blob: 6a35ae94ab5609ed5b7b55a8ff2b9f79c7e3e87e [file] [log] [blame]
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package gdch
import (
"context"
"encoding/base64"
"encoding/json"
"fmt"
"net/http"
"net/http/httptest"
"os"
"strings"
"testing"
"cloud.google.com/go/auth/internal"
"cloud.google.com/go/auth/internal/credsfile"
"cloud.google.com/go/auth/internal/jwt"
)
func TestTokenProvider(t *testing.T) {
aud := "http://sampele-aud.com/"
b, err := os.ReadFile("../../../internal/testdata/gdch.json")
if err != nil {
t.Fatal(err)
}
f, err := credsfile.ParseGDCHServiceAccount(b)
if err != nil {
t.Fatal(err)
}
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
t.Errorf("unexpected request method: %v", r.Method)
}
if err := r.ParseForm(); err != nil {
t.Error(err)
}
parts := strings.Split(r.FormValue("subject_token"), ".")
var header jwt.Header
var claims jwt.Claims
b, err = base64.RawURLEncoding.DecodeString(parts[0])
if err != nil {
t.Fatal(err)
}
if err := json.Unmarshal(b, &header); err != nil {
t.Fatal(err)
}
b, err = base64.RawURLEncoding.DecodeString(parts[1])
if err != nil {
t.Fatal(err)
}
if err := json.Unmarshal(b, &claims); err != nil {
t.Fatal(err)
}
if got := r.FormValue("audience"); got != aud {
t.Errorf("got audience %v, want %v", got, GrantType)
}
if want := jwt.HeaderAlgRSA256; header.Algorithm != want {
t.Errorf("got alg %q, want %q", header.Algorithm, want)
}
if want := jwt.HeaderType; header.Type != want {
t.Errorf("got typ %q, want %q", header.Type, want)
}
if want := "abcdef1234567890"; header.KeyID != want {
t.Errorf("got kid %q, want %q", header.KeyID, want)
}
if want := "system:serviceaccount:fake_project:sa_name"; claims.Iss != want {
t.Errorf("got iss %q, want %q", claims.Iss, want)
}
if want := "system:serviceaccount:fake_project:sa_name"; claims.Sub != want {
t.Errorf("got sub %q, want %q", claims.Sub, want)
}
if want := fmt.Sprintf("http://%s", r.Host); claims.Aud != want {
t.Errorf("got aud %q, want %q", claims.Aud, want)
}
w.Write([]byte(`{
"access_token": "a_fake_token",
"token_type": "Bearer",
"expires_in": 60
}`))
}))
f.TokenURL = ts.URL
f.CertPath = "../../../internal/testdata/cert.pem"
b, err = json.Marshal(&f)
if err != nil {
t.Fatal(err)
}
if _, err := NewTokenProvider(f, &Options{}); err == nil {
t.Fatal("STSAudience should be required")
}
cred, err := NewTokenProvider(f, &Options{
STSAudience: aud,
Client: internal.CloneDefaultClient(),
})
if err != nil {
t.Fatal(err)
}
tok, err := cred.Token(context.Background())
if err != nil {
t.Fatal(err)
}
if want := "a_fake_token"; tok.Value != want {
t.Fatalf("got AccessToken %q, want %q", tok.Value, want)
}
if want := internal.TokenTypeBearer; tok.Type != want {
t.Fatalf("got TokenType %q, want %q", tok.Type, want)
}
}