use reqwest::{blocking::Client, StatusCode};
use crate::error::InternalError;
use super::SubjectProvider;
#[derive(Clone)]
pub struct OpenIdSubjectProvider {
userinfo_endpoint: String,
}
impl OpenIdSubjectProvider {
pub fn new(userinfo_endpoint: String) -> OpenIdSubjectProvider {
OpenIdSubjectProvider { userinfo_endpoint }
}
}
impl SubjectProvider for OpenIdSubjectProvider {
fn get_subject(&self, access_token: &str) -> Result<Option<String>, InternalError> {
let response = Client::builder()
.build()
.map_err(|err| InternalError::from_source(err.into()))?
.get(&self.userinfo_endpoint)
.header("Authorization", format!("Bearer {}", access_token))
.send()
.map_err(|err| InternalError::from_source(err.into()))?;
if !response.status().is_success() {
match response.status() {
StatusCode::UNAUTHORIZED => return Ok(None),
status_code => {
return Err(InternalError::with_message(format!(
"Received unexpected response code: {}",
status_code
)))
}
}
}
let subject = response
.json::<UserResponse>()
.map_err(|_| InternalError::with_message("Received unexpected response body".into()))?
.sub;
Ok(Some(subject))
}
fn clone_box(&self) -> Box<dyn SubjectProvider> {
Box::new(self.clone())
}
}
#[derive(Debug, Deserialize)]
struct UserResponse {
sub: String,
}
#[cfg(test)]
#[cfg(all(feature = "actix", feature = "actix-web", feature = "futures"))]
mod tests {
use super::*;
use std::sync::mpsc::channel;
use std::thread::JoinHandle;
use actix::System;
use actix_web::{dev::Server, web, App, HttpRequest, HttpResponse, HttpServer};
use futures::Future;
const ACCESS_TOKEN: &str = "access_token";
const SUBJECT_IDENTIFIER: &str = "AAAAAAAAAAAAAAAAAAAQEh-c1Zkltuwhd-12345";
const USER_INFO_ENDPOINT: &str = "/userinfo";
#[test]
fn get_subject_success() {
let (shutdown_handle, address) = run_mock_openid_server("get_subject", user_info_endpoint);
let subject_provider =
OpenIdSubjectProvider::new(format!("{}{}", address, USER_INFO_ENDPOINT));
let subject = subject_provider
.get_subject(ACCESS_TOKEN)
.expect("Failed to retrieve subject");
assert_eq!(subject, Some(SUBJECT_IDENTIFIER.to_string()));
shutdown_handle.shutdown();
}
#[test]
fn get_subject_invalid_token() {
let (shutdown_handle, address) =
run_mock_openid_server("get_subject_bad_token", user_info_endpoint);
let subject_provider =
OpenIdSubjectProvider::new(format!("{}{}", address, USER_INFO_ENDPOINT));
assert!(subject_provider
.get_subject("invalid_token")
.unwrap()
.is_none());
shutdown_handle.shutdown();
}
#[test]
fn get_subject_bad_response_body() {
let (shutdown_handle, address) =
run_mock_openid_server("get_subject", bad_response_body_user_info_endpoint);
let subject_provider =
OpenIdSubjectProvider::new(format!("{}{}", address, USER_INFO_ENDPOINT));
assert!(subject_provider.get_subject(ACCESS_TOKEN).is_err());
shutdown_handle.shutdown();
}
#[test]
fn get_subject_bad_response_status() {
let (shutdown_handle, address) =
run_mock_openid_server("get_subject", bad_response_status_user_info_endpoint);
let subject_provider =
OpenIdSubjectProvider::new(format!("{}{}", address, USER_INFO_ENDPOINT));
assert!(subject_provider.get_subject(ACCESS_TOKEN).is_err());
shutdown_handle.shutdown();
}
fn run_mock_openid_server(
test_name: &str,
endpoint: fn(HttpRequest) -> HttpResponse,
) -> (OpenidServerShutdownHandle, String) {
let (tx, rx) = channel();
let instance_name = format!("Openid-Server-{}", test_name);
let join_handle = std::thread::Builder::new()
.name(instance_name.clone())
.spawn(move || {
let sys = System::new(instance_name);
let server = HttpServer::new(move || {
App::new().service(web::resource(USER_INFO_ENDPOINT).to(endpoint))
})
.bind("127.0.0.1:0")
.expect("Failed to bind Openid server");
let address = format!("http://127.0.0.1:{}", server.addrs()[0].port());
let server = server.disable_signals().system_exit().start();
tx.send((server, address)).expect("Failed to send server");
sys.run().expect("Openid server runtime failed");
})
.expect("Failed to spawn Openid server thread");
let (server, address) = rx.recv().expect("Failed to receive server");
(OpenidServerShutdownHandle(server, join_handle), address)
}
fn user_info_endpoint(request: HttpRequest) -> HttpResponse {
match request.headers().get("Authorization") {
Some(auth_header) => {
let access_token = auth_header
.to_str()
.expect("Unable to get authorization header value");
if access_token == format!("Bearer {}", ACCESS_TOKEN) {
HttpResponse::Ok()
.content_type("application/json")
.json(json!({
"sub": SUBJECT_IDENTIFIER,
"name": "Bob",
"given_name": "Bob",
"picture" : "https://graph.microsoft.com/v1.0/me/photo/$value",
}))
} else {
HttpResponse::Unauthorized().finish()
}
}
None => panic!("Invalid request, missing authorization header"),
}
}
fn bad_response_body_user_info_endpoint(request: HttpRequest) -> HttpResponse {
match request.headers().get("Authorization") {
Some(auth_header) => {
let access_token = auth_header
.to_str()
.expect("Unable to get authorization header value");
if access_token == format!("Bearer {}", ACCESS_TOKEN) {
HttpResponse::Ok()
.content_type("application/json")
.json(json!({
"name": "Bob",
"given_name": "Bob",
"picture" : "https://graph.microsoft.com/v1.0/me/photo/$value",
}))
} else {
HttpResponse::Unauthorized().finish()
}
}
None => panic!("Invalid request, missing authorization header"),
}
}
fn bad_response_status_user_info_endpoint(_request: HttpRequest) -> HttpResponse {
HttpResponse::NotAcceptable().finish()
}
struct OpenidServerShutdownHandle(Server, JoinHandle<()>);
impl OpenidServerShutdownHandle {
pub fn shutdown(self) {
self.0
.stop(false)
.wait()
.expect("Failed to stop Openid server");
self.1.join().expect("Openid server thread failed");
}
}
}