| 
 | 1 | +// Copyright (c) HashiCorp, Inc.  | 
 | 2 | +// SPDX-License-Identifier: BUSL-1.1  | 
 | 3 | + | 
 | 4 | +package oidcauth  | 
 | 5 | + | 
 | 6 | +import (  | 
 | 7 | +	"testing"  | 
 | 8 | +	"time"  | 
 | 9 | + | 
 | 10 | +	"github.com/hashicorp/consul/internal/go-sso/oidcauth/oidcauthtest"  | 
 | 11 | +	"github.com/hashicorp/go-hclog"  | 
 | 12 | +	"github.com/patrickmn/go-cache"  | 
 | 13 | +	"github.com/stretchr/testify/assert"  | 
 | 14 | +)  | 
 | 15 | + | 
 | 16 | +func mockConfig(typ string, t *testing.T) *Config {  | 
 | 17 | +	t.Helper()  | 
 | 18 | + | 
 | 19 | +	srv := oidcauthtest.Start(t)  | 
 | 20 | +	srv.SetClientCreds("abc", "def")  | 
 | 21 | +	cfg := &Config{  | 
 | 22 | +		Type: typ,  | 
 | 23 | +	}  | 
 | 24 | +	if typ == TypeJWT {  | 
 | 25 | +		cfg.JWKSURL = srv.Addr() + "/certs"  | 
 | 26 | +		cfg.JWKSCACert = srv.CACert()  | 
 | 27 | +	}  | 
 | 28 | +	if typ == TypeOIDC {  | 
 | 29 | +		cfg.OIDCDiscoveryURL = srv.Addr()  | 
 | 30 | +		cfg.OIDCClientID = "abc"  | 
 | 31 | +		cfg.OIDCClientSecret = "def"  | 
 | 32 | +		cfg.AllowedRedirectURIs = []string{"https://redirect"}  | 
 | 33 | +		cfg.OIDCDiscoveryCACert = srv.CACert()  | 
 | 34 | +	}  | 
 | 35 | +	return cfg  | 
 | 36 | +}  | 
 | 37 | + | 
 | 38 | +const testPublicKeyPEM = `-----BEGIN PUBLIC KEY-----  | 
 | 39 | +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEEVs/o5+uQbTjL3chynL4wXgUg2R9  | 
 | 40 | +q9UU8I5mEovUf86QZ7kOBIjJwqnzD1omageEHWwHdBO6B+dFabmdT9POxg==  | 
 | 41 | +-----END PUBLIC KEY-----`  | 
 | 42 | + | 
 | 43 | +func TestAuthenticator_JWTGroup(t *testing.T) {  | 
 | 44 | +	t.Run("JWTType static keys", func(t *testing.T) {  | 
 | 45 | +		cfg := mockConfig(TypeJWT, t)  | 
 | 46 | +		cfg.JWTValidationPubKeys = []string{testPublicKeyPEM}  | 
 | 47 | +		cfg.JWKSURL = ""  | 
 | 48 | +		cfg.JWKSCACert = ""  | 
 | 49 | +		logger := hclog.NewNullLogger()  | 
 | 50 | +		auth, err := New(cfg, logger)  | 
 | 51 | +		assert.NoError(t, err)  | 
 | 52 | +		assert.NotNil(t, auth)  | 
 | 53 | +		assert.Equal(t, cfg, auth.config)  | 
 | 54 | +		assert.NotEmpty(t, auth.parsedJWTPubKeys)  | 
 | 55 | +	})  | 
 | 56 | + | 
 | 57 | +	t.Run("JWTType JWKS", func(t *testing.T) {  | 
 | 58 | +		cfg := mockConfig(TypeJWT, t)  | 
 | 59 | +		logger := hclog.NewNullLogger()  | 
 | 60 | +		auth, err := New(cfg, logger)  | 
 | 61 | +		assert.NoError(t, err)  | 
 | 62 | +		assert.NotNil(t, auth)  | 
 | 63 | +		assert.Equal(t, cfg, auth.config)  | 
 | 64 | +	})  | 
 | 65 | + | 
 | 66 | +	t.Run("JWTType failure", func(t *testing.T) {  | 
 | 67 | +		cfg := mockConfig(TypeJWT, t)  | 
 | 68 | +		cfg.OIDCClientID = "abc"  | 
 | 69 | +		logger := hclog.NewNullLogger()  | 
 | 70 | +		_, err := New(cfg, logger)  | 
 | 71 | +		assert.Error(t, err)  | 
 | 72 | +		requireErrorContains(t, err, "'OIDCClientID' must not be set for type")  | 
 | 73 | +	})  | 
 | 74 | + | 
 | 75 | +	t.Run("Stop", func(t *testing.T) {  | 
 | 76 | +		cfg := mockConfig(TypeJWT, t)  | 
 | 77 | +		logger := hclog.NewNullLogger()  | 
 | 78 | +		auth, err := New(cfg, logger)  | 
 | 79 | +		assert.NoError(t, err)  | 
 | 80 | +		assert.NotNil(t, auth.backgroundCtxCancel)  | 
 | 81 | +		auth.Stop()  | 
 | 82 | +		assert.Nil(t, auth.backgroundCtxCancel)  | 
 | 83 | +	})  | 
 | 84 | + | 
 | 85 | +	t.Run("BackgroundContextCancel", func(t *testing.T) {  | 
 | 86 | +		cfg := mockConfig(TypeJWT, t)  | 
 | 87 | +		logger := hclog.NewNullLogger()  | 
 | 88 | +		auth, err := New(cfg, logger)  | 
 | 89 | +		assert.NoError(t, err)  | 
 | 90 | +		done := make(chan struct{})  | 
 | 91 | +		go func() {  | 
 | 92 | +			<-auth.backgroundCtx.Done()  | 
 | 93 | +			close(done)  | 
 | 94 | +		}()  | 
 | 95 | +		auth.Stop()  | 
 | 96 | +		select {  | 
 | 97 | +		case <-done:  | 
 | 98 | +		case <-time.After(time.Second):  | 
 | 99 | +			t.Fatal("backgroundCtx was not cancelled")  | 
 | 100 | +		}  | 
 | 101 | +	})  | 
 | 102 | +}  | 
 | 103 | + | 
 | 104 | +func TestAuthenticator_OIDCGroup(t *testing.T) {  | 
 | 105 | +	t.Run("OIDCType", func(t *testing.T) {  | 
 | 106 | +		cfg := mockConfig(TypeOIDC, t)  | 
 | 107 | +		logger := hclog.NewNullLogger()  | 
 | 108 | +		auth, err := New(cfg, logger)  | 
 | 109 | +		assert.NoError(t, err)  | 
 | 110 | +		assert.NotNil(t, auth.capProvider)  | 
 | 111 | +		assert.NotNil(t, auth.oidcStates)  | 
 | 112 | +	})  | 
 | 113 | + | 
 | 114 | +	t.Run("OIDCDiscovery", func(t *testing.T) {  | 
 | 115 | +		srv := oidcauthtest.Start(t)  | 
 | 116 | +		srv.SetClientCreds("abc", "def")  | 
 | 117 | +		cfg := mockConfig(TypeJWT, t)  | 
 | 118 | +		cfg.JWKSURL = ""  | 
 | 119 | +		cfg.JWKSCACert = ""  | 
 | 120 | +		cfg.OIDCDiscoveryURL = srv.Addr()  | 
 | 121 | +		cfg.OIDCDiscoveryCACert = srv.CACert()  | 
 | 122 | + | 
 | 123 | +		logger := hclog.NewNullLogger()  | 
 | 124 | +		auth, err := New(cfg, logger)  | 
 | 125 | +		assert.NoError(t, err)  | 
 | 126 | +		assert.NotNil(t, auth)  | 
 | 127 | +		assert.NotNil(t, auth.provider)  | 
 | 128 | +		assert.NotNil(t, auth.httpClient)  | 
 | 129 | +	})  | 
 | 130 | + | 
 | 131 | +	t.Run("OIDCStatesCache", func(t *testing.T) {  | 
 | 132 | +		cfg := mockConfig(TypeOIDC, t)  | 
 | 133 | +		logger := hclog.NewNullLogger()  | 
 | 134 | +		auth, err := New(cfg, logger)  | 
 | 135 | +		assert.NoError(t, err)  | 
 | 136 | +		assert.NotNil(t, auth.oidcStates)  | 
 | 137 | +		auth.oidcStates.Set("state", "value", cache.DefaultExpiration)  | 
 | 138 | +		val, found := auth.oidcStates.Get("state")  | 
 | 139 | +		assert.True(t, found)  | 
 | 140 | +		assert.Equal(t, "value", val)  | 
 | 141 | +	})  | 
 | 142 | +}  | 
 | 143 | + | 
 | 144 | +func TestAuthenticator_OIDCFlow_Failure(t *testing.T) {  | 
 | 145 | +	t.Run("InvalidCACert", func(t *testing.T) {  | 
 | 146 | +		cfg := mockConfig(TypeOIDC, t)  | 
 | 147 | +		cfg.OIDCDiscoveryCACert = "invalid cert data"  | 
 | 148 | + | 
 | 149 | +		logger := hclog.NewNullLogger()  | 
 | 150 | +		_, err := New(cfg, logger)  | 
 | 151 | + | 
 | 152 | +		assert.Error(t, err)  | 
 | 153 | +		requireErrorContains(t, err, "could not parse CA PEM value successfully")  | 
 | 154 | +	})  | 
 | 155 | + | 
 | 156 | +	t.Run("ProviderConfig_error", func(t *testing.T) {  | 
 | 157 | +		cfg := mockConfig(TypeOIDC, t)  | 
 | 158 | +		cfg.OIDCDiscoveryURL = "::invalid-url::"  | 
 | 159 | + | 
 | 160 | +		logger := hclog.NewNullLogger()  | 
 | 161 | +		_, err := New(cfg, logger)  | 
 | 162 | + | 
 | 163 | +		assert.Error(t, err)  | 
 | 164 | +		requireErrorContains(t, err, "error checking OIDCDiscoveryURL")  | 
 | 165 | +	})  | 
 | 166 | +}  | 
0 commit comments