forked from mystiq/dex
221a1ad7a0
PasswordInfos are marshaled when storing them in the database as part of the local connector. However, the custom unmarsheler defined could not unmarshal the standard marshling of this struct. Add a struct tag to the Password field to correct this. Closes #332
247 lines
5.7 KiB
Go
247 lines
5.7 KiB
Go
package user
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/url"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/jonboulle/clockwork"
|
|
"github.com/kylelemons/godebug/pretty"
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
"github.com/coreos/go-oidc/jose"
|
|
"github.com/coreos/go-oidc/key"
|
|
)
|
|
|
|
func TestPasswordMarshaling(t *testing.T) {
|
|
hashPassword := func(s string) []byte {
|
|
data, err := DefaultPasswordHasher(s)
|
|
if err != nil {
|
|
t.Fatalf("Failed to hash password: %v", err)
|
|
}
|
|
return data
|
|
}
|
|
|
|
tests := []PasswordInfo{
|
|
{
|
|
UserID: "mrpink",
|
|
Password: hashPassword("mrpinks-password"),
|
|
},
|
|
{
|
|
UserID: "mrorange",
|
|
Password: hashPassword("mroranges-password"),
|
|
PasswordExpires: time.Now().Add(time.Hour),
|
|
},
|
|
}
|
|
for i, tt := range tests {
|
|
data, err := json.Marshal(tt)
|
|
if err != nil {
|
|
t.Errorf("case %d: failed to marshal password info: %v", i, err)
|
|
continue
|
|
}
|
|
var p PasswordInfo
|
|
if err := json.Unmarshal(data, &p); err != nil {
|
|
t.Errorf("case %d: failed to unmarshal password info: %v", i, err)
|
|
continue
|
|
}
|
|
if diff := pretty.Compare(tt, p); diff != "" {
|
|
t.Errorf("case %d: password info did not survive JSON marshal round trip: %s", i, diff)
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func TestNewPasswordFromHash(t *testing.T) {
|
|
tests := []string{
|
|
"test",
|
|
"1",
|
|
}
|
|
|
|
for i, plaintext := range tests {
|
|
p, err := NewPasswordFromPlaintext(plaintext)
|
|
if err != nil {
|
|
t.Errorf("case %d: unexpected error: %q", i, err)
|
|
continue
|
|
}
|
|
if err = bcrypt.CompareHashAndPassword([]byte(p), []byte(plaintext)); err != nil {
|
|
t.Errorf("case %d: err comparing hash and plaintext: %q", i, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNewPasswordReset(t *testing.T) {
|
|
clock = clockwork.NewFakeClock()
|
|
defer func() {
|
|
clock = clockwork.NewRealClock()
|
|
}()
|
|
|
|
now := clock.Now()
|
|
|
|
issuer, _ := url.Parse("http://example.com")
|
|
clientID := "myclient"
|
|
usr := User{ID: "123456", Email: "user@example.com"}
|
|
callback := "http://client.example.com/callback"
|
|
expires := time.Hour * 3
|
|
password := Password("passy")
|
|
|
|
tests := []struct {
|
|
user User
|
|
password Password
|
|
issuer url.URL
|
|
clientID string
|
|
callback string
|
|
expires time.Duration
|
|
want jose.Claims
|
|
}{
|
|
{
|
|
issuer: *issuer,
|
|
clientID: clientID,
|
|
user: usr,
|
|
callback: callback,
|
|
expires: expires,
|
|
password: password,
|
|
want: map[string]interface{}{
|
|
"iss": issuer.String(),
|
|
"aud": clientID,
|
|
ClaimPasswordResetCallback: callback,
|
|
ClaimPasswordResetPassword: string(password),
|
|
"exp": float64(now.Add(expires).Unix()),
|
|
"sub": usr.ID,
|
|
"iat": float64(now.Unix()),
|
|
},
|
|
},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
cbURL, err := url.Parse(tt.callback)
|
|
if err != nil {
|
|
t.Fatalf("case %d: non-nil err: %q", i, err)
|
|
}
|
|
ev := NewPasswordReset(tt.user.ID, tt.password, tt.issuer, tt.clientID, *cbURL, tt.expires)
|
|
|
|
if diff := pretty.Compare(tt.want, ev.Claims); diff != "" {
|
|
t.Errorf("case %d: Compare(want, got): %v", i, diff)
|
|
}
|
|
|
|
if diff := pretty.Compare(ev.Password(), password); diff != "" {
|
|
t.Errorf("case %d: Compare(want, got): %v", i, diff)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestPasswordResetParseAndVerify(t *testing.T) {
|
|
|
|
issuer, _ := url.Parse("http://example.com")
|
|
otherIssuer, _ := url.Parse("http://bad.example.com")
|
|
client := "myclient"
|
|
user := User{ID: "1234", Email: "user@example.com"}
|
|
callback, _ := url.Parse("http://client.example.com")
|
|
expires := time.Hour * 3
|
|
password := Password("passy")
|
|
userID := user.ID
|
|
|
|
goodPR := NewPasswordReset(userID, password, *issuer, client, *callback, expires)
|
|
goodPRNoCB := NewPasswordReset(userID, password, *issuer, client, url.URL{}, expires)
|
|
expiredPR := NewPasswordReset(userID, password, *issuer, client, *callback, -expires)
|
|
wrongIssuerPR := NewPasswordReset(userID, password, *otherIssuer, client, *callback, expires)
|
|
noSubPR := NewPasswordReset("", password, *issuer, client, *callback, expires)
|
|
noPWPR := NewPasswordReset(userID, Password(""), *issuer, client, *callback, expires)
|
|
noClientPR := NewPasswordReset(userID, password, *issuer, "", *callback, expires)
|
|
noClientNoCBPR := NewPasswordReset(userID, password, *issuer, "", url.URL{}, expires)
|
|
|
|
privKey, err := key.GeneratePrivateKey()
|
|
if err != nil {
|
|
t.Fatalf("Failed to generate private key, error=%v", err)
|
|
}
|
|
signer := privKey.Signer()
|
|
|
|
privKey2, err := key.GeneratePrivateKey()
|
|
if err != nil {
|
|
t.Fatalf("Failed to generate private key, error=%v", err)
|
|
}
|
|
otherSigner := privKey2.Signer()
|
|
|
|
tests := []struct {
|
|
ev PasswordReset
|
|
wantErr bool
|
|
signer jose.Signer
|
|
}{
|
|
|
|
{
|
|
ev: goodPR,
|
|
signer: signer,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
ev: goodPRNoCB,
|
|
signer: signer,
|
|
wantErr: false,
|
|
},
|
|
|
|
{
|
|
ev: expiredPR,
|
|
signer: signer,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
ev: wrongIssuerPR,
|
|
signer: signer,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
ev: goodPR,
|
|
signer: otherSigner,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
ev: noSubPR,
|
|
signer: signer,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
ev: noPWPR,
|
|
signer: signer,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
ev: noClientPR,
|
|
signer: signer,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
ev: noClientNoCBPR,
|
|
signer: signer,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
|
|
jwt, err := jose.NewSignedJWT(tt.ev.Claims, tt.signer)
|
|
if err != nil {
|
|
t.Fatalf("Failed to generate JWT, error=%v", err)
|
|
}
|
|
token := jwt.Encode()
|
|
|
|
ev, err := ParseAndVerifyPasswordResetToken(token, *issuer,
|
|
[]key.PublicKey{*key.NewPublicKey(privKey.JWK())})
|
|
|
|
if tt.wantErr {
|
|
t.Logf("err: %v", err)
|
|
if err == nil {
|
|
t.Errorf("case %d: want non-nil err, got nil", i)
|
|
}
|
|
continue
|
|
}
|
|
|
|
if err != nil {
|
|
t.Errorf("case %d: non-nil err: %q", i, err)
|
|
|
|
}
|
|
|
|
if diff := pretty.Compare(tt.ev.Claims, ev.Claims); diff != "" {
|
|
t.Errorf("case %d: Compare(want, got): %v", i, diff)
|
|
}
|
|
}
|
|
}
|