File: token_request_test.go

package info (click to toggle)
golang-github-zitadel-oidc 3.44.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,520 kB
  • sloc: makefile: 5
file content (75 lines) | stat: -rw-r--r-- 1,942 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
package op_test

import (
	"testing"

	"github.com/stretchr/testify/assert"
	"github.com/zitadel/oidc/v3/pkg/oidc"
	"github.com/zitadel/oidc/v3/pkg/op"
)

func TestAuthorizeCodeChallenge(t *testing.T) {
	tests := []struct {
		name         string
		codeVerifier string
		codeChallenge    *oidc.CodeChallenge
		want         func(t *testing.T, err error)
	}{
		{
			name:         "missing both code_verifier and code_challenge",
			codeVerifier: "",
			codeChallenge:    nil,
			want: func(t *testing.T, err error) {
				assert.Nil(t, err)
			},
		},
		{
			name:         "valid code_verifier",
			codeVerifier: "Hello World!",
			codeChallenge: &oidc.CodeChallenge{
				Challenge: "f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk",
				Method:    oidc.CodeChallengeMethodS256,
			},
			want: func(t *testing.T, err error) {
				assert.Nil(t, err)
			},
		},
		{
			name:         "invalid code_verifier",
			codeVerifier: "Hi World!",
			codeChallenge: &oidc.CodeChallenge{
				Challenge: "f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk",
				Method:    oidc.CodeChallengeMethodS256,
			},
			want: func(t *testing.T, err error) {
				assert.ErrorContains(t, err, "invalid code_verifier")
			},
		},
		{
			name:         "code_verifier provided without code_challenge",
			codeVerifier: "code_verifier",
			codeChallenge:    nil,
			want: func(t *testing.T, err error) {
				assert.ErrorContains(t, err, "code_verifier unexpectedly provided")
			},
		},
		{
			name:         "empty code_verifier",
			codeVerifier: "",
			codeChallenge: &oidc.CodeChallenge{
				Challenge: "f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk",
				Method:    oidc.CodeChallengeMethodS256,
			},
			want: func(t *testing.T, err error) {
				assert.ErrorContains(t, err, "code_verifier required")
			},
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			err := op.AuthorizeCodeChallenge(tt.codeVerifier, tt.codeChallenge)

			tt.want(t, err)
		})
	}
}