jwt_verifier_test.cc 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648
  1. /*
  2. *
  3. * Copyright 2015 gRPC authors.
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License");
  6. * you may not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at
  8. *
  9. * http://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS,
  13. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. *
  17. */
  18. #include "src/core/lib/security/credentials/jwt/jwt_verifier.h"
  19. #include <string.h>
  20. #include <grpc/grpc.h>
  21. #include <grpc/slice.h>
  22. #include <grpc/support/alloc.h>
  23. #include <grpc/support/log.h>
  24. #include <grpc/support/string_util.h>
  25. #include "src/core/lib/http/httpcli.h"
  26. #include "src/core/lib/security/credentials/jwt/json_token.h"
  27. #include "src/core/lib/slice/b64.h"
  28. #include "test/core/util/test_config.h"
  29. using grpc_core::Json;
  30. /* This JSON key was generated with the GCE console and revoked immediately.
  31. The identifiers have been changed as well.
  32. Maximum size for a string literal is 509 chars in C89, yay! */
  33. static const char json_key_str_part1[] =
  34. "{ \"private_key\": \"-----BEGIN PRIVATE KEY-----"
  35. "\\nMIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAOEvJsnoHnyHkXcp\\n7mJE"
  36. "qg"
  37. "WGjiw71NfXByguekSKho65FxaGbsnSM9SMQAqVk7Q2rG+I0OpsT0LrWQtZ\\nyjSeg/"
  38. "rWBQvS4hle4LfijkP3J5BG+"
  39. "IXDMP8RfziNRQsenAXDNPkY4kJCvKux2xdD\\nOnVF6N7dL3nTYZg+"
  40. "uQrNsMTz9UxVAgMBAAECgYEAzbLewe1xe9vy+2GoSsfib+28\\nDZgSE6Bu/"
  41. "zuFoPrRc6qL9p2SsnV7txrunTyJkkOnPLND9ABAXybRTlcVKP/sGgza\\n/"
  42. "8HpCqFYM9V8f34SBWfD4fRFT+n/"
  43. "73cfRUtGXdXpseva2lh8RilIQfPhNZAncenU\\ngqXjDvpkypEusgXAykECQQD+";
  44. static const char json_key_str_part2[] =
  45. "53XxNVnxBHsYb+AYEfklR96yVi8HywjVHP34+OQZ\\nCslxoHQM8s+"
  46. "dBnjfScLu22JqkPv04xyxmt0QAKm9+vTdAkEA4ib7YvEAn2jXzcCI\\nEkoy2L/"
  47. "XydR1GCHoacdfdAwiL2npOdnbvi4ZmdYRPY1LSTO058tQHKVXV7NLeCa3\\nAARh2QJBAMKeDA"
  48. "G"
  49. "W303SQv2cZTdbeaLKJbB5drz3eo3j7dDKjrTD9JupixFbzcGw\\n8FZi5c8idxiwC36kbAL6Hz"
  50. "A"
  51. "ZoX+ofI0CQE6KCzPJTtYNqyShgKAZdJ8hwOcvCZtf\\n6z8RJm0+"
  52. "6YBd38lfh5j8mZd7aHFf6I17j5AQY7oPEc47TjJj/"
  53. "5nZ68ECQQDvYuI3\\nLyK5fS8g0SYbmPOL9TlcHDOqwG0mrX9qpg5DC2fniXNSrrZ64GTDKdzZ"
  54. "Y"
  55. "Ap6LI9W\\nIqv4vr6y38N79TTC\\n-----END PRIVATE KEY-----\\n\", ";
  56. static const char json_key_str_part3_for_google_email_issuer[] =
  57. "\"private_key_id\": \"e6b5137873db8d2ef81e06a47289e6434ec8a165\", "
  58. "\"client_email\": "
  59. "\"777-abaslkan11hlb6nmim3bpspl31ud@developer.gserviceaccount."
  60. "com\", \"client_id\": "
  61. "\"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent."
  62. "com\", \"type\": \"service_account\" }";
  63. /* Trick our JWT library into issuing a JWT with iss=accounts.google.com. */
  64. static const char json_key_str_part3_for_url_issuer[] =
  65. "\"private_key_id\": \"e6b5137873db8d2ef81e06a47289e6434ec8a165\", "
  66. "\"client_email\": \"accounts.google.com\", "
  67. "\"client_id\": "
  68. "\"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent."
  69. "com\", \"type\": \"service_account\" }";
  70. static const char json_key_str_part3_for_custom_email_issuer[] =
  71. "\"private_key_id\": \"e6b5137873db8d2ef81e06a47289e6434ec8a165\", "
  72. "\"client_email\": "
  73. "\"foo@bar.com\", \"client_id\": "
  74. "\"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent."
  75. "com\", \"type\": \"service_account\" }";
  76. static grpc_jwt_verifier_email_domain_key_url_mapping custom_mapping = {
  77. "bar.com", "keys.bar.com/jwk"};
  78. static const char expected_user_data[] = "user data";
  79. static const char good_jwk_set[] =
  80. "{"
  81. " \"keys\": ["
  82. " {"
  83. " \"kty\": \"RSA\","
  84. " \"alg\": \"RS256\","
  85. " \"use\": \"sig\","
  86. " \"kid\": \"e6b5137873db8d2ef81e06a47289e6434ec8a165\","
  87. " \"n\": "
  88. "\"4S8myegefIeRdynuYkSqBYaOLDvU19cHKC56RIqGjrkXFoZuydIz1IxACpWTtDasb4jQ6mxP"
  89. "QutZC1nKNJ6D-tYFC9LiGV7gt-KOQ_cnkEb4hcMw_xF_OI1FCx6cBcM0-"
  90. "RjiQkK8q7HbF0M6dUXo3t0vedNhmD65Cs2wxPP1TFU=\","
  91. " \"e\": \"AQAB\""
  92. " }"
  93. " ]"
  94. "}";
  95. static gpr_timespec expected_lifetime = {3600, 0, GPR_TIMESPAN};
  96. static const char good_google_email_keys_part1[] =
  97. "{\"e6b5137873db8d2ef81e06a47289e6434ec8a165\": \"-----BEGIN "
  98. "CERTIFICATE-----"
  99. "\\nMIICATCCAWoCCQDEywLhxvHjnDANBgkqhkiG9w0BAQsFADBFMQswCQYDVQQGEwJB\\nVTET"
  100. "MBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50ZXJuZXQgV2lkZ2l0\\ncyBQdHkgTHR"
  101. "kMB4XDTE1MDYyOTA4Mzk1MFoXDTI1MDYyNjA4Mzk1MFowRTELMAkG\\nA1UEBhMCQVUxEzARBg"
  102. "NVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0\\nIFdpZGdpdHMgUHR5IEx0ZDCBn"
  103. "zANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4S8m\\nyegefIeRdynuYkSqBYaOLDvU19cHKC56"
  104. "RIqGjrkXFoZuydIz1IxACpWTtDasb4jQ\\n6mxPQutZC1nKNJ6D+tYFC9LiGV7gt+KOQ/";
  105. static const char good_google_email_keys_part2[] =
  106. "cnkEb4hcMw/xF/OI1FCx6cBcM0+"
  107. "Rji\\nQkK8q7HbF0M6dUXo3t0vedNhmD65Cs2wxPP1TFUCAwEAATANBgkqhkiG9w0BAQsF\\nA"
  108. "AOBgQBfu69FkPmBknbKNFgurPz78kbs3VNN+k/"
  109. "PUgO5DHKskJmgK2TbtvX2VMpx\\nkftmHGzgzMzUlOtigCaGMgHWjfqjpP9uuDbahXrZBJzB8c"
  110. "Oq7MrQF8r17qVvo3Ue\\nPjTKQMAsU8uxTEMmeuz9L6yExs0rfd6bPOrQkAoVfFfiYB3/"
  111. "pA==\\n-----END CERTIFICATE-----\\n\"}";
  112. static const char expected_audience[] = "https://foo.com";
  113. static const char good_openid_config[] =
  114. "{"
  115. " \"issuer\": \"https://accounts.google.com\","
  116. " \"authorization_endpoint\": "
  117. "\"https://accounts.google.com/o/oauth2/v2/auth\","
  118. " \"token_endpoint\": \"https://oauth2.googleapis.com/token\","
  119. " \"userinfo_endpoint\": \"https://www.googleapis.com/oauth2/v3/userinfo\","
  120. " \"revocation_endpoint\": \"https://oauth2.googleapis.com/revoke\","
  121. " \"jwks_uri\": \"https://www.googleapis.com/oauth2/v3/certs\""
  122. "}";
  123. static const char expired_claims[] =
  124. "{ \"aud\": \"https://foo.com\","
  125. " \"iss\": \"blah.foo.com\","
  126. " \"sub\": \"juju@blah.foo.com\","
  127. " \"jti\": \"jwtuniqueid\","
  128. " \"iat\": 100," /* Way back in the past... */
  129. " \"exp\": 120,"
  130. " \"nbf\": 60,"
  131. " \"foo\": \"bar\"}";
  132. static const char claims_without_time_constraint[] =
  133. "{ \"aud\": \"https://foo.com\","
  134. " \"iss\": \"blah.foo.com\","
  135. " \"sub\": \"juju@blah.foo.com\","
  136. " \"jti\": \"jwtuniqueid\","
  137. " \"foo\": \"bar\"}";
  138. static const char claims_with_bad_subject[] =
  139. "{ \"aud\": \"https://foo.com\","
  140. " \"iss\": \"evil@blah.foo.com\","
  141. " \"sub\": \"juju@blah.foo.com\","
  142. " \"jti\": \"jwtuniqueid\","
  143. " \"foo\": \"bar\"}";
  144. static const char invalid_claims[] =
  145. "{ \"aud\": \"https://foo.com\","
  146. " \"iss\": 46," /* Issuer cannot be a number. */
  147. " \"sub\": \"juju@blah.foo.com\","
  148. " \"jti\": \"jwtuniqueid\","
  149. " \"foo\": \"bar\"}";
  150. typedef struct {
  151. grpc_jwt_verifier_status expected_status;
  152. const char* expected_issuer;
  153. const char* expected_subject;
  154. } verifier_test_config;
  155. static void test_jwt_issuer_email_domain(void) {
  156. const char* d = grpc_jwt_issuer_email_domain("https://foo.com");
  157. GPR_ASSERT(d == nullptr);
  158. d = grpc_jwt_issuer_email_domain("foo.com");
  159. GPR_ASSERT(d == nullptr);
  160. d = grpc_jwt_issuer_email_domain("");
  161. GPR_ASSERT(d == nullptr);
  162. d = grpc_jwt_issuer_email_domain("@");
  163. GPR_ASSERT(d == nullptr);
  164. d = grpc_jwt_issuer_email_domain("bar@foo");
  165. GPR_ASSERT(strcmp(d, "foo") == 0);
  166. d = grpc_jwt_issuer_email_domain("bar@foo.com");
  167. GPR_ASSERT(strcmp(d, "foo.com") == 0);
  168. d = grpc_jwt_issuer_email_domain("bar@blah.foo.com");
  169. GPR_ASSERT(strcmp(d, "foo.com") == 0);
  170. d = grpc_jwt_issuer_email_domain("bar.blah@blah.foo.com");
  171. GPR_ASSERT(strcmp(d, "foo.com") == 0);
  172. d = grpc_jwt_issuer_email_domain("bar.blah@baz.blah.foo.com");
  173. GPR_ASSERT(strcmp(d, "foo.com") == 0);
  174. /* This is not a very good parser but make sure we do not crash on these weird
  175. inputs. */
  176. d = grpc_jwt_issuer_email_domain("@foo");
  177. GPR_ASSERT(strcmp(d, "foo") == 0);
  178. d = grpc_jwt_issuer_email_domain("bar@.");
  179. GPR_ASSERT(d != nullptr);
  180. d = grpc_jwt_issuer_email_domain("bar@..");
  181. GPR_ASSERT(d != nullptr);
  182. d = grpc_jwt_issuer_email_domain("bar@...");
  183. GPR_ASSERT(d != nullptr);
  184. }
  185. static void test_claims_success(void) {
  186. grpc_jwt_claims* claims;
  187. grpc_error_handle error = GRPC_ERROR_NONE;
  188. Json json = Json::Parse(claims_without_time_constraint, &error);
  189. if (error != GRPC_ERROR_NONE) {
  190. gpr_log(GPR_ERROR, "JSON parse error: %s",
  191. grpc_error_std_string(error).c_str());
  192. }
  193. GPR_ASSERT(error == GRPC_ERROR_NONE);
  194. GPR_ASSERT(json.type() == Json::Type::OBJECT);
  195. grpc_core::ExecCtx exec_ctx;
  196. claims = grpc_jwt_claims_from_json(json);
  197. GPR_ASSERT(claims != nullptr);
  198. GPR_ASSERT(*grpc_jwt_claims_json(claims) == json);
  199. GPR_ASSERT(strcmp(grpc_jwt_claims_audience(claims), "https://foo.com") == 0);
  200. GPR_ASSERT(strcmp(grpc_jwt_claims_issuer(claims), "blah.foo.com") == 0);
  201. GPR_ASSERT(strcmp(grpc_jwt_claims_subject(claims), "juju@blah.foo.com") == 0);
  202. GPR_ASSERT(strcmp(grpc_jwt_claims_id(claims), "jwtuniqueid") == 0);
  203. GPR_ASSERT(grpc_jwt_claims_check(claims, "https://foo.com") ==
  204. GRPC_JWT_VERIFIER_OK);
  205. grpc_jwt_claims_destroy(claims);
  206. }
  207. static void test_expired_claims_failure(void) {
  208. grpc_jwt_claims* claims;
  209. grpc_error_handle error = GRPC_ERROR_NONE;
  210. Json json = Json::Parse(expired_claims, &error);
  211. if (error != GRPC_ERROR_NONE) {
  212. gpr_log(GPR_ERROR, "JSON parse error: %s",
  213. grpc_error_std_string(error).c_str());
  214. }
  215. GPR_ASSERT(error == GRPC_ERROR_NONE);
  216. GPR_ASSERT(json.type() == Json::Type::OBJECT);
  217. gpr_timespec exp_iat = {100, 0, GPR_CLOCK_REALTIME};
  218. gpr_timespec exp_exp = {120, 0, GPR_CLOCK_REALTIME};
  219. gpr_timespec exp_nbf = {60, 0, GPR_CLOCK_REALTIME};
  220. grpc_core::ExecCtx exec_ctx;
  221. claims = grpc_jwt_claims_from_json(json);
  222. GPR_ASSERT(claims != nullptr);
  223. GPR_ASSERT(*grpc_jwt_claims_json(claims) == json);
  224. GPR_ASSERT(strcmp(grpc_jwt_claims_audience(claims), "https://foo.com") == 0);
  225. GPR_ASSERT(strcmp(grpc_jwt_claims_issuer(claims), "blah.foo.com") == 0);
  226. GPR_ASSERT(strcmp(grpc_jwt_claims_subject(claims), "juju@blah.foo.com") == 0);
  227. GPR_ASSERT(strcmp(grpc_jwt_claims_id(claims), "jwtuniqueid") == 0);
  228. GPR_ASSERT(gpr_time_cmp(grpc_jwt_claims_issued_at(claims), exp_iat) == 0);
  229. GPR_ASSERT(gpr_time_cmp(grpc_jwt_claims_expires_at(claims), exp_exp) == 0);
  230. GPR_ASSERT(gpr_time_cmp(grpc_jwt_claims_not_before(claims), exp_nbf) == 0);
  231. GPR_ASSERT(grpc_jwt_claims_check(claims, "https://foo.com") ==
  232. GRPC_JWT_VERIFIER_TIME_CONSTRAINT_FAILURE);
  233. grpc_jwt_claims_destroy(claims);
  234. }
  235. static void test_invalid_claims_failure(void) {
  236. grpc_error_handle error = GRPC_ERROR_NONE;
  237. Json json = Json::Parse(invalid_claims, &error);
  238. if (error != GRPC_ERROR_NONE) {
  239. gpr_log(GPR_ERROR, "JSON parse error: %s",
  240. grpc_error_std_string(error).c_str());
  241. }
  242. GPR_ASSERT(error == GRPC_ERROR_NONE);
  243. GPR_ASSERT(json.type() == Json::Type::OBJECT);
  244. grpc_core::ExecCtx exec_ctx;
  245. GPR_ASSERT(grpc_jwt_claims_from_json(json) == nullptr);
  246. }
  247. static void test_bad_audience_claims_failure(void) {
  248. grpc_jwt_claims* claims;
  249. grpc_error_handle error = GRPC_ERROR_NONE;
  250. Json json = Json::Parse(claims_without_time_constraint, &error);
  251. if (error != GRPC_ERROR_NONE) {
  252. gpr_log(GPR_ERROR, "JSON parse error: %s",
  253. grpc_error_std_string(error).c_str());
  254. }
  255. GPR_ASSERT(error == GRPC_ERROR_NONE);
  256. GPR_ASSERT(json.type() == Json::Type::OBJECT);
  257. grpc_core::ExecCtx exec_ctx;
  258. claims = grpc_jwt_claims_from_json(json);
  259. GPR_ASSERT(claims != nullptr);
  260. GPR_ASSERT(grpc_jwt_claims_check(claims, "https://bar.com") ==
  261. GRPC_JWT_VERIFIER_BAD_AUDIENCE);
  262. grpc_jwt_claims_destroy(claims);
  263. }
  264. static void test_bad_subject_claims_failure(void) {
  265. grpc_jwt_claims* claims;
  266. grpc_error_handle error = GRPC_ERROR_NONE;
  267. Json json = Json::Parse(claims_with_bad_subject, &error);
  268. if (error != GRPC_ERROR_NONE) {
  269. gpr_log(GPR_ERROR, "JSON parse error: %s",
  270. grpc_error_std_string(error).c_str());
  271. }
  272. GPR_ASSERT(error == GRPC_ERROR_NONE);
  273. GPR_ASSERT(json.type() == Json::Type::OBJECT);
  274. grpc_core::ExecCtx exec_ctx;
  275. claims = grpc_jwt_claims_from_json(json);
  276. GPR_ASSERT(claims != nullptr);
  277. GPR_ASSERT(grpc_jwt_claims_check(claims, "https://foo.com") ==
  278. GRPC_JWT_VERIFIER_BAD_SUBJECT);
  279. grpc_jwt_claims_destroy(claims);
  280. }
  281. static char* json_key_str(const char* last_part) {
  282. size_t result_len = strlen(json_key_str_part1) + strlen(json_key_str_part2) +
  283. strlen(last_part);
  284. char* result = static_cast<char*>(gpr_malloc(result_len + 1));
  285. char* current = result;
  286. strcpy(result, json_key_str_part1);
  287. current += strlen(json_key_str_part1);
  288. strcpy(current, json_key_str_part2);
  289. current += strlen(json_key_str_part2);
  290. strcpy(current, last_part);
  291. return result;
  292. }
  293. static char* good_google_email_keys(void) {
  294. size_t result_len = strlen(good_google_email_keys_part1) +
  295. strlen(good_google_email_keys_part2);
  296. char* result = static_cast<char*>(gpr_malloc(result_len + 1));
  297. char* current = result;
  298. strcpy(result, good_google_email_keys_part1);
  299. current += strlen(good_google_email_keys_part1);
  300. strcpy(current, good_google_email_keys_part2);
  301. return result;
  302. }
  303. static grpc_http_response http_response(int status, char* body) {
  304. grpc_http_response response;
  305. response = {};
  306. response.status = status;
  307. response.body = body;
  308. response.body_length = strlen(body);
  309. return response;
  310. }
  311. static int httpcli_post_should_not_be_called(
  312. const grpc_http_request* /*request*/, const char* /*host*/,
  313. const char* /*path*/, const char* /*body_bytes*/, size_t /*body_size*/,
  314. grpc_core::Timestamp /*deadline*/, grpc_closure* /*on_done*/,
  315. grpc_http_response* /*response*/) {
  316. GPR_ASSERT("HTTP POST should not be called" == nullptr);
  317. return 1;
  318. }
  319. static int httpcli_get_google_keys_for_email(
  320. const grpc_http_request* /*request*/, const char* host, const char* path,
  321. grpc_core::Timestamp /*deadline*/, grpc_closure* on_done,
  322. grpc_http_response* response) {
  323. *response = http_response(200, good_google_email_keys());
  324. GPR_ASSERT(strcmp(host, "www.googleapis.com") == 0);
  325. GPR_ASSERT(strcmp(path,
  326. "/robot/v1/metadata/x509/"
  327. "777-abaslkan11hlb6nmim3bpspl31ud@developer."
  328. "gserviceaccount.com") == 0);
  329. grpc_core::ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
  330. return 1;
  331. }
  332. static void on_verification_success(void* user_data,
  333. grpc_jwt_verifier_status status,
  334. grpc_jwt_claims* claims) {
  335. GPR_ASSERT(status == GRPC_JWT_VERIFIER_OK);
  336. GPR_ASSERT(claims != nullptr);
  337. GPR_ASSERT(user_data == (void*)expected_user_data);
  338. GPR_ASSERT(strcmp(grpc_jwt_claims_audience(claims), expected_audience) == 0);
  339. grpc_jwt_claims_destroy(claims);
  340. }
  341. static void test_jwt_verifier_google_email_issuer_success(void) {
  342. grpc_core::ExecCtx exec_ctx;
  343. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(nullptr, 0);
  344. char* jwt = nullptr;
  345. char* key_str = json_key_str(json_key_str_part3_for_google_email_issuer);
  346. grpc_auth_json_key key = grpc_auth_json_key_create_from_string(key_str);
  347. gpr_free(key_str);
  348. GPR_ASSERT(grpc_auth_json_key_is_valid(&key));
  349. grpc_core::HttpRequest::SetOverride(httpcli_get_google_keys_for_email,
  350. httpcli_post_should_not_be_called);
  351. jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime,
  352. nullptr);
  353. grpc_auth_json_key_destruct(&key);
  354. GPR_ASSERT(jwt != nullptr);
  355. grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience,
  356. on_verification_success,
  357. const_cast<char*>(expected_user_data));
  358. grpc_jwt_verifier_destroy(verifier);
  359. grpc_core::ExecCtx::Get()->Flush();
  360. gpr_free(jwt);
  361. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  362. }
  363. static int httpcli_get_custom_keys_for_email(
  364. const grpc_http_request* /*request*/, const char* host, const char* path,
  365. grpc_core::Timestamp /*deadline*/, grpc_closure* on_done,
  366. grpc_http_response* response) {
  367. *response = http_response(200, gpr_strdup(good_jwk_set));
  368. GPR_ASSERT(strcmp(host, "keys.bar.com") == 0);
  369. GPR_ASSERT(strcmp(path, "/jwk/foo@bar.com") == 0);
  370. grpc_core::ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
  371. return 1;
  372. }
  373. static void test_jwt_verifier_custom_email_issuer_success(void) {
  374. grpc_core::ExecCtx exec_ctx;
  375. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(&custom_mapping, 1);
  376. char* jwt = nullptr;
  377. char* key_str = json_key_str(json_key_str_part3_for_custom_email_issuer);
  378. grpc_auth_json_key key = grpc_auth_json_key_create_from_string(key_str);
  379. gpr_free(key_str);
  380. GPR_ASSERT(grpc_auth_json_key_is_valid(&key));
  381. grpc_core::HttpRequest::SetOverride(httpcli_get_custom_keys_for_email,
  382. httpcli_post_should_not_be_called);
  383. jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime,
  384. nullptr);
  385. grpc_auth_json_key_destruct(&key);
  386. GPR_ASSERT(jwt != nullptr);
  387. grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience,
  388. on_verification_success,
  389. const_cast<char*>(expected_user_data));
  390. grpc_jwt_verifier_destroy(verifier);
  391. grpc_core::ExecCtx::Get()->Flush();
  392. gpr_free(jwt);
  393. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  394. }
  395. static int httpcli_get_jwk_set(const grpc_http_request* /*request*/,
  396. const char* host, const char* path,
  397. grpc_core::Timestamp /*deadline*/,
  398. grpc_closure* on_done,
  399. grpc_http_response* response) {
  400. *response = http_response(200, gpr_strdup(good_jwk_set));
  401. GPR_ASSERT(strcmp(host, "www.googleapis.com") == 0);
  402. GPR_ASSERT(strcmp(path, "/oauth2/v3/certs") == 0);
  403. grpc_core::ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
  404. return 1;
  405. }
  406. static int httpcli_get_openid_config(const grpc_http_request* /*request*/,
  407. const char* host, const char* path,
  408. grpc_core::Timestamp /*deadline*/,
  409. grpc_closure* on_done,
  410. grpc_http_response* response) {
  411. *response = http_response(200, gpr_strdup(good_openid_config));
  412. GPR_ASSERT(strcmp(host, "accounts.google.com") == 0);
  413. GPR_ASSERT(strcmp(path, GRPC_OPENID_CONFIG_URL_SUFFIX) == 0);
  414. grpc_core::HttpRequest::SetOverride(httpcli_get_jwk_set,
  415. httpcli_post_should_not_be_called);
  416. grpc_core::ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
  417. return 1;
  418. }
  419. static void test_jwt_verifier_url_issuer_success(void) {
  420. grpc_core::ExecCtx exec_ctx;
  421. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(nullptr, 0);
  422. char* jwt = nullptr;
  423. char* key_str = json_key_str(json_key_str_part3_for_url_issuer);
  424. grpc_auth_json_key key = grpc_auth_json_key_create_from_string(key_str);
  425. gpr_free(key_str);
  426. GPR_ASSERT(grpc_auth_json_key_is_valid(&key));
  427. grpc_core::HttpRequest::SetOverride(httpcli_get_openid_config,
  428. httpcli_post_should_not_be_called);
  429. jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime,
  430. nullptr);
  431. grpc_auth_json_key_destruct(&key);
  432. GPR_ASSERT(jwt != nullptr);
  433. grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience,
  434. on_verification_success,
  435. const_cast<char*>(expected_user_data));
  436. grpc_jwt_verifier_destroy(verifier);
  437. grpc_core::ExecCtx::Get()->Flush();
  438. gpr_free(jwt);
  439. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  440. }
  441. static void on_verification_key_retrieval_error(void* user_data,
  442. grpc_jwt_verifier_status status,
  443. grpc_jwt_claims* claims) {
  444. GPR_ASSERT(status == GRPC_JWT_VERIFIER_KEY_RETRIEVAL_ERROR);
  445. GPR_ASSERT(claims == nullptr);
  446. GPR_ASSERT(user_data == (void*)expected_user_data);
  447. }
  448. static int httpcli_get_bad_json(const grpc_http_request* /* request */,
  449. const char* /*host*/, const char* /*path*/,
  450. grpc_core::Timestamp /*deadline*/,
  451. grpc_closure* on_done,
  452. grpc_http_response* response) {
  453. *response = http_response(200, gpr_strdup("{\"bad\": \"stuff\"}"));
  454. grpc_core::ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
  455. return 1;
  456. }
  457. static void test_jwt_verifier_url_issuer_bad_config(void) {
  458. grpc_core::ExecCtx exec_ctx;
  459. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(nullptr, 0);
  460. char* jwt = nullptr;
  461. char* key_str = json_key_str(json_key_str_part3_for_url_issuer);
  462. grpc_auth_json_key key = grpc_auth_json_key_create_from_string(key_str);
  463. gpr_free(key_str);
  464. GPR_ASSERT(grpc_auth_json_key_is_valid(&key));
  465. grpc_core::HttpRequest::SetOverride(httpcli_get_bad_json,
  466. httpcli_post_should_not_be_called);
  467. jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime,
  468. nullptr);
  469. grpc_auth_json_key_destruct(&key);
  470. GPR_ASSERT(jwt != nullptr);
  471. grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience,
  472. on_verification_key_retrieval_error,
  473. const_cast<char*>(expected_user_data));
  474. grpc_jwt_verifier_destroy(verifier);
  475. grpc_core::ExecCtx::Get()->Flush();
  476. gpr_free(jwt);
  477. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  478. }
  479. static void test_jwt_verifier_bad_json_key(void) {
  480. grpc_core::ExecCtx exec_ctx;
  481. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(nullptr, 0);
  482. char* jwt = nullptr;
  483. char* key_str = json_key_str(json_key_str_part3_for_google_email_issuer);
  484. grpc_auth_json_key key = grpc_auth_json_key_create_from_string(key_str);
  485. gpr_free(key_str);
  486. GPR_ASSERT(grpc_auth_json_key_is_valid(&key));
  487. grpc_core::HttpRequest::SetOverride(httpcli_get_bad_json,
  488. httpcli_post_should_not_be_called);
  489. jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime,
  490. nullptr);
  491. grpc_auth_json_key_destruct(&key);
  492. GPR_ASSERT(jwt != nullptr);
  493. grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience,
  494. on_verification_key_retrieval_error,
  495. const_cast<char*>(expected_user_data));
  496. grpc_jwt_verifier_destroy(verifier);
  497. grpc_core::ExecCtx::Get()->Flush();
  498. gpr_free(jwt);
  499. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  500. }
  501. static void corrupt_jwt_sig(char* jwt) {
  502. grpc_slice sig;
  503. char* bad_b64_sig;
  504. uint8_t* sig_bytes;
  505. char* last_dot = strrchr(jwt, '.');
  506. GPR_ASSERT(last_dot != nullptr);
  507. {
  508. grpc_core::ExecCtx exec_ctx;
  509. sig = grpc_base64_decode(last_dot + 1, 1);
  510. }
  511. GPR_ASSERT(!GRPC_SLICE_IS_EMPTY(sig));
  512. sig_bytes = GRPC_SLICE_START_PTR(sig);
  513. (*sig_bytes)++; /* Corrupt first byte. */
  514. bad_b64_sig = grpc_base64_encode(GRPC_SLICE_START_PTR(sig),
  515. GRPC_SLICE_LENGTH(sig), 1, 0);
  516. memcpy(last_dot + 1, bad_b64_sig, strlen(bad_b64_sig));
  517. gpr_free(bad_b64_sig);
  518. grpc_slice_unref(sig);
  519. }
  520. static void on_verification_bad_signature(void* user_data,
  521. grpc_jwt_verifier_status status,
  522. grpc_jwt_claims* claims) {
  523. GPR_ASSERT(status == GRPC_JWT_VERIFIER_BAD_SIGNATURE);
  524. GPR_ASSERT(claims == nullptr);
  525. GPR_ASSERT(user_data == (void*)expected_user_data);
  526. }
  527. static void test_jwt_verifier_bad_signature(void) {
  528. grpc_core::ExecCtx exec_ctx;
  529. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(nullptr, 0);
  530. char* jwt = nullptr;
  531. char* key_str = json_key_str(json_key_str_part3_for_url_issuer);
  532. grpc_auth_json_key key = grpc_auth_json_key_create_from_string(key_str);
  533. gpr_free(key_str);
  534. GPR_ASSERT(grpc_auth_json_key_is_valid(&key));
  535. grpc_core::HttpRequest::SetOverride(httpcli_get_openid_config,
  536. httpcli_post_should_not_be_called);
  537. jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime,
  538. nullptr);
  539. grpc_auth_json_key_destruct(&key);
  540. corrupt_jwt_sig(jwt);
  541. GPR_ASSERT(jwt != nullptr);
  542. grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience,
  543. on_verification_bad_signature,
  544. const_cast<char*>(expected_user_data));
  545. gpr_free(jwt);
  546. grpc_jwt_verifier_destroy(verifier);
  547. grpc_core::ExecCtx::Get()->Flush();
  548. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  549. }
  550. static int httpcli_get_should_not_be_called(
  551. const grpc_http_request* /*request*/, const char* /*host*/,
  552. const char* /*path*/, grpc_core::Timestamp /*deadline*/,
  553. grpc_closure* /*on_done*/, grpc_http_response* /*response*/) {
  554. GPR_ASSERT(0);
  555. return 1;
  556. }
  557. static void on_verification_bad_format(void* user_data,
  558. grpc_jwt_verifier_status status,
  559. grpc_jwt_claims* claims) {
  560. GPR_ASSERT(status == GRPC_JWT_VERIFIER_BAD_FORMAT);
  561. GPR_ASSERT(claims == nullptr);
  562. GPR_ASSERT(user_data == (void*)expected_user_data);
  563. }
  564. static void test_jwt_verifier_bad_format(void) {
  565. grpc_core::ExecCtx exec_ctx;
  566. grpc_jwt_verifier* verifier = grpc_jwt_verifier_create(nullptr, 0);
  567. grpc_core::HttpRequest::SetOverride(httpcli_get_should_not_be_called,
  568. httpcli_post_should_not_be_called);
  569. grpc_jwt_verifier_verify(verifier, nullptr, "bad jwt", expected_audience,
  570. on_verification_bad_format,
  571. const_cast<char*>(expected_user_data));
  572. grpc_jwt_verifier_destroy(verifier);
  573. grpc_core::ExecCtx::Get()->Flush();
  574. grpc_core::HttpRequest::SetOverride(nullptr, nullptr);
  575. }
  576. /* find verification key: bad jks, cannot find key in jks */
  577. /* bad signature custom provided email*/
  578. /* bad key */
  579. int main(int argc, char** argv) {
  580. grpc::testing::TestEnvironment env(argc, argv);
  581. grpc_init();
  582. test_jwt_issuer_email_domain();
  583. test_claims_success();
  584. test_expired_claims_failure();
  585. test_invalid_claims_failure();
  586. test_bad_audience_claims_failure();
  587. test_bad_subject_claims_failure();
  588. test_jwt_verifier_google_email_issuer_success();
  589. test_jwt_verifier_custom_email_issuer_success();
  590. test_jwt_verifier_url_issuer_success();
  591. test_jwt_verifier_url_issuer_bad_config();
  592. test_jwt_verifier_bad_json_key();
  593. test_jwt_verifier_bad_signature();
  594. test_jwt_verifier_bad_format();
  595. grpc_shutdown();
  596. return 0;
  597. }