1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170
|
# --
# Copyright (C) 2021 Znuny GmbH, https://znuny.org/
# --
# This software comes with ABSOLUTELY NO WARRANTY. For details, see
# the enclosed file COPYING for license information (AGPL). If you
# did not receive this file, see http://www.gnu.org/licenses/agpl.txt.
# --
use strict;
use warnings;
use utf8;
use vars (qw($Self));
use Kernel::System::VariableCheck qw(:all);
$Kernel::OM->ObjectParamAdd(
'Kernel::System::UnitTest::Helper' => {
RestoreDatabase => 1,
},
);
my $HelperObject = $Kernel::OM->Get('Kernel::System::UnitTest::Helper');
my $ConfigObject = $Kernel::OM->Get('Kernel::Config');
my $MainObject = $Kernel::OM->Get('Kernel::System::Main');
my $JWTObject = $Kernel::OM->Get('Kernel::System::JSONWebToken');
return 1 if !$JWTObject->IsSupported();
my $Home = $ConfigObject->Get('Home');
#
# Test with private key without password.
#
my $PrivateKeyFilePath = "$Home/scripts/test/sample/JSONWebToken/PrivateKeyWithoutPassword.pem";
my $PrivateKeyFileContent = ${
$MainObject->FileRead(
Location => $PrivateKeyFilePath,
Mode => 'binmode',
Type => 'Local',
Result => 'SCALAR',
DisableWarnings => 0,
)
};
my $JWT = $JWTObject->Encode(
Payload => {
Key1 => 'This is a value with <OTRS_multiple> <OTRS_placeholders>.',
Key2 => 'Another <OTRS_one> with a missing value for a <OTRS_missing_value>.',
},
Algorithm => 'RS512',
KeyFilePath => $PrivateKeyFilePath,
KeyPassword => '',
PlaceholderData => {
OTRS_multiple => 'multiple',
OTRS_one => 'one',
OTRS_placeholders => 'placeholders',
},
);
$Self->True(
scalar $JWT,
'Encode() must return a generated JSON web token.',
);
my $DecodedJWT = $JWTObject->Decode(
Token => $JWT,
Key => $PrivateKeyFileContent,
KeyPassword => 'IRRELEVANT_WILL_BE_IGNORED',
);
my %ExpectedDecodedJWT = (
Key1 => 'This is a value with multiple placeholders.',
Key2 => 'Another one with a missing value for a .',
);
$Self->IsDeeply(
$DecodedJWT,
\%ExpectedDecodedJWT,
'Decode() must return expected data.',
);
#
# Test with private key with password.
#
$PrivateKeyFilePath = "$Home/scripts/test/sample/JSONWebToken/PrivateKeyWithPassword.pem";
my $PrivateKeyPassword = 'test1234';
$PrivateKeyFileContent = ${
$MainObject->FileRead(
Location => $PrivateKeyFilePath,
Mode => 'binmode',
Type => 'Local',
Result => 'SCALAR',
DisableWarnings => 0,
)
};
$JWT = $JWTObject->Encode(
Payload => {
Key1 => 'This is a value with <OTRS_multiple> <OTRS_placeholders>.',
Key2 => 'Another <OTRS_one> with a missing value for a <OTRS_missing_value>.',
},
Algorithm => 'RS512',
Key => $PrivateKeyFileContent,
KeyPassword => 'INVALID_PASSWORD',
PlaceholderData => {
OTRS_multiple => 'multiple',
OTRS_one => 'one',
OTRS_placeholders => 'placeholders',
},
);
$Self->False(
scalar $JWT,
'Encode() must return no JSON web token for wrong password of key file.',
);
$JWT = $JWTObject->Encode(
Payload => {
Key1 => 'This is a value with <OTRS_multiple> <OTRS_placeholders>.',
Key2 => 'Another <OTRS_one> with a missing value for a <OTRS_missing_value>.',
},
Algorithm => 'RS512',
Key => $PrivateKeyFileContent,
KeyPassword => 'test1234',
PlaceholderData => {
OTRS_multiple => 'multiple',
OTRS_one => 'one',
OTRS_placeholders => 'placeholders',
},
);
$Self->True(
scalar $JWT,
'Encode() must return a generated JSON web token for correct password of key file.',
);
$DecodedJWT = $JWTObject->Decode(
Token => $JWT,
Key => $PrivateKeyFileContent,
KeyPassword => 'INVALID_PASSWORD',
);
$Self->False(
scalar $DecodedJWT,
'Decode() must not return data for wrong password of key file.',
);
$DecodedJWT = $JWTObject->Decode(
Token => $JWT,
Key => $PrivateKeyFileContent,
KeyPassword => 'test1234',
);
%ExpectedDecodedJWT = (
Key1 => 'This is a value with multiple placeholders.',
Key2 => 'Another one with a missing value for a .',
);
$Self->IsDeeply(
$DecodedJWT,
\%ExpectedDecodedJWT,
'Decode() must return expected data.',
);
1;
|