Skip to content

Commit ced392c

Browse files
committed
Add some tests for PyJWKClient
1 parent 24a5b2f commit ced392c

File tree

4 files changed

+117
-3
lines changed

4 files changed

+117
-3
lines changed

jwt/jwks_client.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,8 @@ def get_signing_key(self, kid):
6060
return signing_key
6161

6262
def get_signing_key_from_jwt(self, token):
63-
unverified = decode_token(token, verify=False, complete=True)
63+
unverified = decode_token(
64+
token, complete=True, options={"verify_signature": False}
65+
)
6466
header = unverified.get("header")
6567
return self.get_signing_key(header.get("kid"))

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,4 @@ use_parentheses=true
1111
combine_as_imports=true
1212

1313
known_first_party="jwt"
14-
known_third_party=["pytest", "setuptools", "sphinx_rtd_theme"]
14+
known_third_party=["pytest", "requests_mock", "setuptools", "sphinx_rtd_theme"]

setup.py

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,11 @@ def get_version(package):
3434

3535
EXTRAS_REQUIRE = {
3636
"jwks-client": ["requests"],
37-
"tests": ["pytest>=4.0.1,<5.0.0", "pytest-cov>=2.6.0,<3.0.0"],
37+
"tests": [
38+
"pytest>=4.0.1,<5.0.0",
39+
"pytest-cov>=2.6.0,<3.0.0",
40+
"requests-mock>=1.7.0,<2.0.0",
41+
],
3842
"cryptography": ["cryptography >= 1.4"],
3943
}
4044

tests/test_jwks_client.py

Lines changed: 108 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
import pytest
2+
import requests_mock
3+
4+
import jwt
5+
from jwt import PyJWKClient
6+
from jwt.api_jwk import PyJWK
7+
from jwt.exceptions import PyJWKClientError
8+
9+
10+
@pytest.fixture
11+
def mocked_response():
12+
return {
13+
"keys": [
14+
{
15+
"alg": "RS256",
16+
"kty": "RSA",
17+
"use": "sig",
18+
"n": "0wtlJRY9-ru61LmOgieeI7_rD1oIna9QpBMAOWw8wTuoIhFQFwcIi7MFB7IEfelCPj08vkfLsuFtR8cG07EE4uvJ78bAqRjMsCvprWp4e2p7hqPnWcpRpDEyHjzirEJle1LPpjLLVaSWgkbrVaOD0lkWkP1T1TkrOset_Obh8BwtO-Ww-UfrEwxTyz1646AGkbT2nL8PX0trXrmira8GnrCkFUgTUS61GoTdb9bCJ19PLX9Gnxw7J0BtR0GubopXq8KlI0ThVql6ZtVGN2dvmrCPAVAZleM5TVB61m0VSXvGWaF6_GeOhbFoyWcyUmFvzWhBm8Q38vWgsSI7oHTkEw",
19+
"e": "AQAB",
20+
"kid": "NEE1QURBOTM4MzI5RkFDNTYxOTU1MDg2ODgwQ0UzMTk1QjYyRkRFQw",
21+
"x5t": "NEE1QURBOTM4MzI5RkFDNTYxOTU1MDg2ODgwQ0UzMTk1QjYyRkRFQw",
22+
"x5c": [
23+
"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"
24+
],
25+
}
26+
]
27+
}
28+
29+
30+
class TestPyJWKClient:
31+
def test_get_jwk_set(self, mocked_response):
32+
url = "https://dev-87evx9ru.auth0.com/.well-known/jwks.json"
33+
34+
with requests_mock.mock() as m:
35+
m.get(url, json=mocked_response)
36+
jwks_client = PyJWKClient(url)
37+
jwk_set = jwks_client.get_jwk_set()
38+
39+
assert len(jwk_set.keys) == 1
40+
41+
def test_get_signing_keys(self, mocked_response):
42+
url = "https://dev-87evx9ru.auth0.com/.well-known/jwks.json"
43+
44+
with requests_mock.mock() as m:
45+
m.get(url, json=mocked_response)
46+
jwks_client = PyJWKClient(url)
47+
signing_keys = jwks_client.get_signing_keys()
48+
49+
assert len(signing_keys) == 1
50+
assert isinstance(signing_keys[0], PyJWK)
51+
52+
def test_get_signing_keys_raises_if_none_found(self, mocked_response):
53+
url = "https://dev-87evx9ru.auth0.com/.well-known/jwks.json"
54+
55+
with requests_mock.mock() as m:
56+
mocked_key = mocked_response["keys"][0].copy()
57+
mocked_key["use"] = "enc"
58+
response = {"keys": [mocked_key]}
59+
m.get(url, json=response)
60+
jwks_client = PyJWKClient(url)
61+
62+
with pytest.raises(PyJWKClientError) as exc:
63+
jwks_client.get_signing_keys()
64+
65+
assert "The JWKS endpoint did not contain any signing keys" in str(
66+
exc.value
67+
)
68+
69+
def test_get_signing_key(self, mocked_response):
70+
url = "https://dev-87evx9ru.auth0.com/.well-known/jwks.json"
71+
kid = "NEE1QURBOTM4MzI5RkFDNTYxOTU1MDg2ODgwQ0UzMTk1QjYyRkRFQw"
72+
73+
with requests_mock.mock() as m:
74+
m.get(url, json=mocked_response)
75+
jwks_client = PyJWKClient(url)
76+
signing_key = jwks_client.get_signing_key(kid)
77+
78+
assert isinstance(signing_key, PyJWK)
79+
assert signing_key.key_type == "RSA"
80+
assert signing_key.key_id == kid
81+
assert signing_key.public_key_use == "sig"
82+
83+
def test_get_signing_key_from_jwt(self, mocked_response):
84+
token = "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6Ik5FRTFRVVJCT1RNNE16STVSa0ZETlRZeE9UVTFNRGcyT0Rnd1EwVXpNVGsxUWpZeVJrUkZRdyJ9.eyJpc3MiOiJodHRwczovL2Rldi04N2V2eDlydS5hdXRoMC5jb20vIiwic3ViIjoiYVc0Q2NhNzl4UmVMV1V6MGFFMkg2a0QwTzNjWEJWdENAY2xpZW50cyIsImF1ZCI6Imh0dHBzOi8vZXhwZW5zZXMtYXBpIiwiaWF0IjoxNTcyMDA2OTU0LCJleHAiOjE1NzIwMDY5NjQsImF6cCI6ImFXNENjYTc5eFJlTFdVejBhRTJINmtEME8zY1hCVnRDIiwiZ3R5IjoiY2xpZW50LWNyZWRlbnRpYWxzIn0.PUxE7xn52aTCohGiWoSdMBZGiYAHwE5FYie0Y1qUT68IHSTXwXVd6hn02HTah6epvHHVKA2FqcFZ4GGv5VTHEvYpeggiiZMgbxFrmTEY0csL6VNkX1eaJGcuehwQCRBKRLL3zKmA5IKGy5GeUnIbpPHLHDxr-GXvgFzsdsyWlVQvPX2xjeaQ217r2PtxDeqjlf66UYl6oY6AqNS8DH3iryCvIfCcybRZkc_hdy-6ZMoKT6Piijvk_aXdm7-QQqKJFHLuEqrVSOuBqqiNfVrG27QzAPuPOxvfXTVLXL2jek5meH6n-VWgrBdoMFH93QEszEDowDAEhQPHVs0xj7SIzA"
85+
url = "https://dev-87evx9ru.auth0.com/.well-known/jwks.json"
86+
87+
with requests_mock.mock() as m:
88+
m.get(url, json=mocked_response)
89+
jwks_client = PyJWKClient(url)
90+
signing_key = jwks_client.get_signing_key_from_jwt(token)
91+
92+
data = jwt.decode(
93+
token,
94+
signing_key.key,
95+
algorithms=["RS256"],
96+
audience="https://expenses-api",
97+
options={"verify_exp": False},
98+
)
99+
100+
assert data == {
101+
"iss": "https://dev-87evx9ru.auth0.com/",
102+
"sub": "aW4Cca79xReLWUz0aE2H6kD0O3cXBVtC@clients",
103+
"aud": "https://expenses-api",
104+
"iat": 1572006954,
105+
"exp": 1572006964,
106+
"azp": "aW4Cca79xReLWUz0aE2H6kD0O3cXBVtC",
107+
"gty": "client-credentials",
108+
}

0 commit comments

Comments
 (0)