Index: third_party/google-endpoints/test/test_suppliers.py |
diff --git a/third_party/google-endpoints/test/test_suppliers.py b/third_party/google-endpoints/test/test_suppliers.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..d6d257a8f13904699f5e008cfacdbcd9a7231d3f |
--- /dev/null |
+++ b/third_party/google-endpoints/test/test_suppliers.py |
@@ -0,0 +1,192 @@ |
+# Copyright 2016 Google Inc. All Rights Reserved. |
+# |
+# Licensed under the Apache License, Version 2.0 (the "License"); |
+# you may not use this file except in compliance with the License. |
+# You may obtain a copy of the License at |
+# |
+# http://www.apache.org/licenses/LICENSE-2.0 |
+# |
+# Unless required by applicable law or agreed to in writing, software |
+# distributed under the License is distributed on an "AS IS" BASIS, |
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
+# See the License for the specific language governing permissions and |
+# limitations under the License. |
+ |
+import json |
+import unittest |
+import httmock |
+import mock |
+ |
+from Crypto import PublicKey |
+from jwkest import jwk |
+ |
+from google.api.auth import suppliers |
+ |
+ |
+class KeyUriSupplierTest(unittest.TestCase): |
+ |
+ def test_supply_issuer(self): |
+ issuer = "https://issuer.com" |
+ jwks_uri = "https://issuer.com/jwks/uri" |
+ configs = {issuer: suppliers.IssuerUriConfig(False, jwks_uri)} |
+ supplier = suppliers.KeyUriSupplier(configs) |
+ self.assertEquals(jwks_uri, supplier.supply(issuer)) |
+ self.assertIsNone(supplier.supply("random-issuer")) |
+ |
+ def test_openid_discovery(self): |
+ jwks_uri = "https://issuer.com/jwks/uri" |
+ @httmock.urlmatch(scheme="https", netloc="issuer.com", |
+ path="/" + suppliers._OPEN_ID_CONFIG_PATH) |
+ def _mock_response(url, request): # pylint: disable=unused-argument |
+ response = {"jwks_uri": jwks_uri} |
+ return json.dumps(response) |
+ |
+ issuer = "https://issuer.com" |
+ configs = {issuer: suppliers.IssuerUriConfig(True, None)} |
+ supplier = suppliers.KeyUriSupplier(configs) |
+ with httmock.HTTMock(_mock_response): |
+ self.assertEquals(jwks_uri, supplier.supply(issuer)) |
+ |
+ def test_issuer_without_protocol(self): |
+ jwks_uri = "https://issuer.com/jwks/uri" |
+ @httmock.urlmatch(scheme="https", netloc="issuer.com", |
+ path="/" + suppliers._OPEN_ID_CONFIG_PATH) |
+ def _mock_response(url, request): # pylint: disable=unused-argument |
+ response = {"jwks_uri": jwks_uri} |
+ return json.dumps(response) |
+ |
+ # Specify an issuer without protocol to make sure the "https://" prefix is |
+ # added automatically. |
+ issuer = "issuer.com" |
+ configs = {issuer: suppliers.IssuerUriConfig(True, None)} |
+ supplier = suppliers.KeyUriSupplier(configs) |
+ with httmock.HTTMock(_mock_response): |
+ self.assertEquals(jwks_uri, supplier.supply(issuer)) |
+ |
+ def test_openid_discovery_with_bad_json(self): |
+ @httmock.urlmatch(scheme="https", netloc="issuer.com") |
+ def _mock_response_with_bad_json(url, request): # pylint: disable=unused-argument |
+ return "bad-json" |
+ |
+ issuer = "https://issuer.com" |
+ configs = {issuer: suppliers.IssuerUriConfig(True, None)} |
+ supplier = suppliers.KeyUriSupplier(configs) |
+ with httmock.HTTMock(_mock_response_with_bad_json): |
+ with self.assertRaises(suppliers.UnauthenticatedException): |
+ supplier.supply(issuer) |
+ |
+ |
+class JwksSupplierTest(unittest.TestCase): |
+ _mock_timer = mock.MagicMock() |
+ |
+ def setUp(self): |
+ self._key_uri_supplier = mock.MagicMock() |
+ self._jwks_uri_supplier = suppliers.JwksSupplier(self._key_uri_supplier) |
+ |
+ def test_supply_with_unknown_issuer(self): |
+ self._key_uri_supplier.supply.return_value = None |
+ issuer = "unknown-issuer" |
+ expected_message = "Cannot find the `jwks_uri` for issuer " + issuer |
+ with self.assertRaisesRegexp(suppliers.UnauthenticatedException, |
+ expected_message): |
+ self._jwks_uri_supplier.supply(issuer) |
+ |
+ def test_supply_with_invalid_json_response(self): |
+ scheme = "https" |
+ issuer = "issuer.com" |
+ self._key_uri_supplier.supply.return_value = scheme + "://" + issuer |
+ |
+ @httmock.urlmatch(scheme=scheme, netloc=issuer) |
+ def _mock_response_with_invalid_json(url, response): # pylint: disable=unused-argument |
+ return "invalid-json" |
+ |
+ with httmock.HTTMock(_mock_response_with_invalid_json): |
+ with self.assertRaises(suppliers.UnauthenticatedException): |
+ self._jwks_uri_supplier.supply(issuer) |
+ |
+ def test_supply_jwks(self): |
+ rsa_key = PublicKey.RSA.generate(2048) |
+ jwks = jwk.KEYS() |
+ jwks.wrap_add(rsa_key) |
+ |
+ scheme = "https" |
+ issuer = "issuer.com" |
+ self._key_uri_supplier.supply.return_value = scheme + "://" + issuer |
+ |
+ @httmock.urlmatch(scheme=scheme, netloc=issuer) |
+ def _mock_response_with_jwks(url, response): # pylint: disable=unused-argument |
+ return jwks.dump_jwks() |
+ |
+ with httmock.HTTMock(_mock_response_with_jwks): |
+ actual_jwks = self._jwks_uri_supplier.supply(issuer) |
+ self.assertEquals(1, len(actual_jwks)) |
+ actual_key = actual_jwks[0].key |
+ self.assertEquals(rsa_key.n, actual_key.n) |
+ self.assertEquals(rsa_key.e, actual_key.e) |
+ |
+ def test_supply_jwks_with_x509_certificate(self): |
+ rsa_key = PublicKey.RSA.generate(2048) |
+ cert = rsa_key.publickey().exportKey("PEM") |
+ kid = "rsa-cert" |
+ |
+ scheme = "https" |
+ issuer = "issuer.com" |
+ self._key_uri_supplier.supply.return_value = scheme + "://" + issuer |
+ |
+ @httmock.urlmatch(scheme=scheme, netloc=issuer) |
+ def _mock_response_with_x509_certificates(url, response): # pylint: disable=unused-argument |
+ return json.dumps({kid: cert}) |
+ |
+ with httmock.HTTMock(_mock_response_with_x509_certificates): |
+ actual_jwks = self._jwks_uri_supplier.supply(issuer) |
+ self.assertEquals(1, len(actual_jwks)) |
+ actual_key = actual_jwks[0].key |
+ |
+ self.assertEquals(kid, actual_jwks[0].kid) |
+ self.assertEquals(rsa_key.n, actual_key.n) |
+ self.assertEquals(rsa_key.e, actual_key.e) |
+ |
+ def test_supply_empty_x509_certificate(self): |
+ scheme = "https" |
+ issuer = "issuer.com" |
+ self._key_uri_supplier.supply.return_value = scheme + "://" + issuer |
+ |
+ @httmock.urlmatch(scheme=scheme, netloc=issuer) |
+ def _mock_invalid_response(url, response): # pylint: disable=unused-argument |
+ return json.dumps({"kid": "invlid-certificate"}) |
+ |
+ with httmock.HTTMock(_mock_invalid_response): |
+ with self.assertRaises(suppliers.UnauthenticatedException): |
+ self._jwks_uri_supplier.supply(issuer) |
+ |
+ @mock.patch("time.time", _mock_timer) |
+ def test_supply_cached_jwks(self): |
+ rsa_key = PublicKey.RSA.generate(2048) |
+ jwks = jwk.KEYS() |
+ jwks.wrap_add(rsa_key) |
+ |
+ scheme = "https" |
+ issuer = "issuer.com" |
+ self._key_uri_supplier.supply.return_value = scheme + "://" + issuer |
+ |
+ @httmock.urlmatch(scheme=scheme, netloc=issuer) |
+ def _mock_response_with_jwks(url, response): # pylint: disable=unused-argument |
+ return jwks.dump_jwks() |
+ |
+ with httmock.HTTMock(_mock_response_with_jwks): |
+ JwksSupplierTest._mock_timer.return_value = 10 |
+ self.assertEqual(1, len(self._jwks_uri_supplier.supply(issuer))) |
+ |
+ # Add an additional key to the JWKS to be returned by the HTTP request. |
+ jwks.wrap_add(PublicKey.RSA.generate(2048)) |
+ |
+ # Forward the clock by 1 second. The JWKS should remain cached. |
+ JwksSupplierTest._mock_timer.return_value += 1 |
+ self._jwks_uri_supplier.supply(issuer) |
+ self.assertEqual(1, len(self._jwks_uri_supplier.supply(issuer))) |
+ |
+ # Forward the clock by 5 minutes. The cache entry should have expired so |
+ # the returned JWKS should be the updated one with two keys. |
+ JwksSupplierTest._mock_timer.return_value += 5 * 60 |
+ self._jwks_uri_supplier.supply(issuer) |
+ self.assertEqual(2, len(self._jwks_uri_supplier.supply(issuer))) |