829 lines
24 KiB
Go
829 lines
24 KiB
Go
package server
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/coreos/go-oidc/jose"
|
|
"github.com/coreos/go-oidc/key"
|
|
"github.com/coreos/go-oidc/oauth2"
|
|
"github.com/coreos/go-oidc/oidc"
|
|
"github.com/kylelemons/godebug/pretty"
|
|
|
|
"github.com/coreos/dex/client"
|
|
"github.com/coreos/dex/db"
|
|
"github.com/coreos/dex/refresh/refreshtest"
|
|
"github.com/coreos/dex/scope"
|
|
"github.com/coreos/dex/session/manager"
|
|
"github.com/coreos/dex/user"
|
|
)
|
|
|
|
var validRedirURL = url.URL{
|
|
Scheme: "http",
|
|
Host: "client.example.com",
|
|
Path: "/callback",
|
|
}
|
|
|
|
type StaticKeyManager struct {
|
|
key.PrivateKeyManager
|
|
expiresAt time.Time
|
|
signer jose.Signer
|
|
keys []jose.JWK
|
|
}
|
|
|
|
func (m *StaticKeyManager) ExpiresAt() time.Time {
|
|
return m.expiresAt
|
|
}
|
|
|
|
func (m *StaticKeyManager) Signer() (jose.Signer, error) {
|
|
return m.signer, nil
|
|
}
|
|
|
|
func (m *StaticKeyManager) JWKs() ([]jose.JWK, error) {
|
|
return m.keys, nil
|
|
}
|
|
|
|
type StaticSigner struct {
|
|
sig []byte
|
|
err error
|
|
}
|
|
|
|
func (ss *StaticSigner) ID() string {
|
|
return "static"
|
|
}
|
|
|
|
func (ss *StaticSigner) Alg() string {
|
|
return "static"
|
|
}
|
|
|
|
func (ss *StaticSigner) Verify(sig, data []byte) error {
|
|
if !reflect.DeepEqual(ss.sig, sig) {
|
|
return errors.New("signature mismatch")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (ss *StaticSigner) Sign(data []byte) ([]byte, error) {
|
|
return ss.sig, ss.err
|
|
}
|
|
|
|
func (ss *StaticSigner) JWK() jose.JWK {
|
|
return jose.JWK{}
|
|
}
|
|
|
|
func staticGenerateCodeFunc(code string) manager.GenerateCodeFunc {
|
|
return func() (string, error) {
|
|
return code, nil
|
|
}
|
|
}
|
|
|
|
func makeNewUserRepo() (user.UserRepo, error) {
|
|
userRepo := db.NewUserRepo(db.NewMemDB())
|
|
|
|
id := "testid-1"
|
|
err := userRepo.Create(nil, user.User{
|
|
ID: id,
|
|
Email: "testname@example.com",
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = userRepo.AddRemoteIdentity(nil, id, user.RemoteIdentity{
|
|
ConnectorID: "test_connector_id",
|
|
ID: "YYY",
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return userRepo, nil
|
|
}
|
|
|
|
func TestServerProviderConfig(t *testing.T) {
|
|
srv := &Server{IssuerURL: url.URL{Scheme: "http", Host: "server.example.com"}}
|
|
|
|
want := oidc.ProviderConfig{
|
|
Issuer: &url.URL{Scheme: "http", Host: "server.example.com"},
|
|
AuthEndpoint: &url.URL{Scheme: "http", Host: "server.example.com", Path: "/auth"},
|
|
TokenEndpoint: &url.URL{Scheme: "http", Host: "server.example.com", Path: "/token"},
|
|
KeysEndpoint: &url.URL{Scheme: "http", Host: "server.example.com", Path: "/keys"},
|
|
|
|
GrantTypesSupported: []string{oauth2.GrantTypeAuthCode, oauth2.GrantTypeClientCreds},
|
|
ResponseTypesSupported: []string{"code"},
|
|
SubjectTypesSupported: []string{"public"},
|
|
IDTokenSigningAlgValues: []string{"RS256"},
|
|
TokenEndpointAuthMethodsSupported: []string{"client_secret_basic"},
|
|
}
|
|
got := srv.ProviderConfig()
|
|
|
|
if diff := pretty.Compare(want, got); diff != "" {
|
|
t.Fatalf("provider config did not match expected: %s", diff)
|
|
}
|
|
}
|
|
|
|
func TestServerNewSession(t *testing.T) {
|
|
sm := manager.NewSessionManager(db.NewSessionRepo(db.NewMemDB()), db.NewSessionKeyRepo(db.NewMemDB()))
|
|
srv := &Server{
|
|
SessionManager: sm,
|
|
}
|
|
|
|
state := "pants"
|
|
nonce := "oncenay"
|
|
ci := client.Client{
|
|
Credentials: oidc.ClientCredentials{
|
|
ID: testClientID,
|
|
Secret: clientTestSecret,
|
|
},
|
|
Metadata: oidc.ClientMetadata{
|
|
RedirectURIs: []url.URL{
|
|
url.URL{
|
|
Scheme: "http",
|
|
Host: "client.example.com",
|
|
Path: "/callback",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
key, err := srv.NewSession("bogus_idpc", ci.Credentials.ID, state, ci.Metadata.RedirectURIs[0], nonce, false, []string{"openid"})
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
sessionID, err := sm.ExchangeKey(key)
|
|
if err != nil {
|
|
t.Fatalf("Session not retreivable: %v", err)
|
|
}
|
|
|
|
ses, err := sm.AttachRemoteIdentity(sessionID, oidc.Identity{})
|
|
if err != nil {
|
|
t.Fatalf("Unable to add Identity to Session: %v", err)
|
|
}
|
|
|
|
if !reflect.DeepEqual(ci.Metadata.RedirectURIs[0], ses.RedirectURL) {
|
|
t.Fatalf("Session created with incorrect RedirectURL: want=%#v got=%#v", ci.Metadata.RedirectURIs[0], ses.RedirectURL)
|
|
}
|
|
|
|
if ci.Credentials.ID != ses.ClientID {
|
|
t.Fatalf("Session created with incorrect ClientID: want=%q got=%q", ci.Credentials.ID, ses.ClientID)
|
|
}
|
|
|
|
if state != ses.ClientState {
|
|
t.Fatalf("Session created with incorrect State: want=%q got=%q", state, ses.ClientState)
|
|
}
|
|
|
|
if nonce != ses.Nonce {
|
|
t.Fatalf("Session created with incorrect Nonce: want=%q got=%q", nonce, ses.Nonce)
|
|
}
|
|
}
|
|
|
|
func TestServerLogin(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
testCase string
|
|
connectorID string
|
|
clientID string
|
|
userID string
|
|
remoteUserID string
|
|
email string
|
|
configure func(s *Server)
|
|
|
|
wantError bool // should server.Login fail?
|
|
wantLogin bool // should server.Login redirect back to the app?
|
|
}{
|
|
{
|
|
testCase: "good user",
|
|
connectorID: testConnectorID1,
|
|
clientID: testClientID,
|
|
userID: testUserID1,
|
|
remoteUserID: testUserRemoteID1,
|
|
email: testUserEmail1,
|
|
wantLogin: true,
|
|
},
|
|
{
|
|
testCase: "user has remote identity with another connector",
|
|
connectorID: testConnectorIDOpenID,
|
|
clientID: testClientID,
|
|
userID: testUserID1,
|
|
remoteUserID: testUserRemoteID1,
|
|
email: testUserEmail1,
|
|
wantLogin: false,
|
|
},
|
|
{
|
|
testCase: "unknown connector id",
|
|
connectorID: "bad connector id",
|
|
clientID: testClientID,
|
|
userID: testUserID1,
|
|
remoteUserID: testUserRemoteID1,
|
|
email: testUserEmail1,
|
|
wantError: true,
|
|
},
|
|
{
|
|
testCase: "unregistered user",
|
|
connectorID: testConnectorIDOpenID,
|
|
clientID: testClientID,
|
|
userID: testUserID1,
|
|
remoteUserID: "unregistered-user-id",
|
|
email: "newemail@example.com",
|
|
wantLogin: false,
|
|
},
|
|
{
|
|
testCase: "unregistered user with register on first login",
|
|
connectorID: testConnectorIDOpenID,
|
|
clientID: testClientID,
|
|
userID: testUserID1,
|
|
remoteUserID: "unregistered-user-id",
|
|
email: "newemail@example.com",
|
|
configure: func(srv *Server) { srv.RegisterOnFirstLogin = true },
|
|
wantLogin: true,
|
|
},
|
|
{
|
|
testCase: "unregistered user through local connector with register on first login",
|
|
connectorID: testConnectorLocalID,
|
|
clientID: testClientID,
|
|
userID: testUserID1,
|
|
remoteUserID: "unregistered-user-id",
|
|
email: "newemail@example.com",
|
|
configure: func(srv *Server) { srv.RegisterOnFirstLogin = true },
|
|
wantLogin: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
f, err := makeTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("error making test fixtures: %v", err)
|
|
}
|
|
|
|
if tt.configure != nil {
|
|
tt.configure(f.srv)
|
|
}
|
|
|
|
sm := f.sessionManager
|
|
sessionID, err := sm.NewSession(tt.connectorID, tt.clientID, "bogus", testRedirectURL, "", false, []string{"openid"})
|
|
if err != nil {
|
|
t.Errorf("case %s: new session: %v", tt.testCase, err)
|
|
continue
|
|
}
|
|
|
|
key, err := sm.NewSessionKey(sessionID)
|
|
if err != nil {
|
|
t.Errorf("case %s: new session key: %v", tt.testCase, err)
|
|
continue
|
|
}
|
|
|
|
ident := oidc.Identity{ID: tt.remoteUserID, Name: "elroy", Email: tt.email}
|
|
redirectURL, err := f.srv.Login(ident, key)
|
|
if err != nil {
|
|
if !tt.wantError {
|
|
t.Errorf("case %s: server.Login: %v", tt.testCase, err)
|
|
}
|
|
continue
|
|
}
|
|
if tt.wantError {
|
|
t.Errorf("case %s: expected server.Login to fail", tt.testCase)
|
|
continue
|
|
}
|
|
|
|
// Did the server redirect back to the client app or display an error to the user?
|
|
gotRedirectURL := strings.HasPrefix(redirectURL, testRedirectURL.String())
|
|
if gotRedirectURL && !tt.wantLogin {
|
|
t.Errorf("case %s: should not have logged in", tt.testCase)
|
|
}
|
|
if !gotRedirectURL && tt.wantLogin {
|
|
t.Errorf("case %s: failed to log in. expected redirect url got: %s", tt.testCase, redirectURL)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestServerLoginUnrecognizedSessionKey(t *testing.T) {
|
|
f, err := makeTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("error making test fixtures: %v", err)
|
|
}
|
|
|
|
ident := oidc.Identity{ID: testUserRemoteID1, Name: "elroy", Email: testUserEmail1}
|
|
code, err := f.srv.Login(ident, testClientID)
|
|
if err == nil {
|
|
t.Fatalf("Expected non-nil error")
|
|
}
|
|
|
|
if code != "" {
|
|
t.Fatalf("Expected empty code, got=%s", code)
|
|
}
|
|
}
|
|
|
|
func TestServerLoginDisabledUser(t *testing.T) {
|
|
f, err := makeTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("error making test fixtures: %v", err)
|
|
}
|
|
|
|
err = f.userRepo.Create(nil, user.User{
|
|
ID: "disabled-1",
|
|
Email: "disabled@example.com",
|
|
Disabled: true,
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
err = f.userRepo.AddRemoteIdentity(nil, "disabled-1", user.RemoteIdentity{
|
|
ConnectorID: "test_connector_id",
|
|
ID: "disabled-connector-id",
|
|
})
|
|
|
|
sessionID, err := f.sessionManager.NewSession("test_connector_id", testClientID, "bogus", testRedirectURL, "", false, []string{"openid"})
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
ident := oidc.Identity{ID: "disabled-connector-id", Name: "elroy", Email: "elroy@example.com"}
|
|
key, err := f.sessionManager.NewSessionKey(sessionID)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
_, err = f.srv.Login(ident, key)
|
|
if err == nil {
|
|
t.Errorf("disabled user was allowed to log in")
|
|
}
|
|
}
|
|
|
|
func TestServerCodeToken(t *testing.T) {
|
|
f, err := makeTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("Error creating test fixtures: %v", err)
|
|
}
|
|
sm := f.sessionManager
|
|
|
|
tests := []struct {
|
|
scope []string
|
|
refreshToken string
|
|
}{
|
|
// No 'offline_access' in scope, should get empty refresh token.
|
|
{
|
|
scope: []string{"openid"},
|
|
refreshToken: "",
|
|
},
|
|
// Have 'offline_access' in scope, should get non-empty refresh token.
|
|
{
|
|
// NOTE(ericchiang): This test assumes that the database ID of the
|
|
// first refresh token will be "1".
|
|
scope: []string{"openid", "offline_access"},
|
|
refreshToken: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
sessionID, err := sm.NewSession("bogus_idpc", testClientID, "bogus", url.URL{}, "", false, tt.scope)
|
|
if err != nil {
|
|
t.Fatalf("case %d: unexpected error: %v", i, err)
|
|
}
|
|
_, err = sm.AttachRemoteIdentity(sessionID, oidc.Identity{})
|
|
if err != nil {
|
|
t.Fatalf("case %d: unexpected error: %v", i, err)
|
|
}
|
|
|
|
_, err = sm.AttachUser(sessionID, testUserID1)
|
|
if err != nil {
|
|
t.Fatalf("case %d: unexpected error: %v", i, err)
|
|
}
|
|
|
|
key, err := sm.NewSessionKey(sessionID)
|
|
if err != nil {
|
|
t.Fatalf("case %d: unexpected error: %v", i, err)
|
|
}
|
|
|
|
jwt, token, err := f.srv.CodeToken(oidc.ClientCredentials{
|
|
ID: testClientID,
|
|
Secret: clientTestSecret}, key)
|
|
if err != nil {
|
|
t.Fatalf("case %d: unexpected error: %v", i, err)
|
|
}
|
|
if jwt == nil {
|
|
t.Fatalf("case %d: expect non-nil jwt", i)
|
|
}
|
|
if token != tt.refreshToken {
|
|
t.Fatalf("case %d: expect refresh token %q, got %q", i, tt.refreshToken, token)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestServerTokenUnrecognizedKey(t *testing.T) {
|
|
f, err := makeTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("error making test fixtures: %v", err)
|
|
}
|
|
sm := f.sessionManager
|
|
|
|
sessionID, err := sm.NewSession("connector_id", testClientID, "bogus", url.URL{}, "", false, []string{"openid", "offline_access"})
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
_, err = sm.AttachRemoteIdentity(sessionID, oidc.Identity{})
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
jwt, token, err := f.srv.CodeToken(testClientCredentials, "foo")
|
|
if err == nil {
|
|
t.Fatalf("Expected non-nil error")
|
|
}
|
|
if jwt != nil {
|
|
t.Fatalf("Expected nil jwt")
|
|
}
|
|
if token != "" {
|
|
t.Fatalf("Expected empty refresh token")
|
|
}
|
|
}
|
|
|
|
func TestServerTokenFail(t *testing.T) {
|
|
keyFixture := "goodkey"
|
|
|
|
signerFixture := &StaticSigner{sig: []byte("beer"), err: nil}
|
|
|
|
tests := []struct {
|
|
signer jose.Signer
|
|
argCC oidc.ClientCredentials
|
|
argKey string
|
|
err error
|
|
scope []string
|
|
refreshToken string
|
|
}{
|
|
// control test case to make sure fixtures check out
|
|
{
|
|
// NOTE(ericchiang): This test assumes that the database ID of the first
|
|
// refresh token will be "1".
|
|
signer: signerFixture,
|
|
argCC: testClientCredentials,
|
|
argKey: keyFixture,
|
|
scope: []string{"openid", "offline_access"},
|
|
refreshToken: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
},
|
|
|
|
// no 'offline_access' in 'scope', should get empty refresh token
|
|
{
|
|
signer: signerFixture,
|
|
argCC: testClientCredentials,
|
|
argKey: keyFixture,
|
|
scope: []string{"openid"},
|
|
},
|
|
|
|
// unrecognized key
|
|
{
|
|
signer: signerFixture,
|
|
argCC: testClientCredentials,
|
|
argKey: "foo",
|
|
err: oauth2.NewError(oauth2.ErrorInvalidGrant),
|
|
scope: []string{"openid", "offline_access"},
|
|
},
|
|
|
|
// unrecognized client
|
|
{
|
|
signer: signerFixture,
|
|
argCC: oidc.ClientCredentials{ID: "YYY"},
|
|
argKey: keyFixture,
|
|
err: oauth2.NewError(oauth2.ErrorInvalidClient),
|
|
scope: []string{"openid", "offline_access"},
|
|
},
|
|
|
|
// signing operation fails
|
|
{
|
|
signer: &StaticSigner{sig: nil, err: errors.New("fail")},
|
|
argCC: testClientCredentials,
|
|
argKey: keyFixture,
|
|
err: oauth2.NewError(oauth2.ErrorServerError),
|
|
scope: []string{"openid", "offline_access"},
|
|
},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
|
|
f, err := makeTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("error making test fixtures: %v", err)
|
|
}
|
|
sm := f.sessionManager
|
|
sm.GenerateCode = func() (string, error) { return keyFixture, nil }
|
|
f.srv.RefreshTokenRepo = refreshtest.NewTestRefreshTokenRepo()
|
|
f.srv.KeyManager = &StaticKeyManager{
|
|
signer: tt.signer,
|
|
}
|
|
|
|
sessionID, err := sm.NewSession(testConnectorID1, testClientID, "bogus", url.URL{}, "", false, tt.scope)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
_, err = sm.AttachRemoteIdentity(sessionID, oidc.Identity{})
|
|
if err != nil {
|
|
t.Errorf("case %d: unexpected error: %v", i, err)
|
|
continue
|
|
}
|
|
_, err = sm.AttachUser(sessionID, testUserID1)
|
|
if err != nil {
|
|
t.Fatalf("case %d: unexpected error: %v", i, err)
|
|
}
|
|
|
|
_, err = sm.NewSessionKey(sessionID)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
jwt, token, err := f.srv.CodeToken(tt.argCC, tt.argKey)
|
|
if token != tt.refreshToken {
|
|
fmt.Printf("case %d: expect refresh token %q, got %q\n", i, tt.refreshToken, token)
|
|
t.Fatalf("case %d: expect refresh token %q, got %q", i, tt.refreshToken, token)
|
|
panic("")
|
|
}
|
|
if !reflect.DeepEqual(err, tt.err) {
|
|
t.Errorf("case %d: expect %v, got %v", i, tt.err, err)
|
|
}
|
|
if err == nil && jwt == nil {
|
|
t.Errorf("case %d: got nil JWT", i)
|
|
}
|
|
if err != nil && jwt != nil {
|
|
t.Errorf("case %d: got non-nil JWT %v", i, jwt)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestServerRefreshToken(t *testing.T) {
|
|
|
|
clientB := client.Client{
|
|
Credentials: oidc.ClientCredentials{
|
|
ID: "example2.com",
|
|
Secret: clientTestSecret,
|
|
},
|
|
Metadata: oidc.ClientMetadata{
|
|
RedirectURIs: []url.URL{
|
|
url.URL{Scheme: "https", Host: "example2.com", Path: "one/two/three"},
|
|
},
|
|
},
|
|
}
|
|
signerFixture := &StaticSigner{sig: []byte("beer"), err: nil}
|
|
|
|
// NOTE(ericchiang): These tests assume that the database ID of the first
|
|
// refresh token will be "1".
|
|
tests := []struct {
|
|
token string
|
|
clientID string // The client that associates with the token.
|
|
creds oidc.ClientCredentials
|
|
signer jose.Signer
|
|
createScopes []string
|
|
refreshScopes []string
|
|
expectedAud []string
|
|
err error
|
|
}{
|
|
// Everything is good.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: testClientCredentials,
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
},
|
|
// Asking for a scope not originally granted to you.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: testClientCredentials,
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile", "extra_scope"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidRequest),
|
|
},
|
|
// Invalid refresh token(malformatted).
|
|
{
|
|
token: "invalid-token",
|
|
clientID: testClientID,
|
|
creds: testClientCredentials,
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidRequest),
|
|
},
|
|
// Invalid refresh token(invalid payload content).
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-2"))),
|
|
clientID: testClientID,
|
|
creds: testClientCredentials,
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidRequest),
|
|
},
|
|
// Invalid refresh token(invalid ID content).
|
|
{
|
|
token: fmt.Sprintf("0/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: testClientCredentials,
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidRequest),
|
|
},
|
|
// Invalid client(client is not associated with the token).
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: clientB.Credentials,
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidClient),
|
|
},
|
|
// Invalid client(no client ID).
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: oidc.ClientCredentials{ID: "", Secret: "aaa"},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidClient),
|
|
},
|
|
// Invalid client(no such client).
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: oidc.ClientCredentials{ID: "AAA", Secret: "aaa"},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidClient),
|
|
},
|
|
// Invalid client(no secrets).
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: oidc.ClientCredentials{ID: testClientID},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidClient),
|
|
},
|
|
// Invalid client(invalid secret).
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: oidc.ClientCredentials{ID: "bad-id", Secret: "bad-secret"},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidClient),
|
|
},
|
|
// Signing operation fails.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: testClientID,
|
|
creds: testClientCredentials,
|
|
signer: &StaticSigner{sig: nil, err: errors.New("fail")},
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile"},
|
|
err: oauth2.NewError(oauth2.ErrorServerError),
|
|
},
|
|
// Valid Cross-Client
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: "client_a",
|
|
creds: oidc.ClientCredentials{
|
|
ID: "client_a",
|
|
Secret: base64.URLEncoding.EncodeToString(
|
|
[]byte("client_a_secret")),
|
|
},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b"},
|
|
refreshScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b"},
|
|
expectedAud: []string{"client_b"},
|
|
},
|
|
// Valid Cross-Client - but this time we leave out the scopes in the
|
|
// refresh request, which should result in the original stored scopes
|
|
// being used.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: "client_a",
|
|
creds: oidc.ClientCredentials{
|
|
ID: "client_a",
|
|
Secret: base64.URLEncoding.EncodeToString(
|
|
[]byte("client_a_secret")),
|
|
},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b"},
|
|
refreshScopes: []string{},
|
|
expectedAud: []string{"client_b"},
|
|
},
|
|
// Valid Cross-Client - asking for fewer scopes than originally used
|
|
// when creating the refresh token, which is ok.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: "client_a",
|
|
creds: oidc.ClientCredentials{
|
|
ID: "client_a",
|
|
Secret: base64.URLEncoding.EncodeToString(
|
|
[]byte("client_a_secret")),
|
|
},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b", scope.ScopeGoogleCrossClient + "client_c"},
|
|
refreshScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b"},
|
|
expectedAud: []string{"client_b"},
|
|
},
|
|
// Valid Cross-Client - asking for multiple clients in the audience.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: "client_a",
|
|
creds: oidc.ClientCredentials{
|
|
ID: "client_a",
|
|
Secret: base64.URLEncoding.EncodeToString(
|
|
[]byte("client_a_secret")),
|
|
},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b", scope.ScopeGoogleCrossClient + "client_c"},
|
|
refreshScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b", scope.ScopeGoogleCrossClient + "client_c"},
|
|
expectedAud: []string{"client_b", "client_c"},
|
|
},
|
|
// Invalid Cross-Client - didn't orignally request cross-client when
|
|
// refresh token was created.
|
|
{
|
|
token: fmt.Sprintf("1/%s", base64.URLEncoding.EncodeToString([]byte("refresh-1"))),
|
|
clientID: "client_a",
|
|
creds: oidc.ClientCredentials{
|
|
ID: "client_a",
|
|
Secret: base64.URLEncoding.EncodeToString(
|
|
[]byte("client_a_secret")),
|
|
},
|
|
signer: signerFixture,
|
|
createScopes: []string{"openid", "profile"},
|
|
refreshScopes: []string{"openid", "profile", scope.ScopeGoogleCrossClient + "client_b"},
|
|
err: oauth2.NewError(oauth2.ErrorInvalidRequest),
|
|
},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
km := &StaticKeyManager{
|
|
signer: tt.signer,
|
|
}
|
|
f, err := makeCrossClientTestFixtures()
|
|
if err != nil {
|
|
t.Fatalf("error making test fixtures: %v", err)
|
|
}
|
|
f.srv.RefreshTokenRepo = refreshtest.NewTestRefreshTokenRepo()
|
|
f.srv.KeyManager = km
|
|
_, err = f.clientRepo.New(nil, clientB)
|
|
if err != nil {
|
|
t.Errorf("case %d: error creating other client: %v", i, err)
|
|
}
|
|
|
|
if _, err := f.srv.RefreshTokenRepo.Create(testUserID1, tt.clientID, "", tt.createScopes); err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
jwt, err := f.srv.RefreshToken(tt.creds, tt.refreshScopes, tt.token)
|
|
if !reflect.DeepEqual(err, tt.err) {
|
|
t.Errorf("Case %d: expect: %v, got: %v", i, tt.err, err)
|
|
}
|
|
|
|
if jwt != nil {
|
|
if string(jwt.Signature) != "beer" {
|
|
t.Errorf("Case %d: expect signature: beer, got signature: %v", i, jwt.Signature)
|
|
}
|
|
claims, err := jwt.Claims()
|
|
if err != nil {
|
|
t.Errorf("Case %d: unexpected error: %v", i, err)
|
|
}
|
|
|
|
var expectedAud interface{}
|
|
if tt.expectedAud == nil {
|
|
expectedAud = testClientID
|
|
} else if len(tt.expectedAud) == 1 {
|
|
expectedAud = tt.expectedAud[0]
|
|
} else {
|
|
expectedAud = tt.expectedAud
|
|
}
|
|
|
|
if claims["iss"] != testIssuerURL.String() {
|
|
t.Errorf("Case %d: want=%v, got=%v", i,
|
|
testIssuerURL.String(), claims["iss"])
|
|
}
|
|
if claims["sub"] != testUserID1 {
|
|
t.Errorf("Case %d: want=%v, got=%v", i,
|
|
testUserID1, claims["sub"])
|
|
}
|
|
if diff := pretty.Compare(claims["aud"], expectedAud); diff != "" {
|
|
t.Errorf("Case %d: want=%v, got=%v", i,
|
|
expectedAud, claims["aud"])
|
|
}
|
|
}
|
|
}
|
|
}
|