mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-29 10:26:29 +02:00
oidc: add more unit tests (#5174)
Add tests for all of the oidc.Provider methods not currently covered. Remove the GetSubject() method as it appears to be unused.
This commit is contained in:
parent
9fe646f25a
commit
14c0c5abd0
2 changed files with 460 additions and 18 deletions
|
@ -5,7 +5,6 @@ package oidc
|
|||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
"net/http"
|
||||
|
@ -254,23 +253,6 @@ func (p *Provider) Revoke(ctx context.Context, t *oauth2.Token) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
// GetSubject gets the RFC 7519 Subject claim (`sub`) from a
|
||||
func (p *Provider) GetSubject(v any) (string, error) {
|
||||
b, err := json.Marshal(v)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
var s struct {
|
||||
Subject string `json:"sub"`
|
||||
}
|
||||
|
||||
err = json.Unmarshal(b, &s)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
return s.Subject, nil
|
||||
}
|
||||
|
||||
// Name returns the provider name.
|
||||
func (p *Provider) Name() string {
|
||||
return Name
|
||||
|
|
|
@ -2,6 +2,8 @@ package oidc
|
|||
|
||||
import (
|
||||
"context"
|
||||
"crypto/rand"
|
||||
"crypto/rsa"
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
|
@ -9,6 +11,9 @@ import (
|
|||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/go-jose/go-jose/v3"
|
||||
"github.com/go-jose/go-jose/v3/jwt"
|
||||
"github.com/google/uuid"
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
"golang.org/x/oauth2"
|
||||
|
@ -16,6 +21,390 @@ import (
|
|||
"github.com/pomerium/pomerium/pkg/identity/oauth"
|
||||
)
|
||||
|
||||
// Claims implements identity.State. (We can't use identity.Claims directly
|
||||
// because it would cause an import cycle.)
|
||||
type Claims map[string]any
|
||||
|
||||
func (c *Claims) SetRawIDToken(idToken string) {
|
||||
if *c == nil {
|
||||
*c = make(map[string]any)
|
||||
}
|
||||
(*c)["RawIDToken"] = idToken
|
||||
}
|
||||
|
||||
func TestSignIn(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
redirectURL, _ := url.Parse("https://localhost/oauth2/callback")
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
"authorization_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/login",
|
||||
}).String(),
|
||||
})
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
AuthCodeOptions: map[string]string{
|
||||
"custom_1": "foo",
|
||||
"custom_2": "bar",
|
||||
},
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
rec := httptest.NewRecorder()
|
||||
err = p.SignIn(rec, httptest.NewRequest(http.MethodGet, "/", nil), "STATE")
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, http.StatusFound, rec.Result().StatusCode)
|
||||
location, _ := url.Parse(rec.Result().Header.Get("Location"))
|
||||
assert.Equal(t, srv.URL, "http://"+location.Host)
|
||||
assert.Equal(t, "/login", location.Path)
|
||||
assert.Equal(t, url.Values{
|
||||
"client_id": {"CLIENT_ID"},
|
||||
"custom_1": {"foo"},
|
||||
"custom_2": {"bar"},
|
||||
"redirect_uri": {"https://localhost/oauth2/callback"},
|
||||
"response_type": {"code"},
|
||||
"scope": {"openid profile email offline_access"},
|
||||
"state": {"STATE"},
|
||||
}, location.Query())
|
||||
}
|
||||
|
||||
func TestSignOut(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
redirectURL, _ := url.Parse("https://localhost/oauth2/callback")
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
"end_session_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/logout",
|
||||
}).String(),
|
||||
"frontchannel_logout_supported": true,
|
||||
})
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
rec := httptest.NewRecorder()
|
||||
r := httptest.NewRequest(http.MethodGet, "/", nil)
|
||||
err = p.SignOut(rec, r, "ID_TOKEN", "", "https://localhost/redirect")
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, http.StatusFound, rec.Result().StatusCode)
|
||||
location, _ := url.Parse(rec.Result().Header.Get("Location"))
|
||||
assert.Equal(t, srv.URL, "http://"+location.Host)
|
||||
assert.Equal(t, "/logout", location.Path)
|
||||
assert.Equal(t, url.Values{
|
||||
"client_id": {"CLIENT_ID"},
|
||||
"id_token_hint": {"ID_TOKEN"},
|
||||
"post_logout_redirect_uri": {"https://localhost/redirect"},
|
||||
}, location.Query())
|
||||
}
|
||||
|
||||
func TestAuthenticate(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
redirectURL, _ := url.Parse("https://localhost/oauth2/callback")
|
||||
|
||||
jwtSigner, jwks := setupJWTSigning(t)
|
||||
iat := time.Now()
|
||||
exp := iat.Add(time.Hour)
|
||||
jti := uuid.NewString()
|
||||
|
||||
var expectedIDToken string
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
"jwks_uri": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/jwks",
|
||||
}).String(),
|
||||
"token_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/token",
|
||||
}).String(),
|
||||
"userinfo_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/userinfo",
|
||||
}).String(),
|
||||
})
|
||||
case "/jwks":
|
||||
json.NewEncoder(w).Encode(jwks)
|
||||
case "/token":
|
||||
username, password, _ := r.BasicAuth()
|
||||
assert.Equal(t, "CLIENT_ID", username)
|
||||
assert.Equal(t, "CLIENT_SECRET", password)
|
||||
assert.Equal(t, "authorization_code", r.FormValue("grant_type"))
|
||||
assert.Equal(t, "CODE", r.FormValue("code"))
|
||||
assert.Equal(t, redirectURL.String(), r.FormValue("redirect_uri"))
|
||||
|
||||
idToken, err := jwt.Signed(jwtSigner).Claims(jwt.Claims{
|
||||
Issuer: srv.URL,
|
||||
Subject: "USER_ID",
|
||||
Audience: jwt.Audience{"CLIENT_ID"},
|
||||
Expiry: jwt.NewNumericDate(exp),
|
||||
NotBefore: jwt.NewNumericDate(iat),
|
||||
IssuedAt: jwt.NewNumericDate(iat),
|
||||
ID: jti,
|
||||
}).CompactSerialize()
|
||||
require.NoError(t, err)
|
||||
expectedIDToken = idToken
|
||||
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"access_token": "ACCESS_TOKEN",
|
||||
"token_type": "Bearer",
|
||||
"refresh_token": "REFRESH_TOKEN",
|
||||
"expires_in": 3600,
|
||||
"id_token": idToken,
|
||||
})
|
||||
case "/userinfo":
|
||||
assert.Equal(t, "Bearer ACCESS_TOKEN", r.Header.Get("Authorization"))
|
||||
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"sub": "USER_ID",
|
||||
"name": "John Doe",
|
||||
"email": "john.doe@example.com",
|
||||
})
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
var claims Claims
|
||||
oauthToken, err := p.Authenticate(ctx, "CODE", &claims)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, "ACCESS_TOKEN", oauthToken.AccessToken)
|
||||
assert.Equal(t, "REFRESH_TOKEN", oauthToken.RefreshToken)
|
||||
assert.Equal(t, "Bearer", oauthToken.TokenType)
|
||||
assert.Equal(t, Claims{
|
||||
"iss": srv.URL,
|
||||
"sub": "USER_ID",
|
||||
"aud": "CLIENT_ID",
|
||||
"exp": float64(exp.Unix()),
|
||||
"nbf": float64(iat.Unix()),
|
||||
"iat": float64(iat.Unix()),
|
||||
"jti": jti,
|
||||
"name": "John Doe",
|
||||
"email": "john.doe@example.com",
|
||||
"RawIDToken": expectedIDToken,
|
||||
}, claims)
|
||||
}
|
||||
|
||||
func TestRefresh_WithIDToken(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
redirectURL, _ := url.Parse("https://localhost/oauth2/callback")
|
||||
|
||||
jwtSigner, jwks := setupJWTSigning(t)
|
||||
iat := time.Now()
|
||||
exp := iat.Add(time.Hour)
|
||||
jti := uuid.NewString()
|
||||
|
||||
var expectedIDToken string
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
"jwks_uri": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/jwks",
|
||||
}).String(),
|
||||
"token_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/token",
|
||||
}).String(),
|
||||
})
|
||||
case "/jwks":
|
||||
json.NewEncoder(w).Encode(jwks)
|
||||
case "/token":
|
||||
username, password, _ := r.BasicAuth()
|
||||
assert.Equal(t, "CLIENT_ID", username)
|
||||
assert.Equal(t, "CLIENT_SECRET", password)
|
||||
assert.Equal(t, "refresh_token", r.FormValue("grant_type"))
|
||||
assert.Equal(t, "EXISTING_REFRESH_TOKEN", r.FormValue("refresh_token"))
|
||||
|
||||
idToken, err := jwt.Signed(jwtSigner).Claims(jwt.Claims{
|
||||
Issuer: srv.URL,
|
||||
Subject: "USER_ID",
|
||||
Audience: jwt.Audience{"CLIENT_ID"},
|
||||
Expiry: jwt.NewNumericDate(exp),
|
||||
NotBefore: jwt.NewNumericDate(iat),
|
||||
IssuedAt: jwt.NewNumericDate(iat),
|
||||
ID: jti,
|
||||
}).CompactSerialize()
|
||||
require.NoError(t, err)
|
||||
expectedIDToken = idToken
|
||||
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"access_token": "ACCESS_TOKEN",
|
||||
"token_type": "Bearer",
|
||||
"refresh_token": "NEW_REFRESH_TOKEN", // some providers do rotate refresh tokens
|
||||
"expires_in": 3600,
|
||||
"id_token": idToken,
|
||||
})
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
var claims Claims
|
||||
existingToken := &oauth2.Token{
|
||||
RefreshToken: "EXISTING_REFRESH_TOKEN",
|
||||
}
|
||||
newToken, err := p.Refresh(ctx, existingToken, &claims)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, "ACCESS_TOKEN", newToken.AccessToken)
|
||||
assert.Equal(t, "NEW_REFRESH_TOKEN", newToken.RefreshToken)
|
||||
assert.Equal(t, "Bearer", newToken.TokenType)
|
||||
assert.Equal(t, Claims{
|
||||
"iss": srv.URL,
|
||||
"sub": "USER_ID",
|
||||
"aud": "CLIENT_ID",
|
||||
"exp": float64(exp.Unix()),
|
||||
"nbf": float64(iat.Unix()),
|
||||
"iat": float64(iat.Unix()),
|
||||
"jti": jti,
|
||||
"RawIDToken": expectedIDToken,
|
||||
}, claims)
|
||||
}
|
||||
|
||||
func TestRefresh_WithoutIDToken(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
redirectURL, _ := url.Parse("https://localhost/oauth2/callback")
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
"token_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/token",
|
||||
}).String(),
|
||||
})
|
||||
|
||||
case "/token":
|
||||
username, password, _ := r.BasicAuth()
|
||||
assert.Equal(t, "CLIENT_ID", username)
|
||||
assert.Equal(t, "CLIENT_SECRET", password)
|
||||
assert.Equal(t, "refresh_token", r.FormValue("grant_type"))
|
||||
assert.Equal(t, "EXISTING_REFRESH_TOKEN", r.FormValue("refresh_token"))
|
||||
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"access_token": "ACCESS_TOKEN",
|
||||
"token_type": "Bearer",
|
||||
"refresh_token": "NEW_REFRESH_TOKEN",
|
||||
"expires_in": 3600,
|
||||
})
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
var claims Claims
|
||||
existingToken := &oauth2.Token{
|
||||
RefreshToken: "EXISTING_REFRESH_TOKEN",
|
||||
}
|
||||
newToken, err := p.Refresh(ctx, existingToken, &claims)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, "ACCESS_TOKEN", newToken.AccessToken)
|
||||
assert.Equal(t, "NEW_REFRESH_TOKEN", newToken.RefreshToken)
|
||||
assert.Equal(t, "Bearer", newToken.TokenType)
|
||||
assert.Empty(t, claims)
|
||||
}
|
||||
|
||||
func TestRevoke(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
@ -62,4 +451,75 @@ func TestRevoke(t *testing.T) {
|
|||
assert.NoError(t, p.Revoke(ctx, &oauth2.Token{
|
||||
AccessToken: "ACCESS_TOKEN",
|
||||
}))
|
||||
|
||||
assert.Equal(t, ErrMissingAccessToken, p.Revoke(ctx, nil))
|
||||
}
|
||||
|
||||
func TestUnsupportedFeatures(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
redirectURL, _ := url.Parse("https://localhost/oauth2/callback")
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
})
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
rec := httptest.NewRecorder()
|
||||
err = p.SignOut(rec, httptest.NewRequest(http.MethodGet, "/", nil), "ID_TOKEN", "", "")
|
||||
assert.Equal(t, ErrSignoutNotImplemented, err)
|
||||
|
||||
err = p.Revoke(ctx, &oauth2.Token{
|
||||
AccessToken: "ACCESS_TOKEN",
|
||||
})
|
||||
assert.Equal(t, ErrRevokeNotImplemented, err)
|
||||
|
||||
_, err = New(ctx, &oauth.Options{})
|
||||
assert.Equal(t, ErrMissingProviderURL, err)
|
||||
}
|
||||
|
||||
func TestName(t *testing.T) {
|
||||
assert.Equal(t, "oidc", (*Provider)(nil).Name())
|
||||
}
|
||||
|
||||
// setupJWTSigning returns a JWT signer and a corresponding JWKS for signature verification.
|
||||
func setupJWTSigning(t *testing.T) (jose.Signer, jose.JSONWebKeySet) {
|
||||
t.Helper()
|
||||
|
||||
privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
|
||||
require.NoError(t, err)
|
||||
jwtSigner, err := jose.NewSigner(jose.SigningKey{Algorithm: jose.RS256, Key: privateKey}, nil)
|
||||
require.NoError(t, err)
|
||||
jwks := jose.JSONWebKeySet{
|
||||
Keys: []jose.JSONWebKey{{
|
||||
Key: privateKey.Public(),
|
||||
KeyID: "key",
|
||||
Algorithm: "RS256",
|
||||
Use: "sig",
|
||||
}},
|
||||
}
|
||||
return jwtSigner, jwks
|
||||
}
|
||||
|
|
Loading…
Add table
Reference in a new issue