2023-07-20 23:30:19 +02:00
|
|
|
/*
|
|
|
|
Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2023-10-15 23:35:25 +02:00
|
|
|
import fetchMock from "fetch-mock-jest";
|
2023-07-20 23:30:19 +02:00
|
|
|
import { mocked } from "jest-mock";
|
2023-10-15 23:35:25 +02:00
|
|
|
import { OidcClient } from "oidc-client-ts";
|
2023-07-20 23:30:19 +02:00
|
|
|
import { logger } from "matrix-js-sdk/src/logger";
|
2024-02-23 17:43:14 +01:00
|
|
|
import { discoverAndValidateOIDCIssuerWellKnown } from "matrix-js-sdk/src/matrix";
|
2023-07-20 23:30:19 +02:00
|
|
|
import { OidcError } from "matrix-js-sdk/src/oidc/error";
|
|
|
|
|
|
|
|
import { OidcClientStore } from "../../../src/stores/oidc/OidcClientStore";
|
2024-02-19 16:10:11 +01:00
|
|
|
import { flushPromises, getMockClientWithEventEmitter, mockPlatformPeg } from "../../test-utils";
|
2023-07-20 23:30:19 +02:00
|
|
|
import { mockOpenIdConfiguration } from "../../test-utils/oidc";
|
|
|
|
|
2024-02-23 17:43:14 +01:00
|
|
|
jest.mock("matrix-js-sdk/src/matrix", () => ({
|
|
|
|
...jest.requireActual("matrix-js-sdk/src/matrix"),
|
|
|
|
discoverAndValidateOIDCIssuerWellKnown: jest.fn(),
|
2023-07-20 23:30:19 +02:00
|
|
|
}));
|
|
|
|
|
|
|
|
describe("OidcClientStore", () => {
|
|
|
|
const clientId = "test-client-id";
|
|
|
|
const metadata = mockOpenIdConfiguration();
|
|
|
|
const account = metadata.issuer + "account";
|
|
|
|
|
|
|
|
const mockClient = getMockClientWithEventEmitter({
|
2024-02-23 17:43:14 +01:00
|
|
|
getAuthIssuer: jest.fn(),
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
beforeEach(() => {
|
2024-01-23 14:34:10 +01:00
|
|
|
localStorage.clear();
|
|
|
|
localStorage.setItem("mx_oidc_client_id", clientId);
|
|
|
|
localStorage.setItem("mx_oidc_token_issuer", metadata.issuer);
|
|
|
|
|
2024-02-23 17:43:14 +01:00
|
|
|
mocked(discoverAndValidateOIDCIssuerWellKnown).mockClear().mockResolvedValue({
|
2023-07-20 23:30:19 +02:00
|
|
|
metadata,
|
2024-02-23 17:43:14 +01:00
|
|
|
accountManagementEndpoint: account,
|
|
|
|
authorizationEndpoint: "authorization-endpoint",
|
|
|
|
tokenEndpoint: "token-endpoint",
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|
|
|
|
jest.spyOn(logger, "error").mockClear();
|
2023-10-15 23:35:25 +02:00
|
|
|
|
|
|
|
fetchMock.get(`${metadata.issuer}.well-known/openid-configuration`, metadata);
|
2024-02-23 17:43:14 +01:00
|
|
|
fetchMock.get(`${metadata.issuer}jwks`, { keys: [] });
|
2024-02-19 16:10:11 +01:00
|
|
|
mockPlatformPeg();
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
describe("isUserAuthenticatedWithOidc()", () => {
|
|
|
|
it("should return true when an issuer is in session storage", () => {
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
expect(store.isUserAuthenticatedWithOidc).toEqual(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should return false when no issuer is in session storage", () => {
|
2024-01-23 14:34:10 +01:00
|
|
|
localStorage.clear();
|
2023-07-20 23:30:19 +02:00
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
expect(store.isUserAuthenticatedWithOidc).toEqual(false);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("initialising oidcClient", () => {
|
|
|
|
it("should initialise oidc client from constructor", () => {
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
// started initialising
|
|
|
|
// @ts-ignore private property
|
|
|
|
expect(store.initialisingOidcClientPromise).toBeTruthy();
|
|
|
|
});
|
|
|
|
|
2023-10-15 23:35:25 +02:00
|
|
|
it("should fallback to stored issuer when no client well known is available", async () => {
|
2023-07-20 23:30:19 +02:00
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
2023-10-15 23:35:25 +02:00
|
|
|
// successfully created oidc client
|
2023-07-20 23:30:19 +02:00
|
|
|
// @ts-ignore private property
|
2023-10-15 23:35:25 +02:00
|
|
|
expect(await store.getOidcClient()).toBeTruthy();
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
it("should log and return when no clientId is found in storage", async () => {
|
2024-01-23 14:34:10 +01:00
|
|
|
localStorage.removeItem("mx_oidc_client_id");
|
2023-07-20 23:30:19 +02:00
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
2023-10-15 23:35:25 +02:00
|
|
|
// no oidc client
|
|
|
|
// @ts-ignore private property
|
|
|
|
expect(await store.getOidcClient()).toEqual(undefined);
|
2023-07-20 23:30:19 +02:00
|
|
|
expect(logger.error).toHaveBeenCalledWith(
|
|
|
|
"Failed to initialise OidcClientStore",
|
|
|
|
new Error("Oidc client id not found in storage"),
|
|
|
|
);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should log and return when discovery and validation fails", async () => {
|
2024-02-23 17:43:14 +01:00
|
|
|
mocked(discoverAndValidateOIDCIssuerWellKnown).mockRejectedValue(new Error(OidcError.OpSupport));
|
2023-07-20 23:30:19 +02:00
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
2024-02-23 17:43:14 +01:00
|
|
|
await store.readyPromise;
|
2023-07-20 23:30:19 +02:00
|
|
|
|
|
|
|
expect(logger.error).toHaveBeenCalledWith(
|
|
|
|
"Failed to initialise OidcClientStore",
|
|
|
|
new Error(OidcError.OpSupport),
|
|
|
|
);
|
|
|
|
// no oidc client
|
|
|
|
// @ts-ignore private property
|
|
|
|
expect(await store.getOidcClient()).toEqual(undefined);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should create oidc client correctly", async () => {
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
// @ts-ignore private property
|
|
|
|
const client = await store.getOidcClient();
|
|
|
|
|
|
|
|
expect(client?.settings.client_id).toEqual(clientId);
|
|
|
|
expect(client?.settings.authority).toEqual(metadata.issuer);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should set account management endpoint when configured", async () => {
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
// @ts-ignore private property
|
|
|
|
await store.getOidcClient();
|
|
|
|
|
|
|
|
expect(store.accountManagementEndpoint).toEqual(account);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should set account management endpoint to issuer when not configured", async () => {
|
2024-02-23 17:43:14 +01:00
|
|
|
mocked(discoverAndValidateOIDCIssuerWellKnown).mockClear().mockResolvedValue({
|
2023-07-20 23:30:19 +02:00
|
|
|
metadata,
|
2024-02-23 17:43:14 +01:00
|
|
|
accountManagementEndpoint: undefined,
|
|
|
|
authorizationEndpoint: "authorization-endpoint",
|
|
|
|
tokenEndpoint: "token-endpoint",
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
2024-02-23 17:43:14 +01:00
|
|
|
await store.readyPromise;
|
2023-07-20 23:30:19 +02:00
|
|
|
|
|
|
|
expect(store.accountManagementEndpoint).toEqual(metadata.issuer);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should reuse initialised oidc client", async () => {
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
// @ts-ignore private property
|
|
|
|
store.getOidcClient();
|
|
|
|
// @ts-ignore private property
|
|
|
|
store.getOidcClient();
|
|
|
|
|
|
|
|
await flushPromises();
|
|
|
|
|
|
|
|
// finished initialising
|
|
|
|
// @ts-ignore private property
|
|
|
|
expect(await store.getOidcClient()).toBeTruthy();
|
|
|
|
|
|
|
|
// @ts-ignore private property
|
|
|
|
store.getOidcClient();
|
|
|
|
|
|
|
|
// only called once for multiple calls to getOidcClient
|
|
|
|
// before and after initialisation is complete
|
2024-02-23 17:43:14 +01:00
|
|
|
expect(discoverAndValidateOIDCIssuerWellKnown).toHaveBeenCalledTimes(1);
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|
|
|
|
});
|
2023-10-15 23:35:25 +02:00
|
|
|
|
|
|
|
describe("revokeTokens()", () => {
|
|
|
|
const accessToken = "test-access-token";
|
|
|
|
const refreshToken = "test-refresh-token";
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
// spy and call through
|
|
|
|
jest.spyOn(OidcClient.prototype, "revokeToken").mockClear();
|
|
|
|
|
|
|
|
fetchMock.resetHistory();
|
|
|
|
fetchMock.post(
|
|
|
|
metadata.revocation_endpoint,
|
|
|
|
{
|
|
|
|
status: 200,
|
|
|
|
},
|
|
|
|
{ sendAsJson: true },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should throw when oidcClient could not be initialised", async () => {
|
|
|
|
// make oidcClient initialisation fail
|
2024-01-23 14:34:10 +01:00
|
|
|
localStorage.removeItem("mx_oidc_token_issuer");
|
2023-10-15 23:35:25 +02:00
|
|
|
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
await expect(() => store.revokeTokens(accessToken, refreshToken)).rejects.toThrow("No OIDC client");
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should revoke access and refresh tokens", async () => {
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
await store.revokeTokens(accessToken, refreshToken);
|
|
|
|
|
|
|
|
expect(fetchMock).toHaveFetchedTimes(2, metadata.revocation_endpoint);
|
|
|
|
expect(OidcClient.prototype.revokeToken).toHaveBeenCalledWith(accessToken, "access_token");
|
|
|
|
expect(OidcClient.prototype.revokeToken).toHaveBeenCalledWith(refreshToken, "refresh_token");
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should still attempt to revoke refresh token when access token revocation fails", async () => {
|
|
|
|
// fail once, then succeed
|
|
|
|
fetchMock
|
|
|
|
.postOnce(
|
|
|
|
metadata.revocation_endpoint,
|
|
|
|
{
|
|
|
|
status: 404,
|
|
|
|
},
|
|
|
|
{ overwriteRoutes: true, sendAsJson: true },
|
|
|
|
)
|
|
|
|
.post(
|
|
|
|
metadata.revocation_endpoint,
|
|
|
|
{
|
|
|
|
status: 200,
|
|
|
|
},
|
|
|
|
{ sendAsJson: true },
|
|
|
|
);
|
|
|
|
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
|
|
|
|
await expect(() => store.revokeTokens(accessToken, refreshToken)).rejects.toThrow(
|
|
|
|
"Failed to revoke tokens",
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(fetchMock).toHaveFetchedTimes(2, metadata.revocation_endpoint);
|
|
|
|
expect(OidcClient.prototype.revokeToken).toHaveBeenCalledWith(accessToken, "access_token");
|
|
|
|
});
|
|
|
|
});
|
2024-02-23 17:43:14 +01:00
|
|
|
|
|
|
|
describe("OIDC Aware", () => {
|
|
|
|
beforeEach(() => {
|
|
|
|
localStorage.clear();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should resolve account management endpoint", async () => {
|
|
|
|
mockClient.getAuthIssuer.mockResolvedValue({ issuer: metadata.issuer });
|
|
|
|
const store = new OidcClientStore(mockClient);
|
|
|
|
await store.readyPromise;
|
|
|
|
expect(store.accountManagementEndpoint).toBe(account);
|
|
|
|
});
|
|
|
|
});
|
2023-07-20 23:30:19 +02:00
|
|
|
});
|