chore(op): add test for PKCE verification
This commit is contained in:
parent
f8c3a2c6aa
commit
6e7d3a2d81
2 changed files with 77 additions and 2 deletions
|
@ -141,10 +141,10 @@ func AuthorizeCodeChallenge(codeVerifier string, challenge *oidc.CodeChallenge)
|
|||
}
|
||||
|
||||
if codeVerifier == "" {
|
||||
return oidc.ErrInvalidRequest().WithDescription("code_challenge required")
|
||||
return oidc.ErrInvalidRequest().WithDescription("code_verifier required")
|
||||
}
|
||||
if !oidc.VerifyCodeChallenge(challenge, codeVerifier) {
|
||||
return oidc.ErrInvalidGrant().WithDescription("invalid code challenge")
|
||||
return oidc.ErrInvalidGrant().WithDescription("invalid code_verifier")
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
|
75
pkg/op/token_request_test.go
Normal file
75
pkg/op/token_request_test.go
Normal file
|
@ -0,0 +1,75 @@
|
|||
package op_test
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/zitadel/oidc/v3/pkg/oidc"
|
||||
"github.com/zitadel/oidc/v3/pkg/op"
|
||||
)
|
||||
|
||||
func TestAuthorizeCodeChallenge(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
codeVerifier string
|
||||
codeChallenge *oidc.CodeChallenge
|
||||
want func(t *testing.T, err error)
|
||||
}{
|
||||
{
|
||||
name: "missing both code_verifier and code_challenge",
|
||||
codeVerifier: "",
|
||||
codeChallenge: nil,
|
||||
want: func(t *testing.T, err error) {
|
||||
assert.Nil(t, err)
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "valid code_verifier",
|
||||
codeVerifier: "Hello World!",
|
||||
codeChallenge: &oidc.CodeChallenge{
|
||||
Challenge: "f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk",
|
||||
Method: oidc.CodeChallengeMethodS256,
|
||||
},
|
||||
want: func(t *testing.T, err error) {
|
||||
assert.Nil(t, err)
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "invalid code_verifier",
|
||||
codeVerifier: "Hi World!",
|
||||
codeChallenge: &oidc.CodeChallenge{
|
||||
Challenge: "f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk",
|
||||
Method: oidc.CodeChallengeMethodS256,
|
||||
},
|
||||
want: func(t *testing.T, err error) {
|
||||
assert.ErrorContains(t, err, "invalid code_verifier")
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "code_verifier provided without code_challenge",
|
||||
codeVerifier: "code_verifier",
|
||||
codeChallenge: nil,
|
||||
want: func(t *testing.T, err error) {
|
||||
assert.ErrorContains(t, err, "code_verifier unexpectedly provided")
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "empty code_verifier",
|
||||
codeVerifier: "",
|
||||
codeChallenge: &oidc.CodeChallenge{
|
||||
Challenge: "f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk",
|
||||
Method: oidc.CodeChallengeMethodS256,
|
||||
},
|
||||
want: func(t *testing.T, err error) {
|
||||
assert.ErrorContains(t, err, "code_verifier required")
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
err := op.AuthorizeCodeChallenge(tt.codeVerifier, tt.codeChallenge)
|
||||
|
||||
tt.want(t, err)
|
||||
})
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue