.