/* * Copyright 2012-2017 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.springframework.security.oauth2.provider.token.store.jwk; import org.junit.Rule; import org.junit.Test; import org.junit.rules.ExpectedException; import org.springframework.security.oauth2.common.exceptions.InvalidTokenException; import static org.mockito.Mockito.mock; import static org.mockito.Mockito.when; import static org.springframework.security.oauth2.provider.token.store.jwk.JwtTestUtil.createJwt; import static org.springframework.security.oauth2.provider.token.store.jwk.JwtTestUtil.createJwtHeader; /** * @author Joe Grandja */ public class JwkVerifyingJwtAccessTokenConverterTest { @Rule public ExpectedException thrown = ExpectedException.none(); @Test public void encodeWhenCalledThenThrowJwkException() throws Exception { this.thrown.expect(JwkException.class); this.thrown.expectMessage("JWT signing (JWS) is not supported."); JwkVerifyingJwtAccessTokenConverter accessTokenConverter = new JwkVerifyingJwtAccessTokenConverter(mock(JwkDefinitionSource.class)); accessTokenConverter.encode(null, null); } @Test public void decodeWhenKeyIdHeaderMissingThenThrowJwkException() throws Exception { this.thrown.expect(InvalidTokenException.class); this.thrown.expectMessage("Invalid JWT/JWS: kid is a required JOSE Header"); JwkVerifyingJwtAccessTokenConverter accessTokenConverter = new JwkVerifyingJwtAccessTokenConverter(mock(JwkDefinitionSource.class)); String jwt = createJwt(createJwtHeader(null, JwkDefinition.CryptoAlgorithm.RS256)); accessTokenConverter.decode(jwt); } @Test public void decodeWhenKeyIdHeaderInvalidThenThrowJwkException() throws Exception { this.thrown.expect(InvalidTokenException.class); this.thrown.expectMessage("Invalid JOSE Header kid (invalid-key-id)"); JwkDefinition jwkDefinition = this.createRSAJwkDefinition("key-id-1", JwkDefinition.CryptoAlgorithm.RS256); JwkDefinitionSource jwkDefinitionSource = mock(JwkDefinitionSource.class); when(jwkDefinitionSource.getDefinitionLoadIfNecessary("key-id-1")).thenReturn(jwkDefinition); JwkVerifyingJwtAccessTokenConverter accessTokenConverter = new JwkVerifyingJwtAccessTokenConverter(jwkDefinitionSource); String jwt = createJwt(createJwtHeader("invalid-key-id", JwkDefinition.CryptoAlgorithm.RS256)); accessTokenConverter.decode(jwt); } @Test public void decodeWhenAlgorithmHeaderMissingThenThrowJwkException() throws Exception { this.thrown.expect(InvalidTokenException.class); this.thrown.expectMessage("Invalid JWT/JWS: alg is a required JOSE Header"); JwkDefinition jwkDefinition = this.createRSAJwkDefinition("key-id-1", JwkDefinition.CryptoAlgorithm.RS256); JwkDefinitionSource jwkDefinitionSource = mock(JwkDefinitionSource.class); when(jwkDefinitionSource.getDefinitionLoadIfNecessary("key-id-1")).thenReturn(jwkDefinition); JwkVerifyingJwtAccessTokenConverter accessTokenConverter = new JwkVerifyingJwtAccessTokenConverter(jwkDefinitionSource); String jwt = createJwt(createJwtHeader("key-id-1", null)); accessTokenConverter.decode(jwt); } @Test public void decodeWhenAlgorithmHeaderDoesNotMatchJwkAlgorithmThenThrowJwkException() throws Exception { this.thrown.expect(InvalidTokenException.class); this.thrown.expectMessage("Invalid JOSE Header alg (RS512) " + "does not match algorithm associated to JWK with kid (key-id-1)"); JwkDefinition jwkDefinition = this.createRSAJwkDefinition("key-id-1", JwkDefinition.CryptoAlgorithm.RS256); JwkDefinitionSource jwkDefinitionSource = mock(JwkDefinitionSource.class); when(jwkDefinitionSource.getDefinitionLoadIfNecessary("key-id-1")).thenReturn(jwkDefinition); JwkVerifyingJwtAccessTokenConverter accessTokenConverter = new JwkVerifyingJwtAccessTokenConverter(jwkDefinitionSource); String jwt = createJwt(createJwtHeader("key-id-1", JwkDefinition.CryptoAlgorithm.RS512)); accessTokenConverter.decode(jwt); } private JwkDefinition createRSAJwkDefinition(String keyId, JwkDefinition.CryptoAlgorithm algorithm) { return createRSAJwkDefinition(JwkDefinition.KeyType.RSA, keyId, JwkDefinition.PublicKeyUse.SIG, algorithm, "AMh-pGAj9vX2gwFDyrXot1f2YfHgh8h0Qx6w9IqLL", "AQAB"); } private JwkDefinition createRSAJwkDefinition(JwkDefinition.KeyType keyType, String keyId, JwkDefinition.PublicKeyUse publicKeyUse, JwkDefinition.CryptoAlgorithm algorithm, String modulus, String exponent) { return new RsaJwkDefinition(keyId, publicKeyUse, algorithm, modulus, exponent); } }