mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
173 lines
5.5 KiB
Go
173 lines
5.5 KiB
Go
|
package validator
|
||
|
|
||
|
import (
|
||
|
"errors"
|
||
|
"fmt"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
"github.com/stretchr/testify/require"
|
||
|
|
||
|
"github.com/authelia/authelia/internal/configuration/schema"
|
||
|
)
|
||
|
|
||
|
func TestShouldRaiseErrorWhenInvalidOIDCServerConfiguration(t *testing.T) {
|
||
|
validator := schema.NewStructValidator()
|
||
|
config := &schema.IdentityProvidersConfiguration{
|
||
|
OIDC: &schema.OpenIDConnectConfiguration{
|
||
|
HMACSecret: "abc",
|
||
|
IssuerPrivateKey: "",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
ValidateIdentityProviders(config, validator)
|
||
|
|
||
|
require.Len(t, validator.Errors(), 2)
|
||
|
|
||
|
assert.EqualError(t, validator.Errors()[0], "OIDC Server issuer private key must be provided")
|
||
|
assert.EqualError(t, validator.Errors()[1], "OIDC Server has no clients defined")
|
||
|
}
|
||
|
|
||
|
func TestShouldRaiseErrorWhenOIDCServerIssuerPrivateKeyPathInvalid(t *testing.T) {
|
||
|
validator := schema.NewStructValidator()
|
||
|
config := &schema.IdentityProvidersConfiguration{
|
||
|
OIDC: &schema.OpenIDConnectConfiguration{
|
||
|
HMACSecret: "rLABDrx87et5KvRHVUgTm3pezWWd8LMN",
|
||
|
IssuerPrivateKey: "key-material",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
ValidateIdentityProviders(config, validator)
|
||
|
|
||
|
require.Len(t, validator.Errors(), 1)
|
||
|
|
||
|
assert.EqualError(t, validator.Errors()[0], "OIDC Server has no clients defined")
|
||
|
}
|
||
|
|
||
|
func TestShouldRaiseErrorWhenOIDCServerClientBadValues(t *testing.T) {
|
||
|
validator := schema.NewStructValidator()
|
||
|
config := &schema.IdentityProvidersConfiguration{
|
||
|
OIDC: &schema.OpenIDConnectConfiguration{
|
||
|
HMACSecret: "rLABDrx87et5KvRHVUgTm3pezWWd8LMN",
|
||
|
IssuerPrivateKey: "key-material",
|
||
|
Clients: []schema.OpenIDConnectClientConfiguration{
|
||
|
{
|
||
|
ID: "",
|
||
|
Secret: "",
|
||
|
Policy: "",
|
||
|
RedirectURIs: []string{
|
||
|
"tcp://google.com",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
ID: "a-client",
|
||
|
Secret: "a-secret",
|
||
|
Policy: "a-policy",
|
||
|
RedirectURIs: []string{
|
||
|
"https://google.com",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
ID: "a-client",
|
||
|
Secret: "a-secret",
|
||
|
Policy: "a-policy",
|
||
|
RedirectURIs: []string{
|
||
|
"https://google.com",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
ID: "client-check-uri-parse",
|
||
|
Secret: "a-secret",
|
||
|
Policy: twoFactorPolicy,
|
||
|
RedirectURIs: []string{
|
||
|
"http://abc@%two",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
|
||
|
ValidateIdentityProviders(config, validator)
|
||
|
|
||
|
require.Len(t, validator.Errors(), 7)
|
||
|
|
||
|
assert.Equal(t, schema.DefaultOpenIDConnectClientConfiguration.Policy, config.OIDC.Clients[0].Policy)
|
||
|
assert.EqualError(t, validator.Errors()[0], fmt.Sprintf(errIdentityProvidersOIDCServerClientInvalidSecFmt, ""))
|
||
|
assert.EqualError(t, validator.Errors()[1], fmt.Sprintf(errOAuthOIDCServerClientRedirectURIFmt, "tcp://google.com", "tcp"))
|
||
|
assert.EqualError(t, validator.Errors()[2], fmt.Sprintf(errIdentityProvidersOIDCServerClientInvalidPolicyFmt, "a-client", "a-policy"))
|
||
|
assert.EqualError(t, validator.Errors()[3], fmt.Sprintf(errIdentityProvidersOIDCServerClientInvalidPolicyFmt, "a-client", "a-policy"))
|
||
|
assert.EqualError(t, validator.Errors()[4], fmt.Sprintf(errOAuthOIDCServerClientRedirectURICantBeParsedFmt, "client-check-uri-parse", "http://abc@%two", errors.New("parse \"http://abc@%two\": invalid URL escape \"%tw\"")))
|
||
|
assert.EqualError(t, validator.Errors()[5], "OIDC Server has one or more clients with an empty ID")
|
||
|
assert.EqualError(t, validator.Errors()[6], "OIDC Server has clients with duplicate ID's")
|
||
|
}
|
||
|
|
||
|
func TestShouldNotRaiseErrorWhenOIDCServerConfiguredCorrectly(t *testing.T) {
|
||
|
validator := schema.NewStructValidator()
|
||
|
config := &schema.IdentityProvidersConfiguration{
|
||
|
OIDC: &schema.OpenIDConnectConfiguration{
|
||
|
HMACSecret: "rLABDrx87et5KvRHVUgTm3pezWWd8LMN",
|
||
|
IssuerPrivateKey: "../../../README.md",
|
||
|
Clients: []schema.OpenIDConnectClientConfiguration{
|
||
|
{
|
||
|
ID: "a-client",
|
||
|
Secret: "a-client-secret",
|
||
|
Policy: oneFactorPolicy,
|
||
|
RedirectURIs: []string{
|
||
|
"https://google.com",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
ID: "b-client",
|
||
|
Description: "Normal Description",
|
||
|
Secret: "b-client-secret",
|
||
|
Policy: oneFactorPolicy,
|
||
|
RedirectURIs: []string{
|
||
|
"https://google.com",
|
||
|
},
|
||
|
Scopes: []string{
|
||
|
"groups",
|
||
|
},
|
||
|
GrantTypes: []string{
|
||
|
"refresh_token",
|
||
|
},
|
||
|
ResponseTypes: []string{
|
||
|
"token",
|
||
|
"code",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
|
||
|
ValidateIdentityProviders(config, validator)
|
||
|
|
||
|
assert.Len(t, validator.Errors(), 0)
|
||
|
|
||
|
assert.Equal(t, config.OIDC.Clients[0].ID, config.OIDC.Clients[0].Description)
|
||
|
assert.Equal(t, "Normal Description", config.OIDC.Clients[1].Description)
|
||
|
|
||
|
require.Len(t, config.OIDC.Clients[0].Scopes, 4)
|
||
|
assert.Equal(t, "openid", config.OIDC.Clients[0].Scopes[0])
|
||
|
assert.Equal(t, "groups", config.OIDC.Clients[0].Scopes[1])
|
||
|
assert.Equal(t, "profile", config.OIDC.Clients[0].Scopes[2])
|
||
|
assert.Equal(t, "email", config.OIDC.Clients[0].Scopes[3])
|
||
|
|
||
|
require.Len(t, config.OIDC.Clients[0].GrantTypes, 2)
|
||
|
assert.Equal(t, "refresh_token", config.OIDC.Clients[0].GrantTypes[0])
|
||
|
assert.Equal(t, "authorization_code", config.OIDC.Clients[0].GrantTypes[1])
|
||
|
|
||
|
require.Len(t, config.OIDC.Clients[0].ResponseTypes, 1)
|
||
|
assert.Equal(t, "code", config.OIDC.Clients[0].ResponseTypes[0])
|
||
|
|
||
|
require.Len(t, config.OIDC.Clients[1].Scopes, 2)
|
||
|
assert.Equal(t, "groups", config.OIDC.Clients[1].Scopes[0])
|
||
|
assert.Equal(t, "openid", config.OIDC.Clients[1].Scopes[1])
|
||
|
|
||
|
require.Len(t, config.OIDC.Clients[1].GrantTypes, 1)
|
||
|
assert.Equal(t, "refresh_token", config.OIDC.Clients[1].GrantTypes[0])
|
||
|
|
||
|
require.Len(t, config.OIDC.Clients[1].ResponseTypes, 2)
|
||
|
assert.Equal(t, "token", config.OIDC.Clients[1].ResponseTypes[0])
|
||
|
assert.Equal(t, "code", config.OIDC.Clients[1].ResponseTypes[1])
|
||
|
}
|