botauth_test.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package botauth
  4. import (
  5. "crypto/ed25519"
  6. "encoding/base64"
  7. "net/http"
  8. "net/http/httptest"
  9. "strings"
  10. "testing"
  11. )
  12. func TestComputeThumbprint(t *testing.T) {
  13. // Test values taken from https://www.rfc-editor.org/rfc/rfc8037.html#appendix-A.3
  14. jwk := &jsonWebKey{
  15. KeyType: "OKP",
  16. Curve: "Ed25519",
  17. PublicKey: "11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo",
  18. }
  19. expectedThumbprint := "kPrK_qmxVWaYVA9wwBF6Iuo3vVzz7TxHCTwXBygrS4k"
  20. thumbprint, err := computeJWKThumbprint(jwk)
  21. if err != nil {
  22. t.Fatal(err)
  23. }
  24. if thumbprint != expectedThumbprint {
  25. t.Fatalf("Invalid thumbprint, got %q instead of %q", thumbprint, expectedThumbprint)
  26. }
  27. }
  28. func TestGenerateSignatureParams(t *testing.T) {
  29. // Example taken from https://www.rfc-editor.org/rfc/rfc9421#name-signing-a-request-using-ed2
  30. signatureComponents := []signatureComponent{
  31. {name: "date", value: "Tue, 20 Apr 2021 02:07:55 GMT"},
  32. {name: "@method", value: "POST"},
  33. {name: "@path", value: "/foo"},
  34. {name: "@authority", value: "example.com"},
  35. {name: "content-type", value: "application/json"},
  36. {name: "content-length", value: "18"},
  37. }
  38. signatureMetadata := []signatureMetadata{
  39. {name: "created", value: int64(1618884473)},
  40. {name: "keyid", value: "test-key-ed25519"},
  41. }
  42. generatedSignatureParams := generateSignatureParams(signatureComponents, signatureMetadata)
  43. expectedSignatureParams := `("date" "@method" "@path" "@authority" "content-type" "content-length");created=1618884473;keyid="test-key-ed25519"`
  44. if generatedSignatureParams != expectedSignatureParams {
  45. t.Fatalf("Invalid signature params, got %s instead of %s", generatedSignatureParams, expectedSignatureParams)
  46. }
  47. }
  48. func TestSignComponents(t *testing.T) {
  49. // Test key from https://www.rfc-editor.org/rfc/rfc9421#name-example-ed25519-test-key
  50. privateKeyBase64 := "n4Ni-HpISpVObnQMW0wOhCKROaIKqKtW_2ZYb2p9KcU"
  51. privateKey, err := base64.RawURLEncoding.DecodeString(privateKeyBase64)
  52. if err != nil {
  53. t.Fatal(err)
  54. }
  55. // Example taken from https://www.rfc-editor.org/rfc/rfc9421#name-signing-a-request-using-ed2
  56. signatureComponents := []signatureComponent{
  57. {name: "date", value: "Tue, 20 Apr 2021 02:07:55 GMT"},
  58. {name: "@method", value: "POST"},
  59. {name: "@path", value: "/foo"},
  60. {name: "@authority", value: "example.com"},
  61. {name: "content-type", value: "application/json"},
  62. {name: "content-length", value: "18"},
  63. }
  64. signatureMetadata := []signatureMetadata{
  65. {name: "created", value: int64(1618884473)},
  66. {name: "keyid", value: "test-key-ed25519"},
  67. }
  68. generatedSignatureParams := generateSignatureParams(signatureComponents, signatureMetadata)
  69. signature, err := signComponents(ed25519.NewKeyFromSeed(privateKey), signatureComponents, generatedSignatureParams)
  70. if err != nil {
  71. t.Fatal(err)
  72. }
  73. // Expected signature taken from https://www.rfc-editor.org/rfc/rfc9421#name-signing-a-request-using-ed2
  74. expectedSignature := "wqcAqbmYJ2ji2glfAMaRy4gruYYnx2nEFN2HN6jrnDnQCK1u02Gb04v9EDgwUPiu4A0w6vuQv5lIp5WPpBKRCw=="
  75. if signature != expectedSignature {
  76. t.Fatalf("Invalid signature, got %q instead of %q", signature, expectedSignature)
  77. }
  78. }
  79. func TestServeDirectoryHandler(t *testing.T) {
  80. // Test keys from https://www.rfc-editor.org/rfc/rfc9421#name-example-ed25519-test-key
  81. privateKeyBase64 := "n4Ni-HpISpVObnQMW0wOhCKROaIKqKtW_2ZYb2p9KcU"
  82. privateKeyDecoded, err := base64.RawURLEncoding.DecodeString(privateKeyBase64)
  83. if err != nil {
  84. t.Fatal(err)
  85. }
  86. privateKey := ed25519.NewKeyFromSeed(privateKeyDecoded)
  87. publicKeyBase64 := "JrQLj5P_89iXES9-vFgrIy29clF9CC_oPPsw3c5D0bs"
  88. publicKeyDecoded, err := base64.RawURLEncoding.DecodeString(publicKeyBase64)
  89. if err != nil {
  90. t.Fatal(err)
  91. }
  92. publicKey := ed25519.PublicKey(publicKeyDecoded)
  93. keyPair, err := NewKeyPair(privateKey, publicKey)
  94. if err != nil {
  95. t.Fatal(err)
  96. }
  97. botAuth, err := NewBothAuth("https://example.com/", KeyPairs{keyPair})
  98. if err != nil {
  99. t.Fatal(err)
  100. }
  101. req, err := http.NewRequest("GET", "/.well-known/http-message-signatures-directory", nil)
  102. if err != nil {
  103. t.Fatal(err)
  104. }
  105. rr := httptest.NewRecorder()
  106. handler := http.HandlerFunc(botAuth.ServeKeyDirectory)
  107. handler.ServeHTTP(rr, req)
  108. if status := rr.Code; status != http.StatusOK {
  109. t.Fatalf("handler returned wrong status code: got %v want %v", status, http.StatusOK)
  110. }
  111. expectedBody := `{"keys":[{"kty":"OKP","crv":"Ed25519","x":"JrQLj5P_89iXES9-vFgrIy29clF9CC_oPPsw3c5D0bs"}]}`
  112. if rr.Body.String() != expectedBody {
  113. t.Fatalf("handler returned unexpected body: got %v want %v", rr.Body.String(), expectedBody)
  114. }
  115. expectedContentType := "application/http-message-signatures-directory+json"
  116. if rr.Header().Get("Content-Type") != expectedContentType {
  117. t.Fatalf("handler returned unexpected content type: got %v want %v", rr.Header().Get("Content-Type"), expectedContentType)
  118. }
  119. expectedCacheControl := "max-age=86400"
  120. if rr.Header().Get("Cache-Control") != expectedCacheControl {
  121. t.Fatalf("handler returned unexpected cache control: got %v want %v", rr.Header().Get("Cache-Control"), expectedCacheControl)
  122. }
  123. signatureHeaderValue := rr.Header().Get("Signature")
  124. if signatureHeaderValue == "" {
  125. t.Fatal("handler did not return a Signature header")
  126. }
  127. if !strings.HasPrefix(signatureHeaderValue, "sig1=:") || !strings.HasSuffix(signatureHeaderValue, ":") {
  128. t.Fatalf("handler returned unexpected signature: got %v", signatureHeaderValue)
  129. }
  130. expectedSignatureInputPrefix := `sig1=("@authority");alg="ed25519";keyid="poqkLGiymh_W0uP6PZFw-dvez3QJT5SolqXBCW38r0U";tag="http-message-signatures-directory";created=`
  131. signatureInput := rr.Header().Get("Signature-Input")
  132. if !strings.HasPrefix(signatureInput, expectedSignatureInputPrefix) {
  133. t.Fatalf("handler returned unexpected signature input: got %v want prefix %v", signatureInput, expectedSignatureInputPrefix)
  134. }
  135. }
  136. func TestSignRequest(t *testing.T) {
  137. // Test keys from https://www.rfc-editor.org/rfc/rfc9421#name-example-ed25519-test-key
  138. privateKeyBase64 := "n4Ni-HpISpVObnQMW0wOhCKROaIKqKtW_2ZYb2p9KcU"
  139. privateKeyDecoded, err := base64.RawURLEncoding.DecodeString(privateKeyBase64)
  140. if err != nil {
  141. t.Fatal(err)
  142. }
  143. privateKey := ed25519.NewKeyFromSeed(privateKeyDecoded)
  144. publicKeyBase64 := "JrQLj5P_89iXES9-vFgrIy29clF9CC_oPPsw3c5D0bs"
  145. publicKeyDecoded, err := base64.RawURLEncoding.DecodeString(publicKeyBase64)
  146. if err != nil {
  147. t.Fatal(err)
  148. }
  149. publicKey := ed25519.PublicKey(publicKeyDecoded)
  150. keyPair, err := NewKeyPair(privateKey, publicKey)
  151. if err != nil {
  152. t.Fatal(err)
  153. }
  154. botAuth, err := NewBothAuth("https://signature-agent.test", KeyPairs{keyPair})
  155. if err != nil {
  156. t.Fatal(err)
  157. }
  158. req, err := http.NewRequest("GET", "https://example.org", nil)
  159. if err != nil {
  160. t.Fatal(err)
  161. }
  162. err = botAuth.SignRequest(req)
  163. if err != nil {
  164. t.Fatal(err)
  165. }
  166. signatureAgentHeaderValue := req.Header.Get("Signature-Agent")
  167. if signatureAgentHeaderValue != `"https://signature-agent.test"` {
  168. t.Fatalf("request has unexpected Signature-Agent header: got %v", signatureAgentHeaderValue)
  169. }
  170. signatureHeaderValue := req.Header.Get("Signature")
  171. if signatureHeaderValue == "" {
  172. t.Fatal("request did not get a Signature header")
  173. }
  174. if !strings.HasPrefix(signatureHeaderValue, "sig1=:") || !strings.HasSuffix(signatureHeaderValue, ":") {
  175. t.Fatalf("request has unexpected signature: got %v", signatureHeaderValue)
  176. }
  177. expectedSignatureInputPrefix := `sig1=("@authority" "signature-agent");alg="ed25519";keyid="poqkLGiymh_W0uP6PZFw-dvez3QJT5SolqXBCW38r0U";tag="web-bot-auth";created=`
  178. signatureInput := req.Header.Get("Signature-Input")
  179. if !strings.HasPrefix(signatureInput, expectedSignatureInputPrefix) {
  180. t.Fatalf("request has unexpected signature input: got %v want prefix %v", signatureInput, expectedSignatureInputPrefix)
  181. }
  182. }