| // Copyright 2023 Google LLC |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package gdch |
| |
| import ( |
| "context" |
| "encoding/base64" |
| "encoding/json" |
| "fmt" |
| "net/http" |
| "net/http/httptest" |
| "os" |
| "strings" |
| "testing" |
| |
| "cloud.google.com/go/auth/internal" |
| "cloud.google.com/go/auth/internal/credsfile" |
| "cloud.google.com/go/auth/internal/jwt" |
| ) |
| |
| func TestTokenProvider(t *testing.T) { |
| aud := "http://sampele-aud.com/" |
| b, err := os.ReadFile("../../../internal/testdata/gdch.json") |
| if err != nil { |
| t.Fatal(err) |
| } |
| f, err := credsfile.ParseGDCHServiceAccount(b) |
| if err != nil { |
| t.Fatal(err) |
| } |
| ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { |
| if r.Method != "POST" { |
| t.Errorf("unexpected request method: %v", r.Method) |
| } |
| if err := r.ParseForm(); err != nil { |
| t.Error(err) |
| } |
| parts := strings.Split(r.FormValue("subject_token"), ".") |
| var header jwt.Header |
| var claims jwt.Claims |
| b, err = base64.RawURLEncoding.DecodeString(parts[0]) |
| if err != nil { |
| t.Fatal(err) |
| } |
| if err := json.Unmarshal(b, &header); err != nil { |
| t.Fatal(err) |
| } |
| b, err = base64.RawURLEncoding.DecodeString(parts[1]) |
| if err != nil { |
| t.Fatal(err) |
| } |
| if err := json.Unmarshal(b, &claims); err != nil { |
| t.Fatal(err) |
| } |
| |
| if got := r.FormValue("audience"); got != aud { |
| t.Errorf("got audience %v, want %v", got, GrantType) |
| } |
| if want := jwt.HeaderAlgRSA256; header.Algorithm != want { |
| t.Errorf("got alg %q, want %q", header.Algorithm, want) |
| } |
| if want := jwt.HeaderType; header.Type != want { |
| t.Errorf("got typ %q, want %q", header.Type, want) |
| } |
| if want := "abcdef1234567890"; header.KeyID != want { |
| t.Errorf("got kid %q, want %q", header.KeyID, want) |
| } |
| |
| if want := "system:serviceaccount:fake_project:sa_name"; claims.Iss != want { |
| t.Errorf("got iss %q, want %q", claims.Iss, want) |
| } |
| if want := "system:serviceaccount:fake_project:sa_name"; claims.Sub != want { |
| t.Errorf("got sub %q, want %q", claims.Sub, want) |
| } |
| if want := fmt.Sprintf("http://%s", r.Host); claims.Aud != want { |
| t.Errorf("got aud %q, want %q", claims.Aud, want) |
| } |
| w.Write([]byte(`{ |
| "access_token": "a_fake_token", |
| "token_type": "Bearer", |
| "expires_in": 60 |
| }`)) |
| })) |
| f.TokenURL = ts.URL |
| f.CertPath = "../../../internal/testdata/cert.pem" |
| b, err = json.Marshal(&f) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if _, err := NewTokenProvider(f, &Options{}); err == nil { |
| t.Fatal("STSAudience should be required") |
| } |
| |
| cred, err := NewTokenProvider(f, &Options{ |
| STSAudience: aud, |
| Client: internal.CloneDefaultClient(), |
| }) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| tok, err := cred.Token(context.Background()) |
| if err != nil { |
| t.Fatal(err) |
| } |
| if want := "a_fake_token"; tok.Value != want { |
| t.Fatalf("got AccessToken %q, want %q", tok.Value, want) |
| } |
| if want := internal.TokenTypeBearer; tok.Type != want { |
| t.Fatalf("got TokenType %q, want %q", tok.Type, want) |
| } |
| } |