-
Notifications
You must be signed in to change notification settings - Fork 3.5k
Expand file tree
/
Copy pathVerifyTest.php
More file actions
147 lines (128 loc) · 5.23 KB
/
VerifyTest.php
File metadata and controls
147 lines (128 loc) · 5.23 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
<?php
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
namespace Google\Tests\AccessToken;
use Firebase\JWT\JWT;
use Google\AccessToken\Verify;
use Google\Tests\BaseTest;
use ReflectionMethod;
use phpseclib3\Crypt\AES;
class VerifyTest extends BaseTest
{
/**
* This test needs to run before the other verify tests,
* to ensure the constants are not defined.
*/
public function testPhpsecConstants()
{
$client = $this->getClient();
$verify = new Verify($client->getHttpClient());
// set these to values that will be changed
if (defined('MATH_BIGINTEGER_OPENSSL_ENABLED') || defined('CRYPT_RSA_MODE')) {
$this->markTestSkipped('Cannot run test - constants already defined');
}
// Pretend we are on App Engine VMs
putenv('GAE_VM=1');
$verify->verifyIdToken('a.b.c');
putenv('GAE_VM=0');
$openSslEnable = constant('MATH_BIGINTEGER_OPENSSL_ENABLED');
$rsaMode = constant('CRYPT_RSA_MODE');
$this->assertTrue($openSslEnable);
$this->assertEquals(AES::ENGINE_OPENSSL, $rsaMode);
}
/**
* Most of the logic for ID token validation is in AuthTest -
* this is just a general check to ensure we verify a valid
* id token if one exists.
*/
public function testValidateIdToken()
{
$this->checkToken();
$jwt = new JWT();
$client = $this->getClient();
$http = $client->getHttpClient();
$token = $client->getAccessToken();
if ($client->isAccessTokenExpired()) {
$token = $client->fetchAccessTokenWithRefreshToken();
}
$segments = explode('.', $token['id_token']);
$this->assertCount(3, $segments);
// Extract the client ID in this case as it wont be set on the test client.
$data = json_decode($jwt->urlSafeB64Decode($segments[1]));
$verify = new Verify($http);
$payload = $verify->verifyIdToken($token['id_token'], $data->aud);
$this->assertArrayHasKey('sub', $payload);
$this->assertGreaterThan(0, strlen($payload['sub']));
// TODO: Need to be smart about testing/disabling the
// caching for this test to make sense. Not sure how to do that
// at the moment.
$client = $this->getClient();
$http = $client->getHttpClient();
$data = json_decode($jwt->urlSafeB64Decode($segments[1]));
$verify = new Verify($http);
$payload = $verify->verifyIdToken($token['id_token'], $data->aud);
$this->assertArrayHasKey('sub', $payload);
$this->assertGreaterThan(0, strlen($payload['sub']));
}
/**
* Most of the logic for ID token validation is in AuthTest -
* this is just a general check to ensure we verify a valid
* id token if one exists.
*/
public function testLeewayIsUnchangedWhenPassingInJwt()
{
$this->checkToken();
$jwt = new JWT();
// set arbitrary leeway so we can check this later
$jwt::$leeway = $leeway = 1.5;
$client = $this->getClient();
$token = $client->getAccessToken();
if ($client->isAccessTokenExpired()) {
$token = $client->fetchAccessTokenWithRefreshToken();
}
$segments = explode('.', $token['id_token']);
$this->assertCount(3, $segments);
// Extract the client ID in this case as it wont be set on the test client.
$data = json_decode($jwt->urlSafeB64Decode($segments[1]));
$verify = new Verify($client->getHttpClient(), null, $jwt);
$payload = $verify->verifyIdToken($token['id_token'], $data->aud);
// verify the leeway is set as it was
$this->assertEquals($leeway, $jwt::$leeway);
}
public function testRetrieveCertsFromLocation()
{
$client = $this->getClient();
$verify = new Verify($client->getHttpClient());
// make this method public for testing purposes
$method = new ReflectionMethod($verify, 'retrieveCertsFromLocation');
$method->setAccessible(true);
$certs = $method->invoke($verify, Verify::FEDERATED_SIGNON_CERT_URL);
$this->assertArrayHasKey('keys', $certs);
$this->assertGreaterThan(1, count($certs['keys']));
$this->assertArrayHasKey('alg', $certs['keys'][0]);
$this->assertEquals('RS256', $certs['keys'][0]['alg']);
}
public function getClient()
{
if (!$this->client) {
$this->client = $this->createClient(['profile']);
}
return $this->client;
}
}