|
| 1 | +// Copyright 2021 The Gitea Authors. All rights reserved. |
| 2 | +// Use of this source code is governed by a MIT-style |
| 3 | +// license that can be found in the LICENSE file. |
| 4 | + |
| 5 | +package user |
| 6 | + |
| 7 | +import ( |
| 8 | + "testing" |
| 9 | + |
| 10 | + "code.gitea.io/gitea/models" |
| 11 | + "code.gitea.io/gitea/modules/auth/oauth2" |
| 12 | + |
| 13 | + "github.com/golang-jwt/jwt" |
| 14 | + "github.com/stretchr/testify/assert" |
| 15 | +) |
| 16 | + |
| 17 | +func createAndParseToken(t *testing.T, grant *models.OAuth2Grant) *models.OIDCToken { |
| 18 | + signingKey, err := oauth2.CreateJWTSingingKey("HS256", make([]byte, 32)) |
| 19 | + assert.NoError(t, err) |
| 20 | + assert.NotNil(t, signingKey) |
| 21 | + oauth2.DefaultSigningKey = signingKey |
| 22 | + |
| 23 | + response, terr := newAccessTokenResponse(grant, signingKey) |
| 24 | + assert.Nil(t, terr) |
| 25 | + assert.NotNil(t, response) |
| 26 | + |
| 27 | + parsedToken, err := jwt.ParseWithClaims(response.IDToken, &models.OIDCToken{}, func(token *jwt.Token) (interface{}, error) { |
| 28 | + assert.NotNil(t, token.Method) |
| 29 | + assert.Equal(t, signingKey.SigningMethod().Alg(), token.Method.Alg()) |
| 30 | + return signingKey.VerifyKey(), nil |
| 31 | + }) |
| 32 | + assert.NoError(t, err) |
| 33 | + assert.True(t, parsedToken.Valid) |
| 34 | + |
| 35 | + oidcToken, ok := parsedToken.Claims.(*models.OIDCToken) |
| 36 | + assert.True(t, ok) |
| 37 | + assert.NotNil(t, oidcToken) |
| 38 | + |
| 39 | + return oidcToken |
| 40 | +} |
| 41 | + |
| 42 | +func TestNewAccessTokenResponse_OIDCToken(t *testing.T) { |
| 43 | + assert.NoError(t, models.PrepareTestDatabase()) |
| 44 | + |
| 45 | + grants, err := models.GetOAuth2GrantsByUserID(3) |
| 46 | + assert.NoError(t, err) |
| 47 | + assert.Len(t, grants, 1) |
| 48 | + |
| 49 | + // Scopes: openid |
| 50 | + oidcToken := createAndParseToken(t, grants[0]) |
| 51 | + assert.Empty(t, oidcToken.Name) |
| 52 | + assert.Empty(t, oidcToken.PreferredUsername) |
| 53 | + assert.Empty(t, oidcToken.Profile) |
| 54 | + assert.Empty(t, oidcToken.Picture) |
| 55 | + assert.Empty(t, oidcToken.Website) |
| 56 | + assert.Empty(t, oidcToken.UpdatedAt) |
| 57 | + assert.Empty(t, oidcToken.Email) |
| 58 | + assert.False(t, oidcToken.EmailVerified) |
| 59 | + |
| 60 | + user := models.AssertExistsAndLoadBean(t, &models.User{ID: 5}).(*models.User) |
| 61 | + grants, err = models.GetOAuth2GrantsByUserID(user.ID) |
| 62 | + assert.NoError(t, err) |
| 63 | + assert.Len(t, grants, 1) |
| 64 | + |
| 65 | + // Scopes: openid profile email |
| 66 | + oidcToken = createAndParseToken(t, grants[0]) |
| 67 | + assert.Equal(t, user.FullName, oidcToken.Name) |
| 68 | + assert.Equal(t, user.Name, oidcToken.PreferredUsername) |
| 69 | + assert.Equal(t, user.HTMLURL(), oidcToken.Profile) |
| 70 | + assert.Equal(t, user.AvatarLink(), oidcToken.Picture) |
| 71 | + assert.Equal(t, user.Website, oidcToken.Website) |
| 72 | + assert.Equal(t, user.UpdatedUnix, oidcToken.UpdatedAt) |
| 73 | + assert.Equal(t, user.Email, oidcToken.Email) |
| 74 | + assert.Equal(t, user.IsActive, oidcToken.EmailVerified) |
| 75 | +} |
0 commit comments