jwt-authorizer/jwt-authorizer/tests/tests.rs

284 lines
9.8 KiB
Rust

mod common;
#[cfg(test)]
mod tests {
use axum::{
body::Body,
http::{Request, StatusCode},
response::Response,
routing::get,
Router,
};
use http::{header, HeaderValue};
use jwt_authorizer::{validation::Validation, JwtAuthorizer, JwtClaims};
use serde::Deserialize;
use tower::ServiceExt;
use crate::common;
#[derive(Debug, Deserialize, Clone)]
struct User {
sub: String,
}
async fn app(jwt_auth: JwtAuthorizer<User>) -> Router {
Router::new().route("/public", get(|| async { "hello" })).route(
"/protected",
get(|JwtClaims(user): JwtClaims<User>| async move { format!("hello: {}", user.sub) })
.layer(jwt_auth.layer().await.unwrap()),
)
}
async fn make_proteced_request(jwt_auth: JwtAuthorizer<User>, bearer: &str) -> Response {
app(jwt_auth)
.await
.oneshot(
Request::builder()
.uri("/protected")
.header("Authorization", format!("Bearer {bearer}"))
.body(Body::empty())
.unwrap(),
)
.await
.unwrap()
}
#[tokio::test]
async fn protected_without_jwt() {
let jwt_auth: JwtAuthorizer<User> = JwtAuthorizer::from_rsa_pem("../config/rsa-public1.pem");
let response = app(jwt_auth)
.await
.oneshot(Request::builder().uri("/protected").body(Body::empty()).unwrap())
.await
.unwrap();
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
assert!(
response.headers().get(header::WWW_AUTHENTICATE).is_some(),
"Must have a WWW-Authenticate header!"
);
assert_eq!(response.headers().get(header::WWW_AUTHENTICATE).unwrap(), &"Bearer");
// TODO: realm="example"
}
#[tokio::test]
async fn protected_with_jwt() {
let response = make_proteced_request(
JwtAuthorizer::from_ed_pem("../config/ed25519-public2.pem"),
common::JWT_ED2_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
let body = hyper::body::to_bytes(response.into_body()).await.unwrap();
assert_eq!(&body[..], b"hello: b@b.com");
let response =
make_proteced_request(JwtAuthorizer::from_ec_pem("../config/ecdsa-public2.pem"), common::JWT_EC2_OK).await;
assert_eq!(response.status(), StatusCode::OK);
let body = hyper::body::to_bytes(response.into_body()).await.unwrap();
assert_eq!(&body[..], b"hello: b@b.com");
let response =
make_proteced_request(JwtAuthorizer::from_rsa_pem("../config/rsa-public2.pem"), common::JWT_RSA2_OK).await;
assert_eq!(response.status(), StatusCode::OK);
let body = hyper::body::to_bytes(response.into_body()).await.unwrap();
assert_eq!(&body[..], b"hello: b@b.com");
}
#[tokio::test]
async fn protected_with_bad_jwt() {
let response = make_proteced_request(JwtAuthorizer::from_rsa_pem("../config/rsa-public1.pem"), "xxx.xxx.xxx").await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
// TODO: check error code (https://datatracker.ietf.org/doc/html/rfc6750#section-3.1)
}
#[tokio::test]
async fn protected_with_claims_check() {
let rsp_ok = make_proteced_request(
JwtAuthorizer::from_rsa_pem("../config/rsa-public2.pem").check(|_| true),
common::JWT_RSA2_OK,
)
.await;
assert_eq!(rsp_ok.status(), StatusCode::OK);
let rsp_ko = make_proteced_request(
JwtAuthorizer::from_rsa_pem("../config/rsa-public2.pem").check(|_| false),
common::JWT_RSA2_OK,
)
.await;
assert_eq!(rsp_ko.status(), StatusCode::FORBIDDEN);
let h = rsp_ko.headers().get(http::header::WWW_AUTHENTICATE);
assert!(h.is_some(), "WWW-AUTHENTICATE header missing!");
assert_eq!(
h.unwrap(),
HeaderValue::from_static("Bearer error=\"insufficient_scope\""),
"Bad WWW-AUTHENTICATE header!"
);
}
// Unreachable jwks endpoint, should build (endpoint can comme on line later ),
// but should be 500 when checking.
#[tokio::test]
async fn protected_with_bad_jwks_url() {
let response =
make_proteced_request(JwtAuthorizer::from_jwks_url("http://bad-url/xxx/yyy"), common::JWT_RSA1_OK).await;
assert_eq!(response.status(), StatusCode::INTERNAL_SERVER_ERROR);
}
#[tokio::test]
async fn extract_from_public_500() {
let app = Router::new().route(
"/public",
get(|JwtClaims(user): JwtClaims<User>| async move { format!("hello: {}", user.sub) }),
);
let response = app
.oneshot(Request::builder().uri("/public").body(Body::empty()).unwrap())
.await
.unwrap();
assert_eq!(response.status(), StatusCode::INTERNAL_SERVER_ERROR);
}
// --------------------
// VALIDATION
// ---------------------
#[tokio::test]
async fn validate_signature() {
let response = make_proteced_request(
JwtAuthorizer::from_rsa_pem("../config/rsa-public1.pem").validation(Validation::new().disable_validation()),
common::JWT_EC2_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
let response = make_proteced_request(
JwtAuthorizer::from_rsa_pem("../config/rsa-public1.pem").validation(Validation::new()),
common::JWT_EC2_OK,
)
.await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
}
#[tokio::test]
async fn validate_iss() {
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().iss(&["bad-iss"])),
common::JWT_EC1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new()),
common::JWT_EC1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem")
.validation(Validation::new().iss(&["http://localhost:3001"])),
common::JWT_EC1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
}
#[tokio::test]
async fn validate_aud() {
let response = make_proteced_request(
JwtAuthorizer::from_ed_pem("../config/ed25519-public1.pem").validation(Validation::new().aud(&["bad-aud"])),
common::JWT_ED1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
let response = make_proteced_request(
JwtAuthorizer::from_ed_pem("../config/ed25519-public1.pem").validation(Validation::new()),
common::JWT_ED1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
let response = make_proteced_request(
JwtAuthorizer::from_ed_pem("../config/ed25519-public1.pem").validation(Validation::new().aud(&["aud1"])),
common::JWT_ED1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
}
#[tokio::test]
async fn validate_exp() {
// DEFAULT -> ENABLED
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new()),
common::JWT_EC1_EXP_KO,
)
.await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
// DISABLED
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().exp(false)),
common::JWT_EC1_EXP_KO,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
// ENABLED
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().exp(true)),
common::JWT_EC1_EXP_KO,
)
.await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().exp(true)),
common::JWT_EC1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
}
#[tokio::test]
async fn validate_nbf() {
// DEFAULT -> DISABLED
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new()),
common::JWT_EC1_NBF_KO,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
// DISABLED
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().nbf(false)),
common::JWT_EC1_NBF_KO,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
// ENABLED
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().nbf(true)),
common::JWT_EC1_NBF_KO,
)
.await;
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
let response = make_proteced_request(
JwtAuthorizer::from_ec_pem("../config/ecdsa-public1.pem").validation(Validation::new().nbf(true)),
common::JWT_EC1_OK,
)
.await;
assert_eq!(response.status(), StatusCode::OK);
}
}