|
1 | 1 | package msentraid_test
|
2 | 2 |
|
3 | 3 | import (
|
| 4 | + "context" |
| 5 | + "net/http" |
4 | 6 | "testing"
|
5 | 7 |
|
6 | 8 | "github.com/stretchr/testify/require"
|
7 | 9 | "github.com/ubuntu/authd-oidc-brokers/internal/providers/msentraid"
|
| 10 | + "github.com/ubuntu/authd-oidc-brokers/internal/testutils/golden" |
8 | 11 | "golang.org/x/oauth2"
|
9 | 12 | )
|
10 | 13 |
|
@@ -115,3 +118,63 @@ func TestVerifyUsername(t *testing.T) {
|
115 | 118 | })
|
116 | 119 | }
|
117 | 120 | }
|
| 121 | + |
| 122 | +func TestGetUserInfo(t *testing.T) { |
| 123 | + t.Parallel() |
| 124 | + |
| 125 | + tests := map[string]struct { |
| 126 | + invalidIDToken bool |
| 127 | + tokenScopes map[string]any |
| 128 | + providerMetadata map[string]any |
| 129 | + |
| 130 | + groupEndpointHandler http.HandlerFunc |
| 131 | + |
| 132 | + wantErr bool |
| 133 | + }{ |
| 134 | + "Successfully_get_user_info": {}, |
| 135 | + "Successfully_get_user_info_with_local_groups": {groupEndpointHandler: localGroupHandler}, |
| 136 | + "Successfully_get_user_info_with_mixed_groups": {groupEndpointHandler: mixedGroupHandler}, |
| 137 | + "Successfully_get_user_info_filtering_non_security_groups": {groupEndpointHandler: nonSecurityGroupHandler}, |
| 138 | + |
| 139 | + "Error_when_connecting_to_server": {providerMetadata: map[string]any{"msgraph_host": "invalid"}, wantErr: true}, |
| 140 | + "Error_when_getting_user_claims": {invalidIDToken: true, wantErr: true}, |
| 141 | + "Error_when_getting_token_scopes": {tokenScopes: map[string]any{"scope": struct{ notAString int }{10}}, wantErr: true}, |
| 142 | + "Error_when_token_does_not_have_required_scopes": {tokenScopes: map[string]any{"scope": "not the required scopes"}, wantErr: true}, |
| 143 | + "Error_when_getting_user_groups": {groupEndpointHandler: errorGroupHandler, wantErr: true}, |
| 144 | + "Error_when_group_is_missing_id": {groupEndpointHandler: missingIDGroupHandler, wantErr: true}, |
| 145 | + "Error_when_group_is_missing_display_name": {groupEndpointHandler: missingDisplayNameGroupHandler, wantErr: true}, |
| 146 | + } |
| 147 | + for name, tc := range tests { |
| 148 | + t.Run(name, func(t *testing.T) { |
| 149 | + t.Parallel() |
| 150 | + |
| 151 | + accessToken := validAccessToken |
| 152 | + if tc.tokenScopes == nil { |
| 153 | + tc.tokenScopes = map[string]any{"scope": msentraid.AllExpectedScopes()} |
| 154 | + } |
| 155 | + accessToken = accessToken.WithExtra(tc.tokenScopes) |
| 156 | + |
| 157 | + idToken := validIDToken |
| 158 | + if tc.invalidIDToken { |
| 159 | + idToken = invalidIDToken |
| 160 | + } |
| 161 | + |
| 162 | + if tc.providerMetadata == nil { |
| 163 | + msGraphMockURL, stopFunc := startMSGraphServerMock(tc.groupEndpointHandler) |
| 164 | + t.Cleanup(stopFunc) |
| 165 | + tc.providerMetadata = map[string]any{"msgraph_host": msGraphMockURL} |
| 166 | + } |
| 167 | + |
| 168 | + p := msentraid.New() |
| 169 | + got, err := p.GetUserInfo(context.Background(), accessToken, idToken, tc.providerMetadata) |
| 170 | + if tc.wantErr { |
| 171 | + require.Error(t, err, "GetUserInfo should return an error") |
| 172 | + return |
| 173 | + } |
| 174 | + require.NoError(t, err, "GetUserInfo should not return an error") |
| 175 | + |
| 176 | + want := golden.LoadWithUpdateYAML(t, got) |
| 177 | + require.Equal(t, want, got, "GetUserInfo should return the expected user info") |
| 178 | + }) |
| 179 | + } |
| 180 | +} |
0 commit comments