test_id_token.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335
  1. # Copyright 2014 Google Inc.
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14. import json
  15. import os
  16. import mock
  17. import pytest # type: ignore
  18. from google.auth import environment_vars
  19. from google.auth import exceptions
  20. from google.auth import transport
  21. from google.oauth2 import id_token
  22. from google.oauth2 import service_account
  23. import yatest.common as yc
  24. SERVICE_ACCOUNT_FILE = os.path.join(
  25. os.path.dirname(yc.source_path(__file__)), "../data/service_account.json"
  26. )
  27. ID_TOKEN_AUDIENCE = "https://pubsub.googleapis.com"
  28. def make_request(status, data=None):
  29. response = mock.create_autospec(transport.Response, instance=True)
  30. response.status = status
  31. if data is not None:
  32. response.data = json.dumps(data).encode("utf-8")
  33. request = mock.create_autospec(transport.Request)
  34. request.return_value = response
  35. return request
  36. def test__fetch_certs_success():
  37. certs = {"1": "cert"}
  38. request = make_request(200, certs)
  39. returned_certs = id_token._fetch_certs(request, mock.sentinel.cert_url)
  40. request.assert_called_once_with(mock.sentinel.cert_url, method="GET")
  41. assert returned_certs == certs
  42. def test__fetch_certs_failure():
  43. request = make_request(404)
  44. with pytest.raises(exceptions.TransportError):
  45. id_token._fetch_certs(request, mock.sentinel.cert_url)
  46. request.assert_called_once_with(mock.sentinel.cert_url, method="GET")
  47. @mock.patch("google.auth.jwt.decode", autospec=True)
  48. @mock.patch("google.oauth2.id_token._fetch_certs", autospec=True)
  49. def test_verify_token(_fetch_certs, decode):
  50. result = id_token.verify_token(mock.sentinel.token, mock.sentinel.request)
  51. assert result == decode.return_value
  52. _fetch_certs.assert_called_once_with(
  53. mock.sentinel.request, id_token._GOOGLE_OAUTH2_CERTS_URL
  54. )
  55. decode.assert_called_once_with(
  56. mock.sentinel.token,
  57. certs=_fetch_certs.return_value,
  58. audience=None,
  59. clock_skew_in_seconds=0,
  60. )
  61. @mock.patch("google.oauth2.id_token._fetch_certs", autospec=True)
  62. @mock.patch("jwt.PyJWKClient", autospec=True)
  63. @mock.patch("jwt.decode", autospec=True)
  64. def test_verify_token_jwk(decode, py_jwk, _fetch_certs):
  65. certs_url = "abc123"
  66. data = {"keys": [{"alg": "RS256"}]}
  67. _fetch_certs.return_value = data
  68. result = id_token.verify_token(
  69. mock.sentinel.token, mock.sentinel.request, certs_url=certs_url
  70. )
  71. assert result == decode.return_value
  72. py_jwk.assert_called_once_with(certs_url)
  73. signing_key = py_jwk.return_value.get_signing_key_from_jwt
  74. _fetch_certs.assert_called_once_with(mock.sentinel.request, certs_url)
  75. signing_key.assert_called_once_with(mock.sentinel.token)
  76. decode.assert_called_once_with(
  77. mock.sentinel.token,
  78. signing_key.return_value.key,
  79. algorithms=[signing_key.return_value.algorithm_name],
  80. audience=None,
  81. )
  82. @mock.patch("google.auth.jwt.decode", autospec=True)
  83. @mock.patch("google.oauth2.id_token._fetch_certs", autospec=True)
  84. def test_verify_token_args(_fetch_certs, decode):
  85. result = id_token.verify_token(
  86. mock.sentinel.token,
  87. mock.sentinel.request,
  88. audience=mock.sentinel.audience,
  89. certs_url=mock.sentinel.certs_url,
  90. )
  91. assert result == decode.return_value
  92. _fetch_certs.assert_called_once_with(mock.sentinel.request, mock.sentinel.certs_url)
  93. decode.assert_called_once_with(
  94. mock.sentinel.token,
  95. certs=_fetch_certs.return_value,
  96. audience=mock.sentinel.audience,
  97. clock_skew_in_seconds=0,
  98. )
  99. @mock.patch("google.auth.jwt.decode", autospec=True)
  100. @mock.patch("google.oauth2.id_token._fetch_certs", autospec=True)
  101. def test_verify_token_clock_skew(_fetch_certs, decode):
  102. result = id_token.verify_token(
  103. mock.sentinel.token,
  104. mock.sentinel.request,
  105. audience=mock.sentinel.audience,
  106. certs_url=mock.sentinel.certs_url,
  107. clock_skew_in_seconds=10,
  108. )
  109. assert result == decode.return_value
  110. _fetch_certs.assert_called_once_with(mock.sentinel.request, mock.sentinel.certs_url)
  111. decode.assert_called_once_with(
  112. mock.sentinel.token,
  113. certs=_fetch_certs.return_value,
  114. audience=mock.sentinel.audience,
  115. clock_skew_in_seconds=10,
  116. )
  117. @mock.patch("google.oauth2.id_token.verify_token", autospec=True)
  118. def test_verify_oauth2_token(verify_token):
  119. verify_token.return_value = {"iss": "accounts.google.com"}
  120. result = id_token.verify_oauth2_token(
  121. mock.sentinel.token, mock.sentinel.request, audience=mock.sentinel.audience
  122. )
  123. assert result == verify_token.return_value
  124. verify_token.assert_called_once_with(
  125. mock.sentinel.token,
  126. mock.sentinel.request,
  127. audience=mock.sentinel.audience,
  128. certs_url=id_token._GOOGLE_OAUTH2_CERTS_URL,
  129. clock_skew_in_seconds=0,
  130. )
  131. @mock.patch("google.oauth2.id_token.verify_token", autospec=True)
  132. def test_verify_oauth2_token_clock_skew(verify_token):
  133. verify_token.return_value = {"iss": "accounts.google.com"}
  134. result = id_token.verify_oauth2_token(
  135. mock.sentinel.token,
  136. mock.sentinel.request,
  137. audience=mock.sentinel.audience,
  138. clock_skew_in_seconds=10,
  139. )
  140. assert result == verify_token.return_value
  141. verify_token.assert_called_once_with(
  142. mock.sentinel.token,
  143. mock.sentinel.request,
  144. audience=mock.sentinel.audience,
  145. certs_url=id_token._GOOGLE_OAUTH2_CERTS_URL,
  146. clock_skew_in_seconds=10,
  147. )
  148. @mock.patch("google.oauth2.id_token.verify_token", autospec=True)
  149. def test_verify_oauth2_token_invalid_iss(verify_token):
  150. verify_token.return_value = {"iss": "invalid_issuer"}
  151. with pytest.raises(exceptions.GoogleAuthError):
  152. id_token.verify_oauth2_token(
  153. mock.sentinel.token, mock.sentinel.request, audience=mock.sentinel.audience
  154. )
  155. @mock.patch("google.oauth2.id_token.verify_token", autospec=True)
  156. def test_verify_firebase_token(verify_token):
  157. result = id_token.verify_firebase_token(
  158. mock.sentinel.token, mock.sentinel.request, audience=mock.sentinel.audience
  159. )
  160. assert result == verify_token.return_value
  161. verify_token.assert_called_once_with(
  162. mock.sentinel.token,
  163. mock.sentinel.request,
  164. audience=mock.sentinel.audience,
  165. certs_url=id_token._GOOGLE_APIS_CERTS_URL,
  166. clock_skew_in_seconds=0,
  167. )
  168. @mock.patch("google.oauth2.id_token.verify_token", autospec=True)
  169. def test_verify_firebase_token_clock_skew(verify_token):
  170. result = id_token.verify_firebase_token(
  171. mock.sentinel.token,
  172. mock.sentinel.request,
  173. audience=mock.sentinel.audience,
  174. clock_skew_in_seconds=10,
  175. )
  176. assert result == verify_token.return_value
  177. verify_token.assert_called_once_with(
  178. mock.sentinel.token,
  179. mock.sentinel.request,
  180. audience=mock.sentinel.audience,
  181. certs_url=id_token._GOOGLE_APIS_CERTS_URL,
  182. clock_skew_in_seconds=10,
  183. )
  184. def test_fetch_id_token_credentials_optional_request(monkeypatch):
  185. monkeypatch.delenv(environment_vars.CREDENTIALS, raising=False)
  186. # Test a request object is created if not provided
  187. with mock.patch("google.auth.compute_engine._metadata.ping", return_value=True):
  188. with mock.patch(
  189. "google.auth.compute_engine.IDTokenCredentials.__init__", return_value=None
  190. ):
  191. with mock.patch(
  192. "google.auth.transport.requests.Request.__init__", return_value=None
  193. ) as mock_request:
  194. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  195. mock_request.assert_called()
  196. def test_fetch_id_token_credentials_from_metadata_server(monkeypatch):
  197. monkeypatch.delenv(environment_vars.CREDENTIALS, raising=False)
  198. mock_req = mock.Mock()
  199. with mock.patch("google.auth.compute_engine._metadata.ping", return_value=True):
  200. with mock.patch(
  201. "google.auth.compute_engine.IDTokenCredentials.__init__", return_value=None
  202. ) as mock_init:
  203. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE, request=mock_req)
  204. mock_init.assert_called_once_with(
  205. mock_req, ID_TOKEN_AUDIENCE, use_metadata_identity_endpoint=True
  206. )
  207. def test_fetch_id_token_credentials_from_explicit_cred_json_file(monkeypatch):
  208. monkeypatch.setenv(environment_vars.CREDENTIALS, SERVICE_ACCOUNT_FILE)
  209. cred = id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  210. assert isinstance(cred, service_account.IDTokenCredentials)
  211. assert cred._target_audience == ID_TOKEN_AUDIENCE
  212. def test_fetch_id_token_credentials_no_cred_exists(monkeypatch):
  213. monkeypatch.delenv(environment_vars.CREDENTIALS, raising=False)
  214. with mock.patch(
  215. "google.auth.compute_engine._metadata.ping",
  216. side_effect=exceptions.TransportError(),
  217. ):
  218. with pytest.raises(exceptions.DefaultCredentialsError) as excinfo:
  219. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  220. assert excinfo.match(
  221. r"Neither metadata server or valid service account credentials are found."
  222. )
  223. with mock.patch("google.auth.compute_engine._metadata.ping", return_value=False):
  224. with pytest.raises(exceptions.DefaultCredentialsError) as excinfo:
  225. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  226. assert excinfo.match(
  227. r"Neither metadata server or valid service account credentials are found."
  228. )
  229. def test_fetch_id_token_credentials_invalid_cred_file_type(monkeypatch):
  230. user_credentials_file = os.path.join(
  231. os.path.dirname(yc.source_path(__file__)), "../data/authorized_user.json"
  232. )
  233. monkeypatch.setenv(environment_vars.CREDENTIALS, user_credentials_file)
  234. with mock.patch("google.auth.compute_engine._metadata.ping", return_value=False):
  235. with pytest.raises(exceptions.DefaultCredentialsError) as excinfo:
  236. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  237. assert excinfo.match(
  238. r"Neither metadata server or valid service account credentials are found."
  239. )
  240. def test_fetch_id_token_credentials_invalid_json(monkeypatch):
  241. not_json_file = os.path.join(os.path.dirname(yc.source_path(__file__)), "../data/public_cert.pem")
  242. monkeypatch.setenv(environment_vars.CREDENTIALS, not_json_file)
  243. with pytest.raises(exceptions.DefaultCredentialsError) as excinfo:
  244. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  245. assert excinfo.match(
  246. r"GOOGLE_APPLICATION_CREDENTIALS is not valid service account credentials."
  247. )
  248. def test_fetch_id_token_credentials_invalid_cred_path(monkeypatch):
  249. not_json_file = os.path.join(os.path.dirname(yc.source_path(__file__)), "../data/not_exists.json")
  250. monkeypatch.setenv(environment_vars.CREDENTIALS, not_json_file)
  251. with pytest.raises(exceptions.DefaultCredentialsError) as excinfo:
  252. id_token.fetch_id_token_credentials(ID_TOKEN_AUDIENCE)
  253. assert excinfo.match(
  254. r"GOOGLE_APPLICATION_CREDENTIALS path is either not found or invalid."
  255. )
  256. def test_fetch_id_token(monkeypatch):
  257. mock_cred = mock.MagicMock()
  258. mock_cred.token = "token"
  259. mock_req = mock.Mock()
  260. with mock.patch(
  261. "google.oauth2.id_token.fetch_id_token_credentials", return_value=mock_cred
  262. ) as mock_fetch:
  263. token = id_token.fetch_id_token(mock_req, ID_TOKEN_AUDIENCE)
  264. mock_fetch.assert_called_once_with(ID_TOKEN_AUDIENCE, request=mock_req)
  265. mock_cred.refresh.assert_called_once_with(mock_req)
  266. assert token == "token"