1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
|
// Copyright 2024 OpenPubkey
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// SPDX-License-Identifier: Apache-2.0
package providers
import (
"context"
"encoding/json"
"testing"
"github.com/lestrrat-go/jwx/v2/jws"
"github.com/openpubkey/openpubkey/providers/mocks"
"github.com/openpubkey/openpubkey/util"
"github.com/stretchr/testify/require"
)
func TestGoogleSimpleRequest(t *testing.T) {
gqSign := false
issuer := googleIssuer
providerOverride, err := mocks.NewMockProviderBackend(issuer, "RS256", 2)
require.NoError(t, err)
op := &GoogleOp{
StandardOp{
issuer: googleIssuer,
publicKeyFinder: providerOverride.PublicKeyFinder,
requestTokensOverrideFunc: providerOverride.RequestTokensOverrideFunc,
},
}
cic := GenCIC(t)
expSigningKey, expKeyID, expRecord := providerOverride.RandomSigningKey()
idTokenTemplate := mocks.IDTokenTemplate{
CommitFunc: mocks.AddNonceCommit,
Issuer: issuer,
Nonce: "empty",
NoNonce: false,
Aud: "also me",
KeyID: expKeyID,
NoKeyID: false,
Alg: expRecord.Alg,
NoAlg: false,
ExtraClaims: map[string]any{"extraClaim": "extraClaimValue"},
ExtraProtectedClaims: map[string]any{"extraHeader": "extraheaderValue"},
SigningKey: expSigningKey,
}
providerOverride.SetIDTokenTemplate(&idTokenTemplate)
tokens, err := op.RequestTokens(context.Background(), cic)
require.NoError(t, err)
idToken := tokens.IDToken
cicHash, err := cic.Hash()
require.NoError(t, err)
require.NotNil(t, cicHash)
headerB64, payloadB64, _, err := jws.SplitCompact(idToken)
require.NoError(t, err)
headerJson, err := util.Base64DecodeForJWT(headerB64)
require.NoError(t, err)
if gqSign {
headers := jws.NewHeaders()
err = json.Unmarshal(headerJson, &headers)
require.NoError(t, err)
cicHash2, ok := headers.Get("cic")
require.True(t, ok, "cic not found in GQ ID Token")
require.Equal(t, string(cicHash), cicHash2, "cic hash in jwt header should match cic supplied")
} else {
payload, err := util.Base64DecodeForJWT(payloadB64)
require.NoError(t, err)
require.Contains(t, string(payload), string(cicHash))
}
require.Equal(t, "mock-refresh-token", string(tokens.RefreshToken))
require.Equal(t, "mock-access-token", string(tokens.AccessToken))
}
|