|
| 1 | +use axum::{ |
| 2 | + Json, Router, |
| 3 | + body::{self, Body}, |
| 4 | + http::{Request, StatusCode}, |
| 5 | + response::IntoResponse, |
| 6 | + routing::get, |
| 7 | +}; |
| 8 | +use jsonwebtoken::{Algorithm, EncodingKey, Header, encode}; |
| 9 | +use serde_json::json; |
| 10 | +use tower::ServiceExt; |
| 11 | +use uselesskey_axum::{ |
| 12 | + DeterministicJwksPhase, MockJwtVerifierState, RotationPhase, TestAuthContext, |
| 13 | + inject_auth_context_layer, jwks_router, mock_jwt_verifier_layer, oidc_router, |
| 14 | +}; |
| 15 | +use uselesskey_core::{Factory, Seed}; |
| 16 | +use uselesskey_rsa::{RsaFactoryExt, RsaSpec}; |
| 17 | + |
| 18 | +fn auth_state() -> MockJwtVerifierState { |
| 19 | + let seed = Seed::from_env_value("uselesskey-axum-integration-v1").expect("seed"); |
| 20 | + let phase = DeterministicJwksPhase::new( |
| 21 | + seed, |
| 22 | + "auth-suite", |
| 23 | + RotationPhase::Primary, |
| 24 | + "https://issuer.example.test", |
| 25 | + "api://example-aud", |
| 26 | + ); |
| 27 | + MockJwtVerifierState::new(phase) |
| 28 | +} |
| 29 | + |
| 30 | +fn signer_fixture() -> (uselesskey_rsa::RsaKeyPair, String, String) { |
| 31 | + let fx = |
| 32 | + Factory::deterministic(Seed::from_env_value("uselesskey-axum-signer-v1").expect("seed")); |
| 33 | + let key = fx.rsa("auth-suite-signer", RsaSpec::rs256()); |
| 34 | + let issuer = "https://issuer.example.test".to_string(); |
| 35 | + let audience = "api://example-aud".to_string(); |
| 36 | + (key, issuer, audience) |
| 37 | +} |
| 38 | + |
| 39 | +fn signed_token(key: &uselesskey_rsa::RsaKeyPair, claims: serde_json::Value, kid: &str) -> String { |
| 40 | + let mut header = Header::new(Algorithm::RS256); |
| 41 | + header.kid = Some(kid.to_owned()); |
| 42 | + |
| 43 | + encode( |
| 44 | + &header, |
| 45 | + &claims, |
| 46 | + &EncodingKey::from_rsa_pem(key.private_key_pkcs8_pem().as_bytes()) |
| 47 | + .expect("valid private key PEM"), |
| 48 | + ) |
| 49 | + .expect("token encoding should succeed") |
| 50 | +} |
| 51 | + |
| 52 | +#[tokio::test] |
| 53 | +async fn jwks_and_oidc_routes_round_trip() { |
| 54 | + let state = auth_state(); |
| 55 | + let app = Router::new() |
| 56 | + .merge(jwks_router(state.clone())) |
| 57 | + .merge(oidc_router(state.clone(), "https://issuer.example.test")); |
| 58 | + |
| 59 | + let jwks_response = app |
| 60 | + .clone() |
| 61 | + .oneshot( |
| 62 | + Request::builder() |
| 63 | + .uri("/.well-known/jwks.json") |
| 64 | + .body(Body::empty()) |
| 65 | + .unwrap(), |
| 66 | + ) |
| 67 | + .await |
| 68 | + .unwrap(); |
| 69 | + assert_eq!(jwks_response.status(), StatusCode::OK); |
| 70 | + let jwks_body = body::to_bytes(jwks_response.into_body(), usize::MAX) |
| 71 | + .await |
| 72 | + .unwrap(); |
| 73 | + assert_eq!( |
| 74 | + serde_json::from_slice::<serde_json::Value>(&jwks_body).unwrap(), |
| 75 | + state.jwks_json() |
| 76 | + ); |
| 77 | + |
| 78 | + let oidc_response = app |
| 79 | + .oneshot( |
| 80 | + Request::builder() |
| 81 | + .uri("/.well-known/openid-configuration") |
| 82 | + .body(Body::empty()) |
| 83 | + .unwrap(), |
| 84 | + ) |
| 85 | + .await |
| 86 | + .unwrap(); |
| 87 | + assert_eq!(oidc_response.status(), StatusCode::OK); |
| 88 | + let oidc_body = body::to_bytes(oidc_response.into_body(), usize::MAX) |
| 89 | + .await |
| 90 | + .unwrap(); |
| 91 | + assert_eq!( |
| 92 | + serde_json::from_slice::<serde_json::Value>(&oidc_body).unwrap(), |
| 93 | + state.oidc_json("https://issuer.example.test") |
| 94 | + ); |
| 95 | +} |
| 96 | + |
| 97 | +#[tokio::test] |
| 98 | +async fn verifier_accepts_valid_bearer_token_and_injects_context() { |
| 99 | + let state = auth_state(); |
| 100 | + let token = state.issue_token(json!({"sub":"alice"}), 300); |
| 101 | + |
| 102 | + let app = mock_jwt_verifier_layer( |
| 103 | + Router::new().route( |
| 104 | + "/me", |
| 105 | + get(|auth: TestAuthContext| async move { |
| 106 | + Json(json!({ |
| 107 | + "sub": auth.sub, |
| 108 | + "iss": auth.iss, |
| 109 | + "aud": auth.aud, |
| 110 | + "kid": auth.kid, |
| 111 | + })) |
| 112 | + .into_response() |
| 113 | + }), |
| 114 | + ), |
| 115 | + state.clone(), |
| 116 | + ); |
| 117 | + |
| 118 | + let response = app |
| 119 | + .oneshot( |
| 120 | + Request::builder() |
| 121 | + .uri("/me") |
| 122 | + .header("authorization", format!("Bearer {token}")) |
| 123 | + .body(Body::empty()) |
| 124 | + .unwrap(), |
| 125 | + ) |
| 126 | + .await |
| 127 | + .unwrap(); |
| 128 | + assert_eq!(response.status(), StatusCode::OK); |
| 129 | + |
| 130 | + let body = body::to_bytes(response.into_body(), usize::MAX) |
| 131 | + .await |
| 132 | + .unwrap(); |
| 133 | + let value = serde_json::from_slice::<serde_json::Value>(&body).unwrap(); |
| 134 | + assert_eq!(value["sub"], "alice"); |
| 135 | + assert_eq!(value["iss"], "https://issuer.example.test"); |
| 136 | + assert_eq!(value["aud"], "api://example-aud"); |
| 137 | + assert_eq!(value["kid"], state.expectations().kid); |
| 138 | +} |
| 139 | + |
| 140 | +#[tokio::test] |
| 141 | +async fn verifier_rejects_wrong_audience_and_expired_tokens() { |
| 142 | + let state = auth_state(); |
| 143 | + let (key, issuer, audience) = signer_fixture(); |
| 144 | + |
| 145 | + let app = mock_jwt_verifier_layer( |
| 146 | + Router::new().route("/me", get(|| async { StatusCode::OK })), |
| 147 | + state.clone(), |
| 148 | + ); |
| 149 | + |
| 150 | + let wrong_aud = signed_token( |
| 151 | + &key, |
| 152 | + json!({ |
| 153 | + "sub": "alice", |
| 154 | + "iss": issuer, |
| 155 | + "aud": "api://wrong-aud", |
| 156 | + "exp": 4_102_444_800i64, |
| 157 | + }), |
| 158 | + &state.expectations().kid, |
| 159 | + ); |
| 160 | + let wrong_aud_response = app |
| 161 | + .clone() |
| 162 | + .oneshot( |
| 163 | + Request::builder() |
| 164 | + .uri("/me") |
| 165 | + .header("authorization", format!("Bearer {wrong_aud}")) |
| 166 | + .body(Body::empty()) |
| 167 | + .unwrap(), |
| 168 | + ) |
| 169 | + .await |
| 170 | + .unwrap(); |
| 171 | + assert_eq!(wrong_aud_response.status(), StatusCode::UNAUTHORIZED); |
| 172 | + |
| 173 | + let now = std::time::SystemTime::now() |
| 174 | + .duration_since(std::time::UNIX_EPOCH) |
| 175 | + .expect("unix time") |
| 176 | + .as_secs() as i64; |
| 177 | + let expired = signed_token( |
| 178 | + &key, |
| 179 | + json!({ |
| 180 | + "sub": "alice", |
| 181 | + "iss": issuer, |
| 182 | + "aud": audience, |
| 183 | + "exp": now.saturating_sub(5), |
| 184 | + }), |
| 185 | + &state.expectations().kid, |
| 186 | + ); |
| 187 | + let expired_response = app |
| 188 | + .oneshot( |
| 189 | + Request::builder() |
| 190 | + .uri("/me") |
| 191 | + .header("authorization", format!("Bearer {expired}")) |
| 192 | + .body(Body::empty()) |
| 193 | + .unwrap(), |
| 194 | + ) |
| 195 | + .await |
| 196 | + .unwrap(); |
| 197 | + assert_eq!(expired_response.status(), StatusCode::UNAUTHORIZED); |
| 198 | +} |
| 199 | + |
| 200 | +#[tokio::test] |
| 201 | +async fn auth_context_injection_layer_works_without_jwt_parsing() { |
| 202 | + let app = inject_auth_context_layer( |
| 203 | + Router::new().route( |
| 204 | + "/me", |
| 205 | + get(|auth: TestAuthContext| async move { |
| 206 | + Json(json!({ |
| 207 | + "sub": auth.sub, |
| 208 | + "kid": auth.kid, |
| 209 | + })) |
| 210 | + .into_response() |
| 211 | + }), |
| 212 | + ), |
| 213 | + TestAuthContext { |
| 214 | + sub: "test-user".into(), |
| 215 | + iss: "iss".into(), |
| 216 | + aud: "aud".into(), |
| 217 | + kid: "kid-1".into(), |
| 218 | + exp: 42, |
| 219 | + }, |
| 220 | + ); |
| 221 | + |
| 222 | + let response = app |
| 223 | + .oneshot(Request::builder().uri("/me").body(Body::empty()).unwrap()) |
| 224 | + .await |
| 225 | + .unwrap(); |
| 226 | + assert_eq!(response.status(), StatusCode::OK); |
| 227 | + |
| 228 | + let body = body::to_bytes(response.into_body(), usize::MAX) |
| 229 | + .await |
| 230 | + .unwrap(); |
| 231 | + let value = serde_json::from_slice::<serde_json::Value>(&body).unwrap(); |
| 232 | + assert_eq!(value["sub"], "test-user"); |
| 233 | + assert_eq!(value["kid"], "kid-1"); |
| 234 | +} |
0 commit comments