Skip to content

Commit

Permalink
test: add test for DecodeIDToken
Browse files Browse the repository at this point in the history
  • Loading branch information
hijiki51 committed Mar 23, 2024
1 parent 16d2b5c commit 49ad669
Show file tree
Hide file tree
Showing 2 changed files with 86 additions and 0 deletions.
85 changes: 85 additions & 0 deletions handler/openid/strategy_jwt_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,8 +10,10 @@ import (
"time"

"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"

"github.com/ory/fosite"
"github.com/ory/fosite/internal/gen"
"github.com/ory/fosite/token/jwt"
)

Expand Down Expand Up @@ -283,3 +285,86 @@ func TestJWTStrategy_GenerateIDToken(t *testing.T) {
})
}
}

func TestJWTStrategy_DecodeIDToken(t *testing.T) {
var j = &DefaultStrategy{
Signer: &jwt.DefaultSigner{
GetPrivateKey: func(_ context.Context) (interface{}, error) {
return key, nil
}},
Config: &fosite.Config{
MinParameterEntropy: fosite.MinParameterEntropy,
},
}

var anotherKey = gen.MustRSAKey()

var genIDToken = func(c jwt.IDTokenClaims) string {
s, _, err := j.Generate(context.TODO(), c.ToMapClaims(), jwt.NewHeaders())
require.NoError(t, err)
return s
}

var token string
var decoder *DefaultStrategy
for k, c := range []struct {
description string
setup func()
expectErr bool
}{
{
description: "should pass with valid token",
setup: func() {
token = genIDToken(jwt.IDTokenClaims{
Subject: "peter",
RequestedAt: time.Now(),
ExpiresAt: time.Now().Add(time.Hour),
})
decoder = j
},
expectErr: false,
},
{
description: "should pass even though token is expired",
setup: func() {
token = genIDToken(jwt.IDTokenClaims{
Subject: "peter",
RequestedAt: time.Now(),
ExpiresAt: time.Now().Add(-time.Hour),
})
decoder = j
},
expectErr: false,
},
{
description: "should fail because token is decoded with wrong key",
setup: func() {
token = genIDToken(jwt.IDTokenClaims{
Subject: "peter",
RequestedAt: time.Now(),
ExpiresAt: time.Now().Add(time.Hour),
})
decoder = &DefaultStrategy{
Signer: &jwt.DefaultSigner{
GetPrivateKey: func(_ context.Context) (interface{}, error) {
return anotherKey, nil
}},
Config: &fosite.Config{
MinParameterEntropy: fosite.MinParameterEntropy,
},
}
},
expectErr: true,
},
} {
t.Run(fmt.Sprintf("case=%d/description=%s", k, c.description), func(t *testing.T) {
c.setup()
req := fosite.NewAccessRequest(&DefaultSession{})
idtoken, err := decoder.DecodeIDToken(context.Background(), req, token)
assert.Equal(t, c.expectErr, err != nil, "%d: %+v", k, err)
if !c.expectErr {
assert.NotNil(t, idtoken)
}
})
}
}
1 change: 1 addition & 0 deletions internal/id_token_strategy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 49ad669

Please sign in to comment.