mirror of
https://github.com/coder/coder.git
synced 2025-07-03 16:13:58 +00:00
Refactors our use of `slogtest` to instantiate a "standard logger" across most of our tests. This standard logger incorporates https://github.com/coder/slog/pull/217 to also ignore database query canceled errors by default, which are a source of low-severity flakes. Any test that has set non-default `slogtest.Options` is left alone. In particular, `coderdtest` defaults to ignoring all errors. We might consider revisiting that decision now that we have better tools to target the really common flaky Error logs on shutdown.
439 lines
10 KiB
Go
439 lines
10 KiB
Go
package jwtutils_test
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/go-jose/go-jose/v4"
|
|
"github.com/go-jose/go-jose/v4/jwt"
|
|
"github.com/google/uuid"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/coder/coder/v2/coderd/cryptokeys"
|
|
"github.com/coder/coder/v2/coderd/database"
|
|
"github.com/coder/coder/v2/coderd/database/dbgen"
|
|
"github.com/coder/coder/v2/coderd/database/dbtestutil"
|
|
"github.com/coder/coder/v2/coderd/jwtutils"
|
|
"github.com/coder/coder/v2/codersdk"
|
|
"github.com/coder/coder/v2/testutil"
|
|
)
|
|
|
|
func TestClaims(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
type tokenType struct {
|
|
Name string
|
|
KeySize int
|
|
Sign bool
|
|
}
|
|
|
|
types := []tokenType{
|
|
{
|
|
Name: "JWE",
|
|
Sign: false,
|
|
KeySize: 32,
|
|
},
|
|
{
|
|
Name: "JWS",
|
|
Sign: true,
|
|
KeySize: 64,
|
|
},
|
|
}
|
|
|
|
type testcase struct {
|
|
name string
|
|
claims jwtutils.Claims
|
|
expectedClaims jwt.Expected
|
|
expectedErr error
|
|
}
|
|
|
|
cases := []testcase{
|
|
{
|
|
name: "OK",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
},
|
|
{
|
|
name: "WrongIssuer",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
expectedClaims: jwt.Expected{
|
|
Issuer: "coder2",
|
|
},
|
|
expectedErr: jwt.ErrInvalidIssuer,
|
|
},
|
|
{
|
|
name: "WrongSubject",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
expectedClaims: jwt.Expected{
|
|
Subject: "user2@coder.com",
|
|
},
|
|
expectedErr: jwt.ErrInvalidSubject,
|
|
},
|
|
{
|
|
name: "WrongAudience",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
},
|
|
{
|
|
name: "Expired",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Minute)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
expectedClaims: jwt.Expected{
|
|
Time: time.Now().Add(time.Minute * 3),
|
|
},
|
|
expectedErr: jwt.ErrExpired,
|
|
},
|
|
{
|
|
name: "IssuedInFuture",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Minute)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
expectedClaims: jwt.Expected{
|
|
Time: time.Now().Add(-time.Minute * 3),
|
|
},
|
|
expectedErr: jwt.ErrIssuedInTheFuture,
|
|
},
|
|
{
|
|
name: "IsBefore",
|
|
claims: jwt.Claims{
|
|
Issuer: "coder",
|
|
Subject: "user@coder.com",
|
|
Audience: jwt.Audience{"coder"},
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now().Add(time.Minute * 5)),
|
|
},
|
|
expectedClaims: jwt.Expected{
|
|
Time: time.Now().Add(time.Minute * 3),
|
|
},
|
|
expectedErr: jwt.ErrNotValidYet,
|
|
},
|
|
}
|
|
|
|
for _, tt := range types {
|
|
tt := tt
|
|
|
|
t.Run(tt.Name, func(t *testing.T) {
|
|
t.Parallel()
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.name, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
key = newKey(t, tt.KeySize)
|
|
token string
|
|
err error
|
|
)
|
|
|
|
if tt.Sign {
|
|
token, err = jwtutils.Sign(ctx, key, c.claims)
|
|
} else {
|
|
token, err = jwtutils.Encrypt(ctx, key, c.claims)
|
|
}
|
|
require.NoError(t, err)
|
|
|
|
var actual jwt.Claims
|
|
if tt.Sign {
|
|
err = jwtutils.Verify(ctx, key, token, &actual, withVerifyExpected(c.expectedClaims))
|
|
} else {
|
|
err = jwtutils.Decrypt(ctx, key, token, &actual, withDecryptExpected(c.expectedClaims))
|
|
}
|
|
if c.expectedErr != nil {
|
|
require.ErrorIs(t, err, c.expectedErr)
|
|
} else {
|
|
require.NoError(t, err)
|
|
require.Equal(t, c.claims, actual)
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestJWS(t *testing.T) {
|
|
t.Parallel()
|
|
t.Run("WrongSignatureAlgorithm", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
ctx := testutil.Context(t, testutil.WaitShort)
|
|
|
|
key := newKey(t, 64)
|
|
|
|
token, err := jwtutils.Sign(ctx, key, jwt.Claims{})
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Verify(ctx, key, token, &actual, withSignatureAlgorithm(jose.HS256))
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("CustomClaims", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
key = newKey(t, 64)
|
|
)
|
|
|
|
expected := testClaims{
|
|
MyClaim: "my_value",
|
|
}
|
|
token, err := jwtutils.Sign(ctx, key, expected)
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Verify(ctx, key, token, &actual, withVerifyExpected(jwt.Expected{}))
|
|
require.NoError(t, err)
|
|
require.Equal(t, expected, actual)
|
|
})
|
|
|
|
t.Run("WithKeycache", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
db, _ = dbtestutil.NewDB(t)
|
|
_ = dbgen.CryptoKey(t, db, database.CryptoKey{
|
|
Feature: database.CryptoKeyFeatureOIDCConvert,
|
|
StartsAt: time.Now(),
|
|
})
|
|
log = testutil.Logger(t)
|
|
fetcher = &cryptokeys.DBFetcher{DB: db}
|
|
)
|
|
|
|
cache, err := cryptokeys.NewSigningCache(ctx, log, fetcher, codersdk.CryptoKeyFeatureOIDCConvert)
|
|
require.NoError(t, err)
|
|
|
|
claims := testClaims{
|
|
MyClaim: "my_value",
|
|
Claims: jwt.Claims{
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
},
|
|
}
|
|
|
|
token, err := jwtutils.Sign(ctx, cache, claims)
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Verify(ctx, cache, token, &actual)
|
|
require.NoError(t, err)
|
|
require.Equal(t, claims, actual)
|
|
})
|
|
}
|
|
|
|
func TestJWE(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
t.Run("WrongKeyAlgorithm", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
key = newKey(t, 32)
|
|
)
|
|
|
|
token, err := jwtutils.Encrypt(ctx, key, jwt.Claims{})
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Decrypt(ctx, key, token, &actual, withKeyAlgorithm(jose.A128GCMKW))
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("WrongContentyEncryption", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
key = newKey(t, 32)
|
|
)
|
|
|
|
token, err := jwtutils.Encrypt(ctx, key, jwt.Claims{})
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Decrypt(ctx, key, token, &actual, withContentEncryptionAlgorithm(jose.A128GCM))
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("CustomClaims", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
key = newKey(t, 32)
|
|
)
|
|
|
|
expected := testClaims{
|
|
MyClaim: "my_value",
|
|
}
|
|
|
|
token, err := jwtutils.Encrypt(ctx, key, expected)
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Decrypt(ctx, key, token, &actual, withDecryptExpected(jwt.Expected{}))
|
|
require.NoError(t, err)
|
|
require.Equal(t, expected, actual)
|
|
})
|
|
|
|
t.Run("WithKeycache", func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
var (
|
|
ctx = testutil.Context(t, testutil.WaitShort)
|
|
db, _ = dbtestutil.NewDB(t)
|
|
_ = dbgen.CryptoKey(t, db, database.CryptoKey{
|
|
Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey,
|
|
StartsAt: time.Now(),
|
|
})
|
|
log = testutil.Logger(t)
|
|
|
|
fetcher = &cryptokeys.DBFetcher{DB: db}
|
|
)
|
|
|
|
cache, err := cryptokeys.NewEncryptionCache(ctx, log, fetcher, codersdk.CryptoKeyFeatureWorkspaceAppsAPIKey)
|
|
require.NoError(t, err)
|
|
|
|
claims := testClaims{
|
|
MyClaim: "my_value",
|
|
Claims: jwt.Claims{
|
|
Expiry: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
},
|
|
}
|
|
|
|
token, err := jwtutils.Encrypt(ctx, cache, claims)
|
|
require.NoError(t, err)
|
|
|
|
var actual testClaims
|
|
err = jwtutils.Decrypt(ctx, cache, token, &actual)
|
|
require.NoError(t, err)
|
|
require.Equal(t, claims, actual)
|
|
})
|
|
}
|
|
|
|
func generateSecret(t *testing.T, keySize int) []byte {
|
|
t.Helper()
|
|
|
|
b := make([]byte, keySize)
|
|
_, err := rand.Read(b)
|
|
require.NoError(t, err)
|
|
return b
|
|
}
|
|
|
|
type testClaims struct {
|
|
MyClaim string `json:"my_claim"`
|
|
jwt.Claims
|
|
}
|
|
|
|
func withDecryptExpected(e jwt.Expected) func(*jwtutils.DecryptOptions) {
|
|
return func(opts *jwtutils.DecryptOptions) {
|
|
opts.RegisteredClaims = e
|
|
}
|
|
}
|
|
|
|
func withVerifyExpected(e jwt.Expected) func(*jwtutils.VerifyOptions) {
|
|
return func(opts *jwtutils.VerifyOptions) {
|
|
opts.RegisteredClaims = e
|
|
}
|
|
}
|
|
|
|
func withSignatureAlgorithm(alg jose.SignatureAlgorithm) func(*jwtutils.VerifyOptions) {
|
|
return func(opts *jwtutils.VerifyOptions) {
|
|
opts.SignatureAlgorithm = alg
|
|
}
|
|
}
|
|
|
|
func withKeyAlgorithm(alg jose.KeyAlgorithm) func(*jwtutils.DecryptOptions) {
|
|
return func(opts *jwtutils.DecryptOptions) {
|
|
opts.KeyAlgorithm = alg
|
|
}
|
|
}
|
|
|
|
func withContentEncryptionAlgorithm(alg jose.ContentEncryption) func(*jwtutils.DecryptOptions) {
|
|
return func(opts *jwtutils.DecryptOptions) {
|
|
opts.ContentEncryptionAlgorithm = alg
|
|
}
|
|
}
|
|
|
|
type key struct {
|
|
t testing.TB
|
|
id string
|
|
secret []byte
|
|
}
|
|
|
|
func newKey(t *testing.T, size int) *key {
|
|
t.Helper()
|
|
|
|
id := uuid.New().String()
|
|
secret := generateSecret(t, size)
|
|
|
|
return &key{
|
|
t: t,
|
|
id: id,
|
|
secret: secret,
|
|
}
|
|
}
|
|
|
|
func (k *key) SigningKey(_ context.Context) (id string, key interface{}, err error) {
|
|
return k.id, k.secret, nil
|
|
}
|
|
|
|
func (k *key) VerifyingKey(_ context.Context, id string) (key interface{}, err error) {
|
|
k.t.Helper()
|
|
|
|
require.Equal(k.t, k.id, id)
|
|
return k.secret, nil
|
|
}
|
|
|
|
func (k *key) EncryptingKey(_ context.Context) (id string, key interface{}, err error) {
|
|
return k.id, k.secret, nil
|
|
}
|
|
|
|
func (k *key) DecryptingKey(_ context.Context, id string) (key interface{}, err error) {
|
|
k.t.Helper()
|
|
|
|
require.Equal(k.t, k.id, id)
|
|
return k.secret, nil
|
|
}
|