-
-
Notifications
You must be signed in to change notification settings - Fork 367
/
introspect_token_test.go
127 lines (117 loc) · 3.45 KB
/
introspect_token_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
// Copyright © 2024 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package integration_test
import (
"encoding/json"
"fmt"
"testing"
"github.com/parnurzeal/gorequest"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
goauth "golang.org/x/oauth2"
"github.com/ory/fosite"
"github.com/ory/fosite/compose"
"github.com/ory/fosite/handler/oauth2"
)
func TestIntrospectToken(t *testing.T) {
for _, c := range []struct {
description string
strategy oauth2.AccessTokenStrategy
factory compose.Factory
}{
{
description: "HMAC strategy with OAuth2TokenIntrospectionFactory",
strategy: hmacStrategy,
factory: compose.OAuth2TokenIntrospectionFactory,
},
{
description: "JWT strategy with OAuth2TokenIntrospectionFactory",
strategy: jwtStrategy,
factory: compose.OAuth2TokenIntrospectionFactory,
},
{
description: "JWT strategy with OAuth2StatelessJWTIntrospectionFactory",
strategy: jwtStrategy,
factory: compose.OAuth2StatelessJWTIntrospectionFactory,
},
} {
t.Logf("testing %v", c.description)
runIntrospectTokenTest(t, c.strategy, c.factory)
}
}
func runIntrospectTokenTest(t *testing.T, strategy oauth2.AccessTokenStrategy, introspectionFactory compose.Factory) {
f := compose.Compose(new(fosite.Config), fositeStore, strategy, compose.OAuth2ClientCredentialsGrantFactory, introspectionFactory)
ts := mockServer(t, f, &fosite.DefaultSession{})
defer ts.Close()
oauthClient := newOAuth2AppClient(ts)
a, err := oauthClient.Token(goauth.NoContext)
require.NoError(t, err)
b, err := oauthClient.Token(goauth.NoContext)
require.NoError(t, err)
for k, c := range []struct {
prepare func(*gorequest.SuperAgent) *gorequest.SuperAgent
isActive bool
scopes string
}{
{
prepare: func(s *gorequest.SuperAgent) *gorequest.SuperAgent {
return s.SetBasicAuth(oauthClient.ClientID, oauthClient.ClientSecret)
},
isActive: true,
scopes: "",
},
{
prepare: func(s *gorequest.SuperAgent) *gorequest.SuperAgent {
return s.Set("Authorization", "bearer "+a.AccessToken)
},
isActive: true,
scopes: "fosite",
},
{
prepare: func(s *gorequest.SuperAgent) *gorequest.SuperAgent {
return s.Set("Authorization", "bearer "+a.AccessToken)
},
isActive: true,
scopes: "",
},
{
prepare: func(s *gorequest.SuperAgent) *gorequest.SuperAgent {
return s.Set("Authorization", "bearer "+a.AccessToken)
},
isActive: false,
scopes: "foo",
},
{
prepare: func(s *gorequest.SuperAgent) *gorequest.SuperAgent {
return s.Set("Authorization", "bearer "+b.AccessToken)
},
isActive: false,
scopes: "",
},
} {
t.Run(fmt.Sprintf("case=%d", k), func(t *testing.T) {
res := struct {
Active bool `json:"active"`
ClientId string `json:"client_id"`
Scope string `json:"scope"`
ExpiresAt float64 `json:"exp"`
IssuedAt float64 `json:"iat"`
}{}
s := gorequest.New()
s = s.Post(ts.URL + "/introspect").
Type("form").
SendStruct(map[string]string{"token": b.AccessToken, "scope": c.scopes})
_, bytes, errs := c.prepare(s).End()
assert.Nil(t, json.Unmarshal([]byte(bytes), &res))
t.Logf("Got answer: %s", bytes)
assert.Len(t, errs, 0)
assert.Equal(t, c.isActive, res.Active)
if c.isActive {
assert.Equal(t, "fosite", res.Scope)
assert.True(t, res.ExpiresAt > 0)
assert.True(t, res.IssuedAt > 0)
assert.True(t, res.IssuedAt < res.ExpiresAt)
}
})
}
}