testutil: simplefy usage
This commit is contained in:
parent
2b6c709ce7
commit
944fbd7c5b
4 changed files with 92 additions and 99 deletions
|
@ -4,8 +4,6 @@ package testutil
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"crypto/rand"
|
|
||||||
"crypto/rsa"
|
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"time"
|
"time"
|
||||||
|
@ -14,40 +12,45 @@ import (
|
||||||
"gopkg.in/square/go-jose.v2"
|
"gopkg.in/square/go-jose.v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
const SignatureAlgorithm = jose.PS512
|
// KeySet implements oidc.Keys
|
||||||
|
type KeySet struct{}
|
||||||
|
|
||||||
// KeySet implements oidc.Keys and
|
// VerifySignature implments op.KeySet.
|
||||||
// additionally can create tokens and claims that can
|
func (KeySet) VerifySignature(ctx context.Context, jws *jose.JSONWebSignature) (payload []byte, err error) {
|
||||||
// be validated by this KeySet.
|
if ctx.Err() != nil {
|
||||||
type KeySet struct {
|
return nil, err
|
||||||
Private *rsa.PrivateKey
|
}
|
||||||
Public *rsa.PublicKey
|
|
||||||
|
|
||||||
|
return jws.Verify(WebKey.Public())
|
||||||
|
}
|
||||||
|
|
||||||
|
// use a reproducible signing key
|
||||||
|
const webkeyJSON = `{"kty":"RSA","kid":"1","alg":"PS512","n":"x6JoG8t2Li68JSwPwnh51TvHYFf3z72tQ3wmJG3VosU6MdJF0gSTCIwflOJ38OWE6hYtN1WAeyBy2CYdnXd1QZzkK_apGK4M7hsNA9jCTg8NOZjLPL0ww1jp7313Skla7mbm90uNdg4TUNp2n_r-sCYywI-9cfSlhzLSksxKK_BRdzy6xW20daAcI-mErQXIcvdYIguunJk_uTb8kJedsWMcQ4Mb57QujUok2Z2YabWyb9Fi1_StixXJvd_WEu93SHNMORB0u6ymnO3aZJdATLdhtcP-qsVicQhffpqVazmZQPf7K-7n4I5vJE4g9XXzZ2dSKSp3Ewe_nna_2kvbCw","e":"AQAB","d":"sl3F_QeF2O-CxQegMRYpbL6Tfd47GM6VDxXOkn_cACmNvFPudB4ILPvdf830cjTv06Lq1WS8fcZZNgygK0A_cNc3-pvRK67e-KMMtuIlgU7rdwmwlN1Iw1Ee-w6z1ZjC-PzR4iQMCW28DmKS2I-OnV4TvH7xOe7nMmvTPrvujV__YKfUxvAWXJG7_wtaJBGplezn5nNsKG2Ot9h0mhMdYUgGC36wLxo3Q5d4m79EXQYdhm89EfxogwvMmHRes5PNpHRuDZRHGAI4RZi2KvgmqF07e1Qdq4TqbQnY5pCYrdjqvEFFjGC6jTE-ak_b21FcSVy-9aZHyf04U4g5-cIUEQ","p":"7AaicFryJCHRekdSkx8tfPxaSiyEuN8jhP9cLqs4rLkIbrSHmanPhjnLe-Tlh3icQ8hPoy6WC8ktLwsrzbfGIh4U_zgAfvtD1Y_lZM-YSWZsxqlrGiI5do11iVzzoy4a1XdkgOjHQz9y6J-uoA9jY8ILG7VaEZQnaYwWZV3cspk","q":"2Ide9hlwthXJQJYqI0mibM5BiGBxJ4CafPmF1DYNXggBCczZ6ERGReNTGM_AEhy5mvLXUH6uBSOJlfHTYzx49C1GgIO3hEWVEGAKAytVRL6RfAkVSOXMQUp-HjXKpGg_Nx1SJxQf3rulbW8HXO4KqIlloyIXpPQSK7jB8A4hJUM","dp":"1nmc6F4sRNsaQHRJO_mL21RxM4_KtzfFThjCCoJ6iLHHUNnpkp_1PTKNjrLMRFM8JHgErfMqU-FmlqYfEtvZRq1xRQ39nWX0GT-eIwJljuVtGQVglqnc77bRxJXbqz-9EJdik6VzVM92Op7IDxiMp1zvvSkJhInNWqL6wvgNEZk","dq":"dlHizlAwiw90ndpwxD-khhhfLwqkSpW31br0KnYu78cn6hcKrCVC0UXbTp-XsU4JDmbMyauvpBc7Q7iVbpDI94UWFXvkeF8diYkxb3HqclpAXasI-oC4EKWILTHvvc9JW_Clx7zzfV7Ekvws5dcd8-LAq1gh232TwFiBgY_3BMk","qi":"E1k_9W3odXgcmIP2PCJztE7hB7jeuAL1ElAY88VJBBPY670uwOEjKL2VfQuz9q9IjzLAvcgf7vS9blw2RHP_XqHqSOlJWGwvMQTF0Q8zLknCgKt8q7HQQNWIJcBZ8qdUVn02-qf4E3tgZ3JHaHNs8imA_L-__WoUmzC4z5jH_lM"}`
|
||||||
|
|
||||||
|
const SignatureAlgorithm = jose.RS256
|
||||||
|
|
||||||
|
var (
|
||||||
|
WebKey jose.JSONWebKey
|
||||||
Signer jose.Signer
|
Signer jose.Signer
|
||||||
}
|
)
|
||||||
|
|
||||||
func NewKeySet() *KeySet {
|
func init() {
|
||||||
privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
|
err := json.Unmarshal([]byte(webkeyJSON), &WebKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
signer, err := jose.NewSigner(jose.SigningKey{Algorithm: SignatureAlgorithm, Key: privateKey}, nil)
|
Signer, err = jose.NewSigner(jose.SigningKey{Algorithm: SignatureAlgorithm, Key: WebKey}, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
return &KeySet{
|
|
||||||
Private: privateKey,
|
|
||||||
Public: &privateKey.PublicKey,
|
|
||||||
Signer: signer,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k *KeySet) signEncodeTokenClaims(claims any) string {
|
func signEncodeTokenClaims(claims any) string {
|
||||||
payload, err := json.Marshal(claims)
|
payload, err := json.Marshal(claims)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
object, err := k.Signer.Sign(payload)
|
object, err := Signer.Sign(payload)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
@ -70,11 +73,27 @@ func claimsMap(claims any) map[string]any {
|
||||||
return dst
|
return dst
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewIDToken creates a new IDTokenClaims with passed data and returns a signed token and claims.
|
func NewIDTokenCustom(issuer, subject string, audience []string, expiration, authTime time.Time, nonce string, acr string, amr []string, clientID string, skew time.Duration, atHash string, custom map[string]any) (string, *oidc.IDTokenClaims) {
|
||||||
func (k *KeySet) NewIDToken(issuer, subject string, audience []string, expiration, authTime time.Time, nonce string, acr string, amr []string, clientID string, skew time.Duration, atHash string) (string, *oidc.IDTokenClaims) {
|
|
||||||
claims := oidc.NewIDTokenClaims(issuer, subject, audience, expiration, authTime, nonce, acr, amr, clientID, skew)
|
claims := oidc.NewIDTokenClaims(issuer, subject, audience, expiration, authTime, nonce, acr, amr, clientID, skew)
|
||||||
claims.AccessTokenHash = atHash
|
claims.AccessTokenHash = atHash
|
||||||
token := k.signEncodeTokenClaims(claims)
|
claims.Claims = custom
|
||||||
|
token := signEncodeTokenClaims(claims)
|
||||||
|
|
||||||
|
// set this so that assertion in tests will work
|
||||||
|
claims.SignatureAlg = SignatureAlgorithm
|
||||||
|
claims.Claims = claimsMap(claims)
|
||||||
|
return token, claims
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewIDToken creates a new IDTokenClaims with passed data and returns a signed token and claims.
|
||||||
|
func NewIDToken(issuer, subject string, audience []string, expiration, authTime time.Time, nonce string, acr string, amr []string, clientID string, skew time.Duration, atHash string) (string, *oidc.IDTokenClaims) {
|
||||||
|
return NewIDTokenCustom(issuer, subject, audience, expiration, authTime, nonce, acr, amr, clientID, skew, atHash, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAccessTokenCustom(issuer, subject string, audience []string, expiration time.Time, jwtid, clientID string, skew time.Duration, custom map[string]any) (string, *oidc.AccessTokenClaims) {
|
||||||
|
claims := oidc.NewAccessTokenClaims(issuer, subject, audience, expiration, jwtid, clientID, skew)
|
||||||
|
claims.Claims = custom
|
||||||
|
token := signEncodeTokenClaims(claims)
|
||||||
|
|
||||||
// set this so that assertion in tests will work
|
// set this so that assertion in tests will work
|
||||||
claims.SignatureAlg = SignatureAlgorithm
|
claims.SignatureAlg = SignatureAlgorithm
|
||||||
|
@ -83,20 +102,13 @@ func (k *KeySet) NewIDToken(issuer, subject string, audience []string, expiratio
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewAcccessToken creates a new AccessTokenClaims with passed data and returns a signed token and claims.
|
// NewAcccessToken creates a new AccessTokenClaims with passed data and returns a signed token and claims.
|
||||||
func (k *KeySet) NewAccessToken(issuer, subject string, audience []string, expiration time.Time, jwtid, clientID string, skew time.Duration) (string, *oidc.AccessTokenClaims) {
|
func NewAccessToken(issuer, subject string, audience []string, expiration time.Time, jwtid, clientID string, skew time.Duration) (string, *oidc.AccessTokenClaims) {
|
||||||
claims := oidc.NewAccessTokenClaims(issuer, subject, audience, expiration, jwtid, clientID, skew)
|
return NewAccessTokenCustom(issuer, subject, audience, expiration, jwtid, clientID, skew, nil)
|
||||||
token := k.signEncodeTokenClaims(claims)
|
|
||||||
|
|
||||||
// set this so that assertion in tests will work
|
|
||||||
claims.SignatureAlg = SignatureAlgorithm
|
|
||||||
claims.Claims = claimsMap(claims)
|
|
||||||
return token, claims
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const InvalidSignatureToken = `eyJhbGciOiJQUzUxMiJ9.eyJpc3MiOiJsb2NhbC5jb20iLCJzdWIiOiJ0aW1AbG9jYWwuY29tIiwiYXVkIjpbInVuaXQiLCJ0ZXN0IiwiNTU1NjY2Il0sImV4cCI6MTY3Nzg0MDQzMSwiaWF0IjoxNjc3ODQwMzcwLCJhdXRoX3RpbWUiOjE2Nzc4NDAzMTAsIm5vbmNlIjoiMTIzNDUiLCJhY3IiOiJzb21ldGhpbmciLCJhbXIiOlsiZm9vIiwiYmFyIl0sImF6cCI6IjU1NTY2NiJ9.DtZmvVkuE4Hw48ijBMhRJbxEWCr_WEYuPQBMY73J9TP6MmfeNFkjVJf4nh4omjB9gVLnQ-xhEkNOe62FS5P0BB2VOxPuHZUj34dNspCgG3h98fGxyiMb5vlIYAHDF9T-w_LntlYItohv63MmdYR-hPpAqjXE7KOfErf-wUDGE9R3bfiQ4HpTdyFJB1nsToYrZ9lhP2mzjTCTs58ckZfQ28DFHn_lfHWpR4rJBgvLx7IH4rMrUayr09Ap-PxQLbv0lYMtmgG1z3JK8MXnuYR0UJdZnEIezOzUTlThhCXB-nvuAXYjYxZZTR0FtlgZUHhIpYK0V2abf_Q_Or36akNCUg`
|
const InvalidSignatureToken = `eyJhbGciOiJQUzUxMiJ9.eyJpc3MiOiJsb2NhbC5jb20iLCJzdWIiOiJ0aW1AbG9jYWwuY29tIiwiYXVkIjpbInVuaXQiLCJ0ZXN0IiwiNTU1NjY2Il0sImV4cCI6MTY3Nzg0MDQzMSwiaWF0IjoxNjc3ODQwMzcwLCJhdXRoX3RpbWUiOjE2Nzc4NDAzMTAsIm5vbmNlIjoiMTIzNDUiLCJhY3IiOiJzb21ldGhpbmciLCJhbXIiOlsiZm9vIiwiYmFyIl0sImF6cCI6IjU1NTY2NiJ9.DtZmvVkuE4Hw48ijBMhRJbxEWCr_WEYuPQBMY73J9TP6MmfeNFkjVJf4nh4omjB9gVLnQ-xhEkNOe62FS5P0BB2VOxPuHZUj34dNspCgG3h98fGxyiMb5vlIYAHDF9T-w_LntlYItohv63MmdYR-hPpAqjXE7KOfErf-wUDGE9R3bfiQ4HpTdyFJB1nsToYrZ9lhP2mzjTCTs58ckZfQ28DFHn_lfHWpR4rJBgvLx7IH4rMrUayr09Ap-PxQLbv0lYMtmgG1z3JK8MXnuYR0UJdZnEIezOzUTlThhCXB-nvuAXYjYxZZTR0FtlgZUHhIpYK0V2abf_Q_Or36akNCUg`
|
||||||
|
|
||||||
// These variables always result in a valid token
|
// These variables always result in a valid token
|
||||||
// for the same test run.
|
|
||||||
var (
|
var (
|
||||||
ValidIssuer = "local.com"
|
ValidIssuer = "local.com"
|
||||||
ValidSubject = "tim@local.com"
|
ValidSubject = "tim@local.com"
|
||||||
|
@ -112,26 +124,17 @@ var (
|
||||||
)
|
)
|
||||||
|
|
||||||
// ValidIDToken returns a token and claims that are in the token.
|
// ValidIDToken returns a token and claims that are in the token.
|
||||||
// It uses the Valid* global variables and the token always passes
|
// It uses the Valid* global variables and the token will always
|
||||||
// verification within the same test run.
|
// pass verification.
|
||||||
func (k *KeySet) ValidIDToken() (string, *oidc.IDTokenClaims) {
|
func ValidIDToken() (string, *oidc.IDTokenClaims) {
|
||||||
return k.NewIDToken(ValidIssuer, ValidSubject, ValidAudience, ValidExpiration, ValidAuthTime, ValidNonce, ValidACR, ValidAMR, ValidClientID, ValidSkew, "")
|
return NewIDToken(ValidIssuer, ValidSubject, ValidAudience, ValidExpiration, ValidAuthTime, ValidNonce, ValidACR, ValidAMR, ValidClientID, ValidSkew, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
// ValidAccessToken returns a token and claims that are in the token.
|
// ValidAccessToken returns a token and claims that are in the token.
|
||||||
// It uses the Valid* global variables and the token always passes
|
// It uses the Valid* global variables and the token always passes
|
||||||
// verification within the same test run.
|
// verification within the same test run.
|
||||||
func (k *KeySet) ValidAccessToken() (string, *oidc.AccessTokenClaims) {
|
func ValidAccessToken() (string, *oidc.AccessTokenClaims) {
|
||||||
return k.NewAccessToken(ValidIssuer, ValidSubject, ValidAudience, ValidExpiration, ValidJWTID, ValidClientID, ValidSkew)
|
return NewAccessToken(ValidIssuer, ValidSubject, ValidAudience, ValidExpiration, ValidJWTID, ValidClientID, ValidSkew)
|
||||||
}
|
|
||||||
|
|
||||||
// VerifySignature implments op.KeySet.
|
|
||||||
func (k *KeySet) VerifySignature(ctx context.Context, jws *jose.JSONWebSignature) (payload []byte, err error) {
|
|
||||||
if ctx.Err() != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return jws.Verify(k.Public)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ACRVerify is a oidc.ACRVerifier func.
|
// ACRVerify is a oidc.ACRVerifier func.
|
||||||
|
|
|
@ -13,19 +13,18 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestVerifyTokens(t *testing.T) {
|
func TestVerifyTokens(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
verifier := &idTokenVerifier{
|
verifier := &idTokenVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
maxAgeIAT: 2 * time.Minute,
|
maxAgeIAT: 2 * time.Minute,
|
||||||
offset: time.Second,
|
offset: time.Second,
|
||||||
supportedSignAlgs: []string{string(jose.PS512)},
|
supportedSignAlgs: []string{string(tu.SignatureAlgorithm)},
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
maxAge: 2 * time.Minute,
|
maxAge: 2 * time.Minute,
|
||||||
acr: tu.ACRVerify,
|
acr: tu.ACRVerify,
|
||||||
nonce: func(context.Context) string { return tu.ValidNonce },
|
nonce: func(context.Context) string { return tu.ValidNonce },
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
}
|
}
|
||||||
accessToken, _ := keySet.ValidAccessToken()
|
accessToken, _ := tu.ValidAccessToken()
|
||||||
atHash, err := oidc.ClaimHash(accessToken, tu.SignatureAlgorithm)
|
atHash, err := oidc.ClaimHash(accessToken, tu.SignatureAlgorithm)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
@ -37,13 +36,13 @@ func TestVerifyTokens(t *testing.T) {
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "without access token",
|
name: "without access token",
|
||||||
idTokenClaims: keySet.ValidIDToken,
|
idTokenClaims: tu.ValidIDToken,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "with access token",
|
name: "with access token",
|
||||||
accessToken: accessToken,
|
accessToken: accessToken,
|
||||||
idTokenClaims: func() (string, *oidc.IDTokenClaims) {
|
idTokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, atHash,
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, atHash,
|
||||||
|
@ -54,7 +53,7 @@ func TestVerifyTokens(t *testing.T) {
|
||||||
name: "expired id token",
|
name: "expired id token",
|
||||||
accessToken: accessToken,
|
accessToken: accessToken,
|
||||||
idTokenClaims: func() (string, *oidc.IDTokenClaims) {
|
idTokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration.Add(-time.Hour), tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration.Add(-time.Hour), tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, atHash,
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, atHash,
|
||||||
|
@ -66,7 +65,7 @@ func TestVerifyTokens(t *testing.T) {
|
||||||
name: "wronf access token",
|
name: "wronf access token",
|
||||||
accessToken: accessToken,
|
accessToken: accessToken,
|
||||||
idTokenClaims: func() (string, *oidc.IDTokenClaims) {
|
idTokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "~~~",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "~~~",
|
||||||
|
@ -92,13 +91,12 @@ func TestVerifyTokens(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestVerifyIDToken(t *testing.T) {
|
func TestVerifyIDToken(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
verifier := &idTokenVerifier{
|
verifier := &idTokenVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
maxAgeIAT: 2 * time.Minute,
|
maxAgeIAT: 2 * time.Minute,
|
||||||
offset: time.Second,
|
offset: time.Second,
|
||||||
supportedSignAlgs: []string{string(jose.PS512)},
|
supportedSignAlgs: []string{string(tu.SignatureAlgorithm)},
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
maxAge: 2 * time.Minute,
|
maxAge: 2 * time.Minute,
|
||||||
acr: tu.ACRVerify,
|
acr: tu.ACRVerify,
|
||||||
nonce: func(context.Context) string { return tu.ValidNonce },
|
nonce: func(context.Context) string { return tu.ValidNonce },
|
||||||
|
@ -113,7 +111,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "success",
|
name: "success",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: keySet.ValidIDToken,
|
tokenClaims: tu.ValidIDToken,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "parse err",
|
name: "parse err",
|
||||||
|
@ -131,7 +129,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
name: "empty subject",
|
name: "empty subject",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, "", tu.ValidAudience,
|
tu.ValidIssuer, "", tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -143,7 +141,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
name: "wrong issuer",
|
name: "wrong issuer",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
"foo", tu.ValidSubject, tu.ValidAudience,
|
"foo", tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -154,14 +152,14 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "wrong clientID",
|
name: "wrong clientID",
|
||||||
clientID: "foo",
|
clientID: "foo",
|
||||||
tokenClaims: keySet.ValidIDToken,
|
tokenClaims: tu.ValidIDToken,
|
||||||
wantErr: true,
|
wantErr: true,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "expired",
|
name: "expired",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration.Add(-time.Hour), tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration.Add(-time.Hour), tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -173,7 +171,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
name: "wrong IAT",
|
name: "wrong IAT",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, -time.Hour, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, -time.Hour, "",
|
||||||
|
@ -185,7 +183,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
name: "wrong acr",
|
name: "wrong acr",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
"else", tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
"else", tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -197,7 +195,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
name: "expired auth",
|
name: "expired auth",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime.Add(-time.Hour), tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime.Add(-time.Hour), tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -209,7 +207,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
name: "wrong nonce",
|
name: "wrong nonce",
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, "foo",
|
tu.ValidExpiration, tu.ValidAuthTime, "foo",
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -236,8 +234,7 @@ func TestVerifyIDToken(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestVerifyAccessToken(t *testing.T) {
|
func TestVerifyAccessToken(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
token, _ := tu.ValidAccessToken()
|
||||||
token, _ := keySet.ValidAccessToken()
|
|
||||||
hash, err := oidc.ClaimHash(token, tu.SignatureAlgorithm)
|
hash, err := oidc.ClaimHash(token, tu.SignatureAlgorithm)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
@ -294,7 +291,6 @@ func TestVerifyAccessToken(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestNewIDTokenVerifier(t *testing.T) {
|
func TestNewIDTokenVerifier(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
type args struct {
|
type args struct {
|
||||||
issuer string
|
issuer string
|
||||||
clientID string
|
clientID string
|
||||||
|
@ -311,7 +307,7 @@ func TestNewIDTokenVerifier(t *testing.T) {
|
||||||
args: args{
|
args: args{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
options: []VerifierOption{
|
options: []VerifierOption{
|
||||||
WithIssuedAtOffset(time.Minute),
|
WithIssuedAtOffset(time.Minute),
|
||||||
//WithIssuedAtMaxAge(time.Hour),
|
//WithIssuedAtMaxAge(time.Hour),
|
||||||
|
@ -326,7 +322,7 @@ func TestNewIDTokenVerifier(t *testing.T) {
|
||||||
offset: time.Minute,
|
offset: time.Minute,
|
||||||
//maxAgeIAT: time.Hour, // Maybe BUG?
|
//maxAgeIAT: time.Hour, // Maybe BUG?
|
||||||
clientID: tu.ValidClientID,
|
clientID: tu.ValidClientID,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
nonce: nil,
|
nonce: nil,
|
||||||
acr: nil,
|
acr: nil,
|
||||||
maxAge: 2 * time.Hour,
|
maxAge: 2 * time.Hour,
|
||||||
|
|
|
@ -9,11 +9,9 @@ import (
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
tu "github.com/zitadel/oidc/v2/internal/testutil"
|
tu "github.com/zitadel/oidc/v2/internal/testutil"
|
||||||
"github.com/zitadel/oidc/v2/pkg/oidc"
|
"github.com/zitadel/oidc/v2/pkg/oidc"
|
||||||
"gopkg.in/square/go-jose.v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNewAccessTokenVerifier(t *testing.T) {
|
func TestNewAccessTokenVerifier(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
type args struct {
|
type args struct {
|
||||||
issuer string
|
issuer string
|
||||||
keySet oidc.KeySet
|
keySet oidc.KeySet
|
||||||
|
@ -28,25 +26,25 @@ func TestNewAccessTokenVerifier(t *testing.T) {
|
||||||
name: "simple",
|
name: "simple",
|
||||||
args: args{
|
args: args{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
},
|
},
|
||||||
want: &accessTokenVerifier{
|
want: &accessTokenVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "with signature algorithm",
|
name: "with signature algorithm",
|
||||||
args: args{
|
args: args{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
opts: []AccessTokenVerifierOpt{
|
opts: []AccessTokenVerifierOpt{
|
||||||
WithSupportedAccessTokenSigningAlgorithms("ABC", "DEF"),
|
WithSupportedAccessTokenSigningAlgorithms("ABC", "DEF"),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
want: &accessTokenVerifier{
|
want: &accessTokenVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
supportedSignAlgs: []string{"ABC", "DEF"},
|
supportedSignAlgs: []string{"ABC", "DEF"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -60,13 +58,12 @@ func TestNewAccessTokenVerifier(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestVerifyAccessToken(t *testing.T) {
|
func TestVerifyAccessToken(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
verifier := &accessTokenVerifier{
|
verifier := &accessTokenVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
maxAgeIAT: 2 * time.Minute,
|
maxAgeIAT: 2 * time.Minute,
|
||||||
offset: time.Second,
|
offset: time.Second,
|
||||||
supportedSignAlgs: []string{string(jose.PS512)},
|
supportedSignAlgs: []string{string(tu.SignatureAlgorithm)},
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
}
|
}
|
||||||
|
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
|
@ -76,7 +73,7 @@ func TestVerifyAccessToken(t *testing.T) {
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "success",
|
name: "success",
|
||||||
tokenClaims: keySet.ValidAccessToken,
|
tokenClaims: tu.ValidAccessToken,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "parse err",
|
name: "parse err",
|
||||||
|
@ -91,7 +88,7 @@ func TestVerifyAccessToken(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "wrong issuer",
|
name: "wrong issuer",
|
||||||
tokenClaims: func() (string, *oidc.AccessTokenClaims) {
|
tokenClaims: func() (string, *oidc.AccessTokenClaims) {
|
||||||
return keySet.NewAccessToken(
|
return tu.NewAccessToken(
|
||||||
"foo", tu.ValidSubject, tu.ValidAudience,
|
"foo", tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidJWTID, tu.ValidClientID,
|
tu.ValidExpiration, tu.ValidJWTID, tu.ValidClientID,
|
||||||
tu.ValidSkew,
|
tu.ValidSkew,
|
||||||
|
@ -102,7 +99,7 @@ func TestVerifyAccessToken(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "expired",
|
name: "expired",
|
||||||
tokenClaims: func() (string, *oidc.AccessTokenClaims) {
|
tokenClaims: func() (string, *oidc.AccessTokenClaims) {
|
||||||
return keySet.NewAccessToken(
|
return tu.NewAccessToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration.Add(-time.Hour), tu.ValidJWTID, tu.ValidClientID,
|
tu.ValidExpiration.Add(-time.Hour), tu.ValidJWTID, tu.ValidClientID,
|
||||||
tu.ValidSkew,
|
tu.ValidSkew,
|
||||||
|
|
|
@ -9,11 +9,9 @@ import (
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
tu "github.com/zitadel/oidc/v2/internal/testutil"
|
tu "github.com/zitadel/oidc/v2/internal/testutil"
|
||||||
"github.com/zitadel/oidc/v2/pkg/oidc"
|
"github.com/zitadel/oidc/v2/pkg/oidc"
|
||||||
"gopkg.in/square/go-jose.v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNewIDTokenHintVerifier(t *testing.T) {
|
func TestNewIDTokenHintVerifier(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
type args struct {
|
type args struct {
|
||||||
issuer string
|
issuer string
|
||||||
keySet oidc.KeySet
|
keySet oidc.KeySet
|
||||||
|
@ -28,25 +26,25 @@ func TestNewIDTokenHintVerifier(t *testing.T) {
|
||||||
name: "simple",
|
name: "simple",
|
||||||
args: args{
|
args: args{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
},
|
},
|
||||||
want: &idTokenHintVerifier{
|
want: &idTokenHintVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "with signature algorithm",
|
name: "with signature algorithm",
|
||||||
args: args{
|
args: args{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
opts: []IDTokenHintVerifierOpt{
|
opts: []IDTokenHintVerifierOpt{
|
||||||
WithSupportedIDTokenHintSigningAlgorithms("ABC", "DEF"),
|
WithSupportedIDTokenHintSigningAlgorithms("ABC", "DEF"),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
want: &idTokenHintVerifier{
|
want: &idTokenHintVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
supportedSignAlgs: []string{"ABC", "DEF"},
|
supportedSignAlgs: []string{"ABC", "DEF"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -60,15 +58,14 @@ func TestNewIDTokenHintVerifier(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestVerifyIDTokenHint(t *testing.T) {
|
func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
keySet := tu.NewKeySet()
|
|
||||||
verifier := &idTokenHintVerifier{
|
verifier := &idTokenHintVerifier{
|
||||||
issuer: tu.ValidIssuer,
|
issuer: tu.ValidIssuer,
|
||||||
maxAgeIAT: 2 * time.Minute,
|
maxAgeIAT: 2 * time.Minute,
|
||||||
offset: time.Second,
|
offset: time.Second,
|
||||||
supportedSignAlgs: []string{string(jose.PS512)},
|
supportedSignAlgs: []string{string(tu.SignatureAlgorithm)},
|
||||||
maxAge: 2 * time.Minute,
|
maxAge: 2 * time.Minute,
|
||||||
acr: tu.ACRVerify,
|
acr: tu.ACRVerify,
|
||||||
keySet: keySet,
|
keySet: tu.KeySet{},
|
||||||
}
|
}
|
||||||
|
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
|
@ -78,7 +75,7 @@ func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "success",
|
name: "success",
|
||||||
tokenClaims: keySet.ValidIDToken,
|
tokenClaims: tu.ValidIDToken,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "parse err",
|
name: "parse err",
|
||||||
|
@ -93,7 +90,7 @@ func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "wrong issuer",
|
name: "wrong issuer",
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
"foo", tu.ValidSubject, tu.ValidAudience,
|
"foo", tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -104,7 +101,7 @@ func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "expired",
|
name: "expired",
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration.Add(-time.Hour), tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration.Add(-time.Hour), tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -115,7 +112,7 @@ func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "wrong IAT",
|
name: "wrong IAT",
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, -time.Hour, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, -time.Hour, "",
|
||||||
|
@ -126,7 +123,7 @@ func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "wrong acr",
|
name: "wrong acr",
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime, tu.ValidNonce,
|
||||||
"else", tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
"else", tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
@ -137,7 +134,7 @@ func TestVerifyIDTokenHint(t *testing.T) {
|
||||||
{
|
{
|
||||||
name: "expired auth",
|
name: "expired auth",
|
||||||
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
tokenClaims: func() (string, *oidc.IDTokenClaims) {
|
||||||
return keySet.NewIDToken(
|
return tu.NewIDToken(
|
||||||
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
tu.ValidIssuer, tu.ValidSubject, tu.ValidAudience,
|
||||||
tu.ValidExpiration, tu.ValidAuthTime.Add(-time.Hour), tu.ValidNonce,
|
tu.ValidExpiration, tu.ValidAuthTime.Add(-time.Hour), tu.ValidNonce,
|
||||||
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
tu.ValidACR, tu.ValidAMR, tu.ValidClientID, tu.ValidSkew, "",
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue