123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272 |
- <?php
- /**
- * This file is part of Lcobucci\JWT, a simple library to handle JWT and JWS
- *
- * @license http://opensource.org/licenses/BSD-3-Clause BSD-3-Clause
- */
- namespace Lcobucci\JWT\FunctionalTests;
- use Lcobucci\JWT\Builder;
- use Lcobucci\JWT\Keys;
- use Lcobucci\JWT\Parser;
- use Lcobucci\JWT\Signer\Key;
- use Lcobucci\JWT\Token;
- use Lcobucci\JWT\Signature;
- use Lcobucci\JWT\Signer\Rsa\Sha256;
- use Lcobucci\JWT\Signer\Rsa\Sha512;
- /**
- * @author Luís Otávio Cobucci Oblonczyk <lcobucci@gmail.com>
- * @since 2.1.0
- */
- class RsaTokenTest extends \PHPUnit_Framework_TestCase
- {
- use Keys;
- /**
- * @var Sha256
- */
- private $signer;
- /**
- * @before
- */
- public function createSigner()
- {
- $this->signer = new Sha256();
- }
- /**
- * @test
- *
- * @expectedException \InvalidArgumentException
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- */
- public function builderShouldRaiseExceptionWhenKeyIsInvalid()
- {
- $user = (object) ['name' => 'testing', 'email' => 'testing@abc.com'];
- (new Builder())->setId(1)
- ->setAudience('http://client.abc.com')
- ->setIssuer('http://api.abc.com')
- ->set('user', $user)
- ->sign($this->signer, new Key('testing'));
- }
- /**
- * @test
- *
- * @expectedException \InvalidArgumentException
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- */
- public function builderShouldRaiseExceptionWhenKeyIsNotRsaCompatible()
- {
- $user = (object) ['name' => 'testing', 'email' => 'testing@abc.com'];
- (new Builder())->setId(1)
- ->setAudience('http://client.abc.com')
- ->setIssuer('http://api.abc.com')
- ->set('user', $user)
- ->sign($this->signer, static::$ecdsaKeys['private']);
- }
- /**
- * @test
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- */
- public function builderCanGenerateAToken()
- {
- $user = (object) ['name' => 'testing', 'email' => 'testing@abc.com'];
- $token = (new Builder())->setId(1)
- ->setAudience('http://client.abc.com')
- ->setIssuer('http://api.abc.com')
- ->set('user', $user)
- ->setHeader('jki', '1234')
- ->sign($this->signer, static::$rsaKeys['private'])
- ->getToken();
- $this->assertAttributeInstanceOf(Signature::class, 'signature', $token);
- $this->assertEquals('1234', $token->getHeader('jki'));
- $this->assertEquals('http://client.abc.com', $token->getClaim('aud'));
- $this->assertEquals('http://api.abc.com', $token->getClaim('iss'));
- $this->assertEquals($user, $token->getClaim('user'));
- return $token;
- }
- /**
- * @test
- *
- * @depends builderCanGenerateAToken
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Parser
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Parsing\Decoder
- */
- public function parserCanReadAToken(Token $generated)
- {
- $read = (new Parser())->parse((string) $generated);
- $this->assertEquals($generated, $read);
- $this->assertEquals('testing', $read->getClaim('user')->name);
- }
- /**
- * @test
- *
- * @depends builderCanGenerateAToken
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Parser
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- */
- public function verifyShouldReturnFalseWhenKeyIsNotRight(Token $token)
- {
- $this->assertFalse($token->verify($this->signer, self::$rsaKeys['encrypted-public']));
- }
- /**
- * @test
- *
- * @depends builderCanGenerateAToken
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Parser
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- * @covers Lcobucci\JWT\Signer\Rsa\Sha512
- */
- public function verifyShouldReturnFalseWhenAlgorithmIsDifferent(Token $token)
- {
- $this->assertFalse($token->verify(new Sha512(), self::$rsaKeys['public']));
- }
- /**
- * @test
- *
- * @expectedException \InvalidArgumentException
- *
- * @depends builderCanGenerateAToken
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Parser
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- */
- public function verifyShouldRaiseExceptionWhenKeyIsNotRsaCompatible(Token $token)
- {
- $this->assertFalse($token->verify($this->signer, self::$ecdsaKeys['public1']));
- }
- /**
- * @test
- *
- * @depends builderCanGenerateAToken
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Parser
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- */
- public function verifyShouldReturnTrueWhenKeyIsRight(Token $token)
- {
- $this->assertTrue($token->verify($this->signer, self::$rsaKeys['public']));
- }
- /**
- * @test
- *
- * @covers Lcobucci\JWT\Builder
- * @covers Lcobucci\JWT\Parser
- * @covers Lcobucci\JWT\Token
- * @covers Lcobucci\JWT\Signature
- * @covers Lcobucci\JWT\Signer\Key
- * @covers Lcobucci\JWT\Signer\BaseSigner
- * @covers Lcobucci\JWT\Signer\Rsa
- * @covers Lcobucci\JWT\Signer\Rsa\Sha256
- * @covers Lcobucci\JWT\Claim\Factory
- * @covers Lcobucci\JWT\Claim\Basic
- * @covers Lcobucci\JWT\Parsing\Encoder
- * @covers Lcobucci\JWT\Parsing\Decoder
- */
- public function everythingShouldWorkWhenUsingATokenGeneratedByOtherLibs()
- {
- $data = 'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXUyJ9.eyJoZWxsbyI6IndvcmxkIn0.s'
- . 'GYbB1KrmnESNfJ4D9hOe1Zad_BMyxdb8G4p4LNP7StYlOyBWck6q7XPpPj_6gB'
- . 'Bo1ohD3MA2o0HY42lNIrAStaVhfsFKGdIou8TarwMGZBPcif_3ThUV1pGS3fZc'
- . 'lFwF2SP7rqCngQis_xcUVCyqa8E1Wa_v28grnl1QZrnmQFO8B5JGGLqcrfUHJO'
- . 'nJCupP-Lqh4TmIhftIimSCgLNmJg80wyrpUEfZYReE7hPuEmY0ClTqAGIMQoNS'
- . '98ljwDxwhfbSuL2tAdbV4DekbTpWzspe3dOJ7RSzmPKVZ6NoezaIazKqyqkmHZfcMaHI1lQeGia6LTbHU1bp0gINi74Vw';
- $token = (new Parser())->parse((string) $data);
- $this->assertEquals('world', $token->getClaim('hello'));
- $this->assertTrue($token->verify($this->signer, self::$rsaKeys['public']));
- }
- }
|