t/plugin/openid-connect7.t (16 lines of code) (raw):

# # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to You under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # use t::APISIX 'no_plan'; log_level('debug'); repeat_each(1); no_long_string(); no_root_location(); # no_shuffle(); add_block_preprocessor(sub { my ($block) = @_; if ((!defined $block->error_log) && (!defined $block->no_error_log)) { $block->set_value("no_error_log", "[error]"); } if (!defined $block->request) { $block->set_value("request", "GET /t"); } }); run_tests(); __DATA__ === TEST 1: Create route (jwt local, audience required) It reuses Keycloak's TLS private key to export the public key. --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "plugins": { "openid-connect": { "client_id": "apisix", "client_secret": "secret", "discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration", "bearer_only": true, "claim_validator": { "audience": { "required": true } }, "public_key": "-----BEGIN PUBLIC KEY-----\n]] .. [[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] .. [[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] .. [[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] .. [[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] .. [[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] .. [[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] .. [[QQIDAQAB\n]] .. [[-----END PUBLIC KEY-----", "token_signing_alg_values_expected": "RS256" } }, "upstream": { "nodes": { "127.0.0.1:1980": 1 }, "type": "roundrobin" }, "uri": "/hello" }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 2: Access route with a valid token (with audience) --- config location /t { content_by_lua_block { local http = require "resty.http" local httpc = http.new() local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", { method = "POST", body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack", headers = { ["Content-Type"] = "application/x-www-form-urlencoded" } }) if not res then ngx.say("FAILED: ", err) return end local access_token = require("toolkit.json").decode(res.body).access_token local res, err = httpc:request_uri("http://127.0.0.1:1980/hello", { method = "GET", headers = { Authorization = "Bearer " .. access_token } }) if not res then ngx.say("FAILED: ", err) return end ngx.status = res.status } } === TEST 3: Update route (jwt local, audience required, custom claim) Use a custom non-existent claim to simulate the case where the standard field "aud" is not included. --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "plugins": { "openid-connect": { "client_id": "apisix", "client_secret": "secret", "discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration", "bearer_only": true, "claim_validator": { "audience": { "claim": "custom_claim", "required": true } }, "public_key": "-----BEGIN PUBLIC KEY-----\n]] .. [[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] .. [[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] .. [[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] .. [[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] .. [[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] .. [[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] .. [[QQIDAQAB\n]] .. [[-----END PUBLIC KEY-----", "token_signing_alg_values_expected": "RS256" } }, "upstream": { "nodes": { "127.0.0.1:1980": 1 }, "type": "roundrobin" }, "uri": "/hello" }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 4: Access route with an invalid token (without audience) Use a custom non-existent claim to simulate the case where the standard field "aud" is not included. Note the assertion in the error log, where it is shown that the custom claim field name did take effect. --- config location /t { content_by_lua_block { local http = require "resty.http" local httpc = http.new() local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", { method = "POST", body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack", headers = { ["Content-Type"] = "application/x-www-form-urlencoded" } }) if not res then ngx.say("FAILED: ", err) return end local access_token = require("toolkit.json").decode(res.body).access_token res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", { method = "GET", headers = { Authorization = "Bearer " .. access_token } }) if not res then ngx.say("FAILED: ", err) return end ngx.status = res.status ngx.say(res.body) } } --- error_code: 403 --- response_body {"error":"required audience claim not present"} --- error_log OIDC introspection failed: required audience (custom_claim) not present === TEST 5: Update route (jwt local, audience required, custom claim) Use "iss" to fake "aud". --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "plugins": { "openid-connect": { "client_id": "apisix", "client_secret": "secret", "discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration", "bearer_only": true, "claim_validator": { "audience": { "claim": "iss", "required": true } }, "public_key": "-----BEGIN PUBLIC KEY-----\n]] .. [[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] .. [[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] .. [[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] .. [[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] .. [[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] .. [[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] .. [[QQIDAQAB\n]] .. [[-----END PUBLIC KEY-----", "token_signing_alg_values_expected": "RS256" } }, "upstream": { "nodes": { "127.0.0.1:1980": 1 }, "type": "roundrobin" }, "uri": "/hello" }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 6: Access route with an valid token (with custom audience claim) Use "iss" to fake "aud". --- config location /t { content_by_lua_block { local http = require "resty.http" local httpc = http.new() local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", { method = "POST", body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack", headers = { ["Content-Type"] = "application/x-www-form-urlencoded" } }) if not res then ngx.say("FAILED: ", err) return end local access_token = require("toolkit.json").decode(res.body).access_token res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", { method = "GET", headers = { Authorization = "Bearer " .. access_token } }) if not res then ngx.say("FAILED: ", err) return end ngx.status = res.status ngx.say(res.body) } } === TEST 7: Update route (jwt local, audience required, match client_id) --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "plugins": { "openid-connect": { "client_id": "apisix", "client_secret": "secret", "discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration", "bearer_only": true, "claim_validator": { "audience": { "required": true, "match_with_client_id": true } }, "public_key": "-----BEGIN PUBLIC KEY-----\n]] .. [[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] .. [[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] .. [[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] .. [[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] .. [[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] .. [[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] .. [[QQIDAQAB\n]] .. [[-----END PUBLIC KEY-----", "token_signing_alg_values_expected": "RS256" } }, "upstream": { "nodes": { "127.0.0.1:1980": 1 }, "type": "roundrobin" }, "uri": "/hello" }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 8: Access route with an valid token (with client id as audience) --- config location /t { content_by_lua_block { local http = require "resty.http" local httpc = http.new() local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", { method = "POST", body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack", headers = { ["Content-Type"] = "application/x-www-form-urlencoded" } }) if not res then ngx.say("FAILED: ", err) return end local access_token = require("toolkit.json").decode(res.body).access_token res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", { method = "GET", headers = { Authorization = "Bearer " .. access_token } }) if not res then ngx.say("FAILED: ", err) return end ngx.status = res.status ngx.say(res.body) } } === TEST 9: Update route (jwt local, audience required, match client_id) Use the apisix-no-aud client. According to Keycloak's default implementation, when unconfigured, only the account is listed as an audience, not the client id. --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "plugins": { "openid-connect": { "client_id": "apisix-no-aud", "client_secret": "secret", "discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration", "bearer_only": true, "claim_validator": { "audience": { "required": true, "match_with_client_id": true } }, "public_key": "-----BEGIN PUBLIC KEY-----\n]] .. [[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] .. [[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] .. [[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] .. [[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] .. [[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] .. [[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] .. [[QQIDAQAB\n]] .. [[-----END PUBLIC KEY-----", "token_signing_alg_values_expected": "RS256" } }, "upstream": { "nodes": { "127.0.0.1:1980": 1 }, "type": "roundrobin" }, "uri": "/hello" }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 10: Access route with an invalid token (without client id as audience) --- config location /t { content_by_lua_block { local http = require "resty.http" local httpc = http.new() local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", { method = "POST", body = "client_id=apisix-no-aud&client_secret=secret&grant_type=password&username=jack&password=jack", headers = { ["Content-Type"] = "application/x-www-form-urlencoded" } }) if not res then ngx.say("FAILED: ", err) return end local access_token = require("toolkit.json").decode(res.body).access_token res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", { method = "GET", headers = { Authorization = "Bearer " .. access_token } }) if not res then ngx.say("FAILED: ", err) return end ngx.status = res.status ngx.say(res.body) } } --- error_code: 403 --- response_body {"error":"mismatched audience"} --- error_log OIDC introspection failed: audience does not match the client id