2016-07-26 01:30:28 +05:30
|
|
|
package server
|
2017-01-10 00:16:16 +05:30
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2019-06-20 22:45:59 +05:30
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
2017-01-28 01:12:46 +05:30
|
|
|
"net/http"
|
2017-01-10 00:16:16 +05:30
|
|
|
"net/http/httptest"
|
|
|
|
"net/url"
|
2017-01-28 01:12:46 +05:30
|
|
|
"strings"
|
2017-01-10 00:16:16 +05:30
|
|
|
"testing"
|
|
|
|
|
2019-07-22 21:17:11 +05:30
|
|
|
"gopkg.in/square/go-jose.v2"
|
2017-01-11 07:21:12 +05:30
|
|
|
|
2018-09-03 12:14:44 +05:30
|
|
|
"github.com/dexidp/dex/storage"
|
2019-06-20 22:45:59 +05:30
|
|
|
"github.com/dexidp/dex/storage/memory"
|
2017-01-10 00:16:16 +05:30
|
|
|
)
|
|
|
|
|
|
|
|
func TestParseAuthorizationRequest(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
clients []storage.Client
|
|
|
|
supportedResponseTypes []string
|
|
|
|
|
2017-01-28 01:12:46 +05:30
|
|
|
usePOST bool
|
|
|
|
|
2017-01-10 00:16:16 +05:30
|
|
|
queryParams map[string]string
|
|
|
|
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError error
|
2017-01-10 00:16:16 +05:30
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "normal request",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "foo",
|
|
|
|
RedirectURIs: []string{"https://example.com/foo"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "foo",
|
|
|
|
"redirect_uri": "https://example.com/foo",
|
|
|
|
"response_type": "code",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
2017-01-28 01:12:46 +05:30
|
|
|
{
|
|
|
|
name: "POST request",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "foo",
|
|
|
|
RedirectURIs: []string{"https://example.com/foo"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "foo",
|
|
|
|
"redirect_uri": "https://example.com/foo",
|
|
|
|
"response_type": "code",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
usePOST: true,
|
|
|
|
},
|
2017-01-10 00:16:16 +05:30
|
|
|
{
|
|
|
|
name: "invalid client id",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "foo",
|
|
|
|
RedirectURIs: []string{"https://example.com/foo"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/foo",
|
|
|
|
"response_type": "code",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &displayedAuthErr{Status: http.StatusNotFound},
|
2017-01-10 00:16:16 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid redirect uri",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/foo",
|
|
|
|
"response_type": "code",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &displayedAuthErr{Status: http.StatusBadRequest},
|
2017-01-10 00:16:16 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "implicit flow",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code", "id_token", "token"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code id_token",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "unsupported response type",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code id_token",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &redirectedAuthErr{Type: errUnsupportedResponseType},
|
2017-01-10 00:16:16 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "only token response type",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code", "id_token", "token"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "token",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &redirectedAuthErr{Type: errInvalidRequest},
|
2017-01-10 00:16:16 +05:30
|
|
|
},
|
2019-07-22 21:17:11 +05:30
|
|
|
{
|
|
|
|
name: "choose connector_id",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code", "id_token", "token"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"connector_id": "mock",
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code id_token",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "choose second connector_id",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code", "id_token", "token"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"connector_id": "mock2",
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code id_token",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "choose invalid connector_id",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code", "id_token", "token"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"connector_id": "bogus",
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code id_token",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &redirectedAuthErr{Type: errInvalidRequest},
|
2019-07-22 21:17:11 +05:30
|
|
|
},
|
PKCE implementation (#1784)
* Basic implementation of PKCE
Signed-off-by: Tadeusz Magura-Witkowski <tadeuszmw@gmail.com>
* @mfmarche on 24 Feb: when code_verifier is set, don't check client_secret
In PKCE flow, no client_secret is used, so the check for a valid client_secret
would always fail.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* @deric on 16 Jun: return invalid_grant when wrong code_verifier
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Enforce PKCE flow on /token when PKCE flow was started on /auth
Also dissallow PKCE on /token, when PKCE flow was not started on /auth
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* fixed error messages when mixed PKCE/no PKCE flow.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* server_test.go: Added PKCE error cases on /token endpoint
* Added test for invalid_grant, when wrong code_verifier is sent
* Added test for mixed PKCE / no PKCE auth flows.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* cleanup: extracted method checkErrorResponse and type TestDefinition
* fixed connector being overwritten
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* /token endpoint: skip client_secret verification only for grand type authorization_code with PKCE extension
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Allow "Authorization" header in CORS handlers
* Adds "Authorization" to the default CORS headers{"Accept", "Accept-Language", "Content-Language", "Origin"}
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Add "code_challenge_methods_supported" to discovery endpoint
discovery endpoint /dex/.well-known/openid-configuration
now has the following entry:
"code_challenge_methods_supported": [
"S256",
"plain"
]
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Updated tests (mixed-up comments), added a PKCE test
* @asoorm added test that checks if downgrade to "plain" on /token endpoint
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* remove redefinition of providedCodeVerifier, fixed spelling (#6)
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
Signed-off-by: Bernd Eckstein <HEllRZA@users.noreply.github.com>
* Rename struct CodeChallenge to PKCE
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* PKCE: Check clientSecret when available
In authorization_code flow with PKCE, allow empty client_secret on /auth and /token endpoints. But check the client_secret when it is given.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Enable PKCE with public: true
dex configuration public on staticClients now enables the following behavior in PKCE:
- Public: false, PKCE will always check client_secret. This means PKCE in it's natural form is disabled.
- Public: true, PKCE is enabled. It will only check client_secret if the client has sent one. But it allows the code flow if the client didn't sent one.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Redirect error on unsupported code_challenge_method
- Check for unsupported code_challenge_method after redirect uri is validated, and use newErr() to return the error.
- Add PKCE tests to oauth2_test.go
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Reverted go.mod and go.sum to the state of master
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Don't omit client secret check for PKCE
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Allow public clients (e.g. with PKCE) to have redirect URIs configured
Signed-off-by: Martin Heide <martin.heide@faro.com>
* Remove "Authorization" as Accepted Headers on CORS, small fixes
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Revert "Allow public clients (e.g. with PKCE) to have redirect URIs configured"
This reverts commit b6e297b78537dc44cd3e1374f0b4d34bf89404ac.
Signed-off-by: Martin Heide <martin.heide@faro.com>
* PKCE on client_secret client error message
* When connecting to the token endpoint with PKCE without client_secret, but the client is configured with a client_secret, generate a special error message.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Output info message when PKCE without client_secret used on confidential client
* removes the special error message
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* General missing/invalid client_secret message on token endpoint
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
Co-authored-by: Tadeusz Magura-Witkowski <tadeuszmw@gmail.com>
Co-authored-by: Martin Heide <martin.heide@faro.com>
Co-authored-by: M. Heide <66078329+heidemn-faro@users.noreply.github.com>
2020-10-26 16:03:40 +05:30
|
|
|
{
|
|
|
|
name: "PKCE code_challenge_method plain",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code",
|
|
|
|
"code_challenge": "123",
|
|
|
|
"code_challenge_method": "plain",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "PKCE code_challenge_method default plain",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code",
|
|
|
|
"code_challenge": "123",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "PKCE code_challenge_method S256",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code",
|
|
|
|
"code_challenge": "123",
|
|
|
|
"code_challenge_method": "S256",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "PKCE invalid code_challenge_method",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"response_type": "code",
|
|
|
|
"code_challenge": "123",
|
|
|
|
"code_challenge_method": "invalid_method",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &redirectedAuthErr{Type: errInvalidRequest},
|
PKCE implementation (#1784)
* Basic implementation of PKCE
Signed-off-by: Tadeusz Magura-Witkowski <tadeuszmw@gmail.com>
* @mfmarche on 24 Feb: when code_verifier is set, don't check client_secret
In PKCE flow, no client_secret is used, so the check for a valid client_secret
would always fail.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* @deric on 16 Jun: return invalid_grant when wrong code_verifier
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Enforce PKCE flow on /token when PKCE flow was started on /auth
Also dissallow PKCE on /token, when PKCE flow was not started on /auth
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* fixed error messages when mixed PKCE/no PKCE flow.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* server_test.go: Added PKCE error cases on /token endpoint
* Added test for invalid_grant, when wrong code_verifier is sent
* Added test for mixed PKCE / no PKCE auth flows.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* cleanup: extracted method checkErrorResponse and type TestDefinition
* fixed connector being overwritten
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* /token endpoint: skip client_secret verification only for grand type authorization_code with PKCE extension
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Allow "Authorization" header in CORS handlers
* Adds "Authorization" to the default CORS headers{"Accept", "Accept-Language", "Content-Language", "Origin"}
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Add "code_challenge_methods_supported" to discovery endpoint
discovery endpoint /dex/.well-known/openid-configuration
now has the following entry:
"code_challenge_methods_supported": [
"S256",
"plain"
]
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Updated tests (mixed-up comments), added a PKCE test
* @asoorm added test that checks if downgrade to "plain" on /token endpoint
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* remove redefinition of providedCodeVerifier, fixed spelling (#6)
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
Signed-off-by: Bernd Eckstein <HEllRZA@users.noreply.github.com>
* Rename struct CodeChallenge to PKCE
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* PKCE: Check clientSecret when available
In authorization_code flow with PKCE, allow empty client_secret on /auth and /token endpoints. But check the client_secret when it is given.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Enable PKCE with public: true
dex configuration public on staticClients now enables the following behavior in PKCE:
- Public: false, PKCE will always check client_secret. This means PKCE in it's natural form is disabled.
- Public: true, PKCE is enabled. It will only check client_secret if the client has sent one. But it allows the code flow if the client didn't sent one.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Redirect error on unsupported code_challenge_method
- Check for unsupported code_challenge_method after redirect uri is validated, and use newErr() to return the error.
- Add PKCE tests to oauth2_test.go
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Reverted go.mod and go.sum to the state of master
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Don't omit client secret check for PKCE
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Allow public clients (e.g. with PKCE) to have redirect URIs configured
Signed-off-by: Martin Heide <martin.heide@faro.com>
* Remove "Authorization" as Accepted Headers on CORS, small fixes
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Revert "Allow public clients (e.g. with PKCE) to have redirect URIs configured"
This reverts commit b6e297b78537dc44cd3e1374f0b4d34bf89404ac.
Signed-off-by: Martin Heide <martin.heide@faro.com>
* PKCE on client_secret client error message
* When connecting to the token endpoint with PKCE without client_secret, but the client is configured with a client_secret, generate a special error message.
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* Output info message when PKCE without client_secret used on confidential client
* removes the special error message
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
* General missing/invalid client_secret message on token endpoint
Signed-off-by: Bernd Eckstein <Bernd.Eckstein@faro.com>
Co-authored-by: Tadeusz Magura-Witkowski <tadeuszmw@gmail.com>
Co-authored-by: Martin Heide <martin.heide@faro.com>
Co-authored-by: M. Heide <66078329+heidemn-faro@users.noreply.github.com>
2020-10-26 16:03:40 +05:30
|
|
|
},
|
2021-01-18 16:10:41 +05:30
|
|
|
{
|
|
|
|
name: "No response type",
|
|
|
|
clients: []storage.Client{
|
|
|
|
{
|
|
|
|
ID: "bar",
|
|
|
|
RedirectURIs: []string{"https://example.com/bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
supportedResponseTypes: []string{"code"},
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"client_id": "bar",
|
|
|
|
"redirect_uri": "https://example.com/bar",
|
|
|
|
"code_challenge": "123",
|
|
|
|
"code_challenge_method": "plain",
|
|
|
|
"scope": "openid email profile",
|
|
|
|
},
|
2020-11-12 00:32:09 +05:30
|
|
|
expectedError: &redirectedAuthErr{Type: errInvalidRequest},
|
2021-01-18 16:10:41 +05:30
|
|
|
},
|
2017-01-10 00:16:16 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range tests {
|
|
|
|
func() {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
2019-07-22 21:17:11 +05:30
|
|
|
httpServer, server := newTestServerMultipleConnectors(ctx, t, func(c *Config) {
|
2017-01-10 00:16:16 +05:30
|
|
|
c.SupportedResponseTypes = tc.supportedResponseTypes
|
|
|
|
c.Storage = storage.WithStaticClients(c.Storage, tc.clients)
|
|
|
|
})
|
|
|
|
defer httpServer.Close()
|
|
|
|
|
|
|
|
params := url.Values{}
|
|
|
|
for k, v := range tc.queryParams {
|
|
|
|
params.Set(k, v)
|
|
|
|
}
|
2017-01-28 01:12:46 +05:30
|
|
|
var req *http.Request
|
|
|
|
if tc.usePOST {
|
|
|
|
body := strings.NewReader(params.Encode())
|
|
|
|
req = httptest.NewRequest("POST", httpServer.URL+"/auth", body)
|
|
|
|
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
|
|
|
} else {
|
|
|
|
req = httptest.NewRequest("GET", httpServer.URL+"/auth?"+params.Encode(), nil)
|
|
|
|
}
|
2021-01-18 16:10:41 +05:30
|
|
|
|
2017-01-10 00:16:16 +05:30
|
|
|
_, err := server.parseAuthorizationRequest(req)
|
2020-11-12 00:32:09 +05:30
|
|
|
if tc.expectedError == nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%s: expected no error", tc.name)
|
2021-01-18 16:10:41 +05:30
|
|
|
}
|
|
|
|
} else {
|
2020-11-12 00:32:09 +05:30
|
|
|
switch expectedErr := tc.expectedError.(type) {
|
|
|
|
case *redirectedAuthErr:
|
|
|
|
e, ok := err.(*redirectedAuthErr)
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("%s: expected redirectedAuthErr error", tc.name)
|
|
|
|
}
|
|
|
|
if e.Type != expectedErr.Type {
|
|
|
|
t.Errorf("%s: expected error type %v, got %v", tc.name, expectedErr.Type, e.Type)
|
|
|
|
}
|
|
|
|
if e.RedirectURI != tc.queryParams["redirect_uri"] {
|
|
|
|
t.Errorf("%s: expected error to be returned in redirect to %v", tc.name, tc.queryParams["redirect_uri"])
|
|
|
|
}
|
|
|
|
case *displayedAuthErr:
|
|
|
|
e, ok := err.(*displayedAuthErr)
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("%s: expected displayedAuthErr error", tc.name)
|
|
|
|
}
|
|
|
|
if e.Status != expectedErr.Status {
|
|
|
|
t.Errorf("%s: expected http status %v, got %v", tc.name, expectedErr.Status, e.Status)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
t.Fatalf("%s: unsupported error type", tc.name)
|
|
|
|
}
|
2017-01-10 00:16:16 +05:30
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
2017-01-11 07:21:12 +05:30
|
|
|
|
|
|
|
const (
|
|
|
|
// at_hash value and access_token returned by Google.
|
|
|
|
googleAccessTokenHash = "piwt8oCH-K2D9pXlaS1Y-w"
|
|
|
|
googleAccessToken = "ya29.CjHSA1l5WUn8xZ6HanHFzzdHdbXm-14rxnC7JHch9eFIsZkQEGoWzaYG4o7k5f6BnPLj"
|
|
|
|
googleSigningAlg = jose.RS256
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestAccessTokenHash(t *testing.T) {
|
|
|
|
atHash, err := accessTokenHash(googleSigningAlg, googleAccessToken)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if atHash != googleAccessTokenHash {
|
|
|
|
t.Errorf("expected %q got %q", googleAccessTokenHash, atHash)
|
|
|
|
}
|
|
|
|
}
|
2017-05-10 05:39:20 +05:30
|
|
|
|
|
|
|
func TestValidRedirectURI(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
client storage.Client
|
|
|
|
redirectURI string
|
|
|
|
wantValid bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://foo.com/bar",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://foo.com/bar/baz",
|
2020-10-05 23:49:33 +05:30
|
|
|
wantValid: false,
|
2017-05-10 05:39:20 +05:30
|
|
|
},
|
2020-11-02 19:11:56 +05:30
|
|
|
// These special desktop + device + localhost URIs are allowed by default.
|
2017-05-10 05:39:20 +05:30
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "urn:ietf:wg:oauth:2.0:oob",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
2020-11-02 19:11:56 +05:30
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "/device/callback",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
2017-05-10 05:39:20 +05:30
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost:8080/",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost:991/bar",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
2020-10-05 23:49:33 +05:30
|
|
|
// Both Public + RedirectURIs configured: Could e.g. be a PKCE-enabled web app.
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
2020-11-02 18:22:52 +05:30
|
|
|
Public: true,
|
2020-10-05 23:49:33 +05:30
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://foo.com/bar",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
2020-11-02 18:22:52 +05:30
|
|
|
Public: true,
|
2020-10-05 23:49:33 +05:30
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://foo.com/bar/baz",
|
|
|
|
wantValid: false,
|
|
|
|
},
|
2020-11-02 19:35:47 +05:30
|
|
|
// These special desktop + device + localhost URIs are not allowed implicitly when RedirectURIs is non-empty.
|
2020-11-02 19:11:56 +05:30
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "urn:ietf:wg:oauth:2.0:oob",
|
2020-11-02 19:35:47 +05:30
|
|
|
wantValid: false,
|
2020-11-02 19:11:56 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "/device/callback",
|
2020-11-02 19:35:47 +05:30
|
|
|
wantValid: false,
|
2020-11-02 19:11:56 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost:8080/",
|
2020-11-02 19:35:47 +05:30
|
|
|
wantValid: false,
|
2020-11-02 19:11:56 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost:991/bar",
|
2020-11-02 19:35:47 +05:30
|
|
|
wantValid: false,
|
2020-11-02 19:11:56 +05:30
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost",
|
2020-11-02 19:35:47 +05:30
|
|
|
wantValid: false,
|
|
|
|
},
|
|
|
|
// These special desktop + device + localhost URIs can still be specified explicitly.
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar", "urn:ietf:wg:oauth:2.0:oob"},
|
|
|
|
},
|
|
|
|
redirectURI: "urn:ietf:wg:oauth:2.0:oob",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar", "/device/callback"},
|
|
|
|
},
|
|
|
|
redirectURI: "/device/callback",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar", "http://localhost:8080/"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost:8080/",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar", "http://localhost:991/bar"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost:991/bar",
|
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
RedirectURIs: []string{"http://foo.com/bar", "http://localhost"},
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost",
|
2020-11-02 19:11:56 +05:30
|
|
|
wantValid: true,
|
|
|
|
},
|
|
|
|
// Non-localhost URIs are not allowed implicitly.
|
2020-10-05 23:49:33 +05:30
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "http://foo.com/bar",
|
|
|
|
wantValid: false,
|
|
|
|
},
|
2017-05-10 05:39:20 +05:30
|
|
|
{
|
|
|
|
client: storage.Client{
|
|
|
|
Public: true,
|
|
|
|
},
|
|
|
|
redirectURI: "http://localhost.localhost:8080/",
|
|
|
|
wantValid: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, test := range tests {
|
|
|
|
got := validateRedirectURI(test.client, test.redirectURI)
|
|
|
|
if got != test.wantValid {
|
|
|
|
t.Errorf("client=%#v, redirectURI=%q, wanted valid=%t, got=%t",
|
|
|
|
test.client, test.redirectURI, test.wantValid, got)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-06-20 22:45:59 +05:30
|
|
|
|
|
|
|
func TestStorageKeySet(t *testing.T) {
|
|
|
|
s := memory.New(logger)
|
|
|
|
if err := s.UpdateKeys(func(keys storage.Keys) (storage.Keys, error) {
|
|
|
|
keys.SigningKey = &jose.JSONWebKey{
|
|
|
|
Key: testKey,
|
|
|
|
KeyID: "testkey",
|
|
|
|
Algorithm: "RS256",
|
|
|
|
Use: "sig",
|
|
|
|
}
|
|
|
|
keys.SigningKeyPub = &jose.JSONWebKey{
|
|
|
|
Key: testKey.Public(),
|
|
|
|
KeyID: "testkey",
|
|
|
|
Algorithm: "RS256",
|
|
|
|
Use: "sig",
|
|
|
|
}
|
|
|
|
return keys, nil
|
|
|
|
}); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
tokenGenerator func() (jwt string, err error)
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "valid token",
|
|
|
|
tokenGenerator: func() (string, error) {
|
|
|
|
signer, err := jose.NewSigner(jose.SigningKey{Algorithm: jose.RS256, Key: testKey}, nil)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
jws, err := signer.Sign([]byte("payload"))
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return jws.CompactSerialize()
|
|
|
|
},
|
|
|
|
wantErr: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "token signed by different key",
|
|
|
|
tokenGenerator: func() (string, error) {
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
signer, err := jose.NewSigner(jose.SigningKey{Algorithm: jose.RS256, Key: key}, nil)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
jws, err := signer.Sign([]byte("payload"))
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return jws.CompactSerialize()
|
|
|
|
},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range tests {
|
|
|
|
tc := tc
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
jwt, err := tc.tokenGenerator()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
keySet := &storageKeySet{s}
|
|
|
|
|
|
|
|
_, err = keySet.VerifySignature(context.Background(), jwt)
|
|
|
|
if (err != nil && !tc.wantErr) || (err == nil && tc.wantErr) {
|
|
|
|
t.Fatalf("wantErr = %v, but got err = %v", tc.wantErr, err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|