mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-28 18:47:46 +00:00
25c3c17986
* chore: upgrade to oidc v2 release * fix tests * fix build errors after rebase * pin oidc v2.1.0 * pin oidc v2.1.1 (include bugfix) * pin oidc v2.1.2 (include bugfix) * pin oidc v2.2.1 (bugfix) include fix zitadel/oidc#349 * fix: refresh token handling * simplify cognitive complexity * fix: handle error --------- Co-authored-by: Livio Spring <livio.a@gmail.com>
275 lines
7.5 KiB
Go
275 lines
7.5 KiB
Go
package oauth
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
"testing"
|
|
|
|
"github.com/h2non/gock"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/zitadel/oidc/v2/pkg/oidc"
|
|
"golang.org/x/oauth2"
|
|
"golang.org/x/text/language"
|
|
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/idp"
|
|
)
|
|
|
|
func TestProvider_FetchUser(t *testing.T) {
|
|
type fields struct {
|
|
config *oauth2.Config
|
|
name string
|
|
userEndpoint string
|
|
httpMock func(issuer string)
|
|
userMapper func() idp.User
|
|
authURL string
|
|
code string
|
|
tokens *oidc.Tokens[*oidc.IDTokenClaims]
|
|
}
|
|
type want struct {
|
|
err func(error) bool
|
|
user idp.User
|
|
id string
|
|
firstName string
|
|
lastName string
|
|
displayName string
|
|
nickName string
|
|
preferredUsername string
|
|
email string
|
|
isEmailVerified bool
|
|
phone string
|
|
isPhoneVerified bool
|
|
preferredLanguage language.Tag
|
|
avatarURL string
|
|
profile string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
want want
|
|
}{
|
|
{
|
|
name: "unauthenticated session, error",
|
|
fields: fields{
|
|
config: &oauth2.Config{
|
|
ClientID: "clientID",
|
|
ClientSecret: "clientSecret",
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: "https://oauth2.com/authorize",
|
|
TokenURL: "https://oauth2.com/token",
|
|
},
|
|
RedirectURL: "redirectURI",
|
|
Scopes: []string{"user"},
|
|
},
|
|
userEndpoint: "https://oauth2.com/user",
|
|
httpMock: func(issuer string) {},
|
|
authURL: "https://oauth2.com/authorize?client_id=clientID&redirect_uri=redirectURI&response_type=code&scope=user&state=testState",
|
|
tokens: nil,
|
|
},
|
|
want: want{
|
|
err: func(err error) bool {
|
|
return errors.Is(err, ErrCodeMissing)
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "user error",
|
|
fields: fields{
|
|
config: &oauth2.Config{
|
|
ClientID: "clientID",
|
|
ClientSecret: "clientSecret",
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: "https://oauth2.com/authorize",
|
|
TokenURL: "https://oauth2.com/token",
|
|
},
|
|
RedirectURL: "redirectURI",
|
|
Scopes: []string{"user"},
|
|
},
|
|
userEndpoint: "https://oauth2.com/user",
|
|
httpMock: func(issuer string) {
|
|
gock.New(issuer).
|
|
Get("/user").
|
|
Reply(http.StatusInternalServerError)
|
|
},
|
|
userMapper: func() idp.User {
|
|
return NewUserMapper("userID")
|
|
},
|
|
authURL: "https://oauth2.com/authorize?client_id=clientID&redirect_uri=redirectURI&response_type=code&scope=user&state=testState",
|
|
tokens: &oidc.Tokens[*oidc.IDTokenClaims]{
|
|
Token: &oauth2.Token{
|
|
AccessToken: "accessToken",
|
|
TokenType: oidc.BearerToken,
|
|
},
|
|
},
|
|
},
|
|
want: want{
|
|
err: func(err error) bool {
|
|
return err.Error() == "http status not ok: 500 Internal Server Error "
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "successful fetch",
|
|
fields: fields{
|
|
config: &oauth2.Config{
|
|
ClientID: "clientID",
|
|
ClientSecret: "clientSecret",
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: "https://oauth2.com/authorize",
|
|
TokenURL: "https://oauth2.com/token",
|
|
},
|
|
RedirectURL: "redirectURI",
|
|
Scopes: []string{"user"},
|
|
},
|
|
userEndpoint: "https://oauth2.com/user",
|
|
httpMock: func(issuer string) {
|
|
gock.New(issuer).
|
|
Get("/user").
|
|
Reply(200).
|
|
JSON(map[string]interface{}{
|
|
"userID": "id",
|
|
"custom": "claim",
|
|
})
|
|
},
|
|
userMapper: func() idp.User {
|
|
return NewUserMapper("userID")
|
|
},
|
|
authURL: "https://issuer.com/authorize?client_id=clientID&redirect_uri=redirectURI&response_type=code&scope=user&state=testState",
|
|
tokens: &oidc.Tokens[*oidc.IDTokenClaims]{
|
|
Token: &oauth2.Token{
|
|
AccessToken: "accessToken",
|
|
TokenType: oidc.BearerToken,
|
|
},
|
|
},
|
|
},
|
|
want: want{
|
|
user: &UserMapper{
|
|
idAttribute: "userID",
|
|
RawInfo: map[string]interface{}{
|
|
"userID": "id",
|
|
"custom": "claim",
|
|
},
|
|
},
|
|
id: "id",
|
|
firstName: "",
|
|
lastName: "",
|
|
displayName: "",
|
|
nickName: "",
|
|
preferredUsername: "",
|
|
email: "",
|
|
isEmailVerified: false,
|
|
phone: "",
|
|
isPhoneVerified: false,
|
|
preferredLanguage: language.Und,
|
|
avatarURL: "",
|
|
profile: "",
|
|
},
|
|
},
|
|
{
|
|
name: "successful fetch with code exchange",
|
|
fields: fields{
|
|
config: &oauth2.Config{
|
|
ClientID: "clientID",
|
|
ClientSecret: "clientSecret",
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: "https://oauth2.com/authorize",
|
|
TokenURL: "https://oauth2.com/token",
|
|
},
|
|
RedirectURL: "redirectURI",
|
|
Scopes: []string{"user"},
|
|
},
|
|
userEndpoint: "https://oauth2.com/user",
|
|
httpMock: func(issuer string) {
|
|
gock.New(issuer).
|
|
Post("/token").
|
|
BodyString("client_id=clientID&client_secret=clientSecret&code=code&grant_type=authorization_code&redirect_uri=redirectURI").
|
|
Reply(200).
|
|
JSON(&oidc.AccessTokenResponse{
|
|
AccessToken: "accessToken",
|
|
TokenType: oidc.BearerToken,
|
|
RefreshToken: "",
|
|
ExpiresIn: 3600,
|
|
IDToken: "",
|
|
State: "testState"})
|
|
gock.New(issuer).
|
|
Get("/user").
|
|
Reply(200).
|
|
JSON(map[string]interface{}{
|
|
"userID": "id",
|
|
"custom": "claim",
|
|
})
|
|
},
|
|
userMapper: func() idp.User {
|
|
return NewUserMapper("userID")
|
|
},
|
|
authURL: "https://issuer.com/authorize?client_id=clientID&redirect_uri=redirectURI&response_type=code&scope=user&state=testState",
|
|
tokens: nil,
|
|
code: "code",
|
|
},
|
|
want: want{
|
|
user: &UserMapper{
|
|
idAttribute: "userID",
|
|
RawInfo: map[string]interface{}{
|
|
"userID": "id",
|
|
"custom": "claim",
|
|
},
|
|
},
|
|
id: "id",
|
|
firstName: "",
|
|
lastName: "",
|
|
displayName: "",
|
|
nickName: "",
|
|
preferredUsername: "",
|
|
email: "",
|
|
isEmailVerified: false,
|
|
phone: "",
|
|
isPhoneVerified: false,
|
|
preferredLanguage: language.Und,
|
|
avatarURL: "",
|
|
profile: "",
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
defer gock.Off()
|
|
tt.fields.httpMock("https://oauth2.com")
|
|
a := assert.New(t)
|
|
|
|
provider, err := New(tt.fields.config, tt.fields.name, tt.fields.userEndpoint, tt.fields.userMapper)
|
|
require.NoError(t, err)
|
|
|
|
session := &Session{
|
|
AuthURL: tt.fields.authURL,
|
|
Code: tt.fields.code,
|
|
Tokens: tt.fields.tokens,
|
|
Provider: provider,
|
|
}
|
|
|
|
user, err := session.FetchUser(context.Background())
|
|
if tt.want.err != nil && !tt.want.err(err) {
|
|
a.Fail("invalid error", err)
|
|
}
|
|
if tt.want.err == nil {
|
|
a.NoError(err)
|
|
a.Equal(tt.want.user, user)
|
|
a.Equal(tt.want.id, user.GetID())
|
|
a.Equal(tt.want.firstName, user.GetFirstName())
|
|
a.Equal(tt.want.lastName, user.GetLastName())
|
|
a.Equal(tt.want.displayName, user.GetDisplayName())
|
|
a.Equal(tt.want.nickName, user.GetNickname())
|
|
a.Equal(tt.want.preferredUsername, user.GetPreferredUsername())
|
|
a.Equal(domain.EmailAddress(tt.want.email), user.GetEmail())
|
|
a.Equal(tt.want.isEmailVerified, user.IsEmailVerified())
|
|
a.Equal(domain.PhoneNumber(tt.want.phone), user.GetPhone())
|
|
a.Equal(tt.want.isPhoneVerified, user.IsPhoneVerified())
|
|
a.Equal(tt.want.preferredLanguage, user.GetPreferredLanguage())
|
|
a.Equal(tt.want.avatarURL, user.GetAvatarURL())
|
|
a.Equal(tt.want.profile, user.GetProfile())
|
|
}
|
|
})
|
|
}
|
|
}
|