require 'google/api_client'
+fixtures_path = File.expand_path('../../../fixtures', __FILE__)
+
+describe Google::APIClient::KeyUtils do
+ it 'should read PKCS12 files from the filesystem' do
+ if RUBY_PLATFORM == 'java' && RUBY_VERSION.start_with?('1.8')
+ pending "Reading from PKCS12 not supported on jruby 1.8.x"
+ end
+ path = File.expand_path('files/privatekey.p12', fixtures_path)
+ key = Google::APIClient::KeyUtils.load_from_pkcs12(path, 'notasecret')
+ expect(key).not_to eq(nil)
+ end
+
+ it 'should read PKCS12 files from loaded files' do
+ if RUBY_PLATFORM == 'java' && RUBY_VERSION.start_with?('1.8')
+ pending "Reading from PKCS12 not supported on jruby 1.8.x"
+ end
+ path = File.expand_path('files/privatekey.p12', fixtures_path)
+ content = File.read(path)
+ key = Google::APIClient::KeyUtils.load_from_pkcs12(content, 'notasecret')
+ expect(key).not_to eq(nil)
+ end
+
+ it 'should read PEM files from the filesystem' do
+ path = File.expand_path('files/secret.pem', fixtures_path)
+ key = Google::APIClient::KeyUtils.load_from_pem(path, 'notasecret')
+ expect(key).not_to eq(nil)
+ end
+
+ it 'should read PEM files from loaded files' do
+ path = File.expand_path('files/secret.pem', fixtures_path)
+ content = File.read(path)
+ key = Google::APIClient::KeyUtils.load_from_pem(content, 'notasecret')
+ expect(key).not_to eq(nil)
+ end
+
+end
+
describe Google::APIClient::JWTAsserter do
-
+ include ConnectionHelpers
+
before do
@key = OpenSSL::PKey::RSA.new 2048
end
-
+
it 'should generate valid JWTs' do
asserter = Google::APIClient::JWTAsserter.new('client1', 'scope1 scope2', @key)
- jwt = asserter.to_jwt
- jwt.should_not == nil
-
+ jwt = asserter.to_authorization.to_jwt
+ expect(jwt).not_to eq(nil)
+
claim = JWT.decode(jwt, @key.public_key, true)
- claim["iss"].should == 'client1'
- claim["scope"].should == 'scope1 scope2'
+ claim = claim[0] if claim[0]
+ expect(claim["iss"]).to eq('client1')
+ expect(claim["scope"]).to eq('scope1 scope2')
end
-
+
+ it 'should allow impersonation' do
+ conn = stub_connection do |stub|
+ stub.post('/o/oauth2/token') do |env|
+ params = Addressable::URI.form_unencode(env[:body])
+ JWT.decode(params.assoc("assertion").last, @key.public_key)
+ expect(params.assoc("grant_type")).to eq(['grant_type','urn:ietf:params:oauth:grant-type:jwt-bearer'])
+ [200, {}, '{
+ "access_token" : "1/abcdef1234567890",
+ "token_type" : "Bearer",
+ "expires_in" : 3600
+ }']
+ end
+ end
+ asserter = Google::APIClient::JWTAsserter.new('client1', 'scope1 scope2', @key)
+ auth = asserter.authorize('user1@email.com', { :connection => conn })
+ expect(auth).not_to eq(nil?)
+ expect(auth.person).to eq('user1@email.com')
+ conn.verify
+ end
+
it 'should send valid access token request' do
- stubs = Faraday::Adapter::Test::Stubs.new do |stub|
+ conn = stub_connection do |stub|
stub.post('/o/oauth2/token') do |env|
params = Addressable::URI.form_unencode(env[:body])
JWT.decode(params.assoc("assertion").last, @key.public_key)
- params.assoc("grant_type").should == ['grant_type','urn:ietf:params:oauth:grant-type:jwt-bearer']
+ expect(params.assoc("grant_type")).to eq(['grant_type','urn:ietf:params:oauth:grant-type:jwt-bearer'])
[200, {}, '{
"access_token" : "1/abcdef1234567890",
"token_type" : "Bearer",
}']
end
end
- connection = Faraday.new(:url => 'https://accounts.google.com') do |builder|
- builder.adapter(:test, stubs)
+ asserter = Google::APIClient::JWTAsserter.new('client1', 'scope1 scope2', @key)
+ auth = asserter.authorize(nil, { :connection => conn })
+ expect(auth).not_to eq(nil?)
+ expect(auth.access_token).to eq("1/abcdef1234567890")
+ conn.verify
+ end
+
+ it 'should be refreshable' do
+ conn = stub_connection do |stub|
+ stub.post('/o/oauth2/token') do |env|
+ params = Addressable::URI.form_unencode(env[:body])
+ JWT.decode(params.assoc("assertion").last, @key.public_key)
+ expect(params.assoc("grant_type")).to eq(['grant_type','urn:ietf:params:oauth:grant-type:jwt-bearer'])
+ [200, {}, '{
+ "access_token" : "1/abcdef1234567890",
+ "token_type" : "Bearer",
+ "expires_in" : 3600
+ }']
+ end
+ stub.post('/o/oauth2/token') do |env|
+ params = Addressable::URI.form_unencode(env[:body])
+ JWT.decode(params.assoc("assertion").last, @key.public_key)
+ expect(params.assoc("grant_type")).to eq(['grant_type','urn:ietf:params:oauth:grant-type:jwt-bearer'])
+ [200, {}, '{
+ "access_token" : "1/0987654321fedcba",
+ "token_type" : "Bearer",
+ "expires_in" : 3600
+ }']
+ end
end
-
asserter = Google::APIClient::JWTAsserter.new('client1', 'scope1 scope2', @key)
- auth = asserter.authorize(nil, { :connection => connection})
- auth.should_not == nil?
- auth.access_token.should == "1/abcdef1234567890"
+ auth = asserter.authorize(nil, { :connection => conn })
+ expect(auth).not_to eq(nil?)
+ expect(auth.access_token).to eq("1/abcdef1234567890")
+
+ auth.fetch_access_token!(:connection => conn)
+ expect(auth.access_token).to eq("1/0987654321fedcba")
+
+ conn.verify
end
end
+describe Google::APIClient::ComputeServiceAccount do
+ include ConnectionHelpers
+
+ it 'should query metadata server' do
+ conn = stub_connection do |stub|
+ stub.get('/computeMetadata/v1beta1/instance/service-accounts/default/token') do |env|
+ expect(env.url.host).to eq('metadata')
+ [200, {}, '{
+ "access_token" : "1/abcdef1234567890",
+ "token_type" : "Bearer",
+ "expires_in" : 3600
+ }']
+ end
+ end
+ service_account = Google::APIClient::ComputeServiceAccount.new
+ auth = service_account.fetch_access_token!({ :connection => conn })
+ expect(auth).not_to eq(nil?)
+ expect(auth["access_token"]).to eq("1/abcdef1234567890")
+ conn.verify
+ end
+end