Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions packages/backend/src/jwt/__tests__/assertions.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -93,6 +93,12 @@ describe('assertAudienceClaim(audience?, aud?)', () => {
);
});

it('throws error when audience string[] has no intersection with aud string[]', () => {
expect(() => assertAudienceClaim([audience], [invalidAudience])).toThrow(
`Invalid JWT audience claim array (aud) ${JSON.stringify([audience])}. Is not included in "${JSON.stringify([invalidAudience])}".`,
);
});

it('throws error when aud is a substring of audience', () => {
expect(() => assertAudienceClaim(audience.slice(0, -2), audience)).toThrow(
`Invalid JWT audience claim (aud) "${audience.slice(0, -2)}". Is not included in "${JSON.stringify([audience])}".`,
Expand Down
47 changes: 47 additions & 0 deletions packages/backend/src/jwt/__tests__/verifyJwt.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -5,14 +5,17 @@ import {
mockJwks,
mockJwt,
mockJwtHeader,
mockM2MJwtPayload,
mockJwtPayload,
mockOAuthAccessTokenJwtPayload,
pemEncodedPublicKey,
pemEncodedSignKey,
publicJwks,
signedJwt,
someOtherPublicKey,
} from '../../fixtures';
import { mockSignedOAuthAccessTokenJwt, mockSignedOAuthAccessTokenJwtApplicationTyp } from '../../fixtures/machine';
import { signJwt } from '../signJwt';
import { decodeJwt, hasValidSignature, verifyJwt } from '../verifyJwt';

const invalidTokenError = {
Expand Down Expand Up @@ -218,6 +221,50 @@ describe('verifyJwt(jwt, options)', () => {
expect(error?.message).toContain('Expected "at+jwt, application/at+jwt"');
});

it('verifies JWT when array aud includes the configured audience', async () => {
const audience = 'https://my-resource.example.com';
const { data: jwtWithArrayAud } = await signJwt(
{
...mockM2MJwtPayload,
aud: ['https://other-resource.example.com', audience],
},
pemEncodedSignKey,
{
algorithm: mockJwtHeader.alg,
header: mockJwtHeader,
},
);

const { data } = await verifyJwt(jwtWithArrayAud || '', {
key: pemEncodedPublicKey,
audience,
});

expect(data?.aud).toEqual(['https://other-resource.example.com', audience]);
});

it('rejects JWT when array aud does not include the configured audience', async () => {
const { data: jwtWithArrayAud } = await signJwt(
{
...mockM2MJwtPayload,
aud: ['https://attacker.example.com'],
},
pemEncodedSignKey,
{
algorithm: mockJwtHeader.alg,
header: mockJwtHeader,
},
);

const { errors: [error] = [] } = await verifyJwt(jwtWithArrayAud || '', {
key: pemEncodedPublicKey,
audience: 'https://my-resource.example.com',
});

expect(error).toBeDefined();
expect(error?.message).toContain('Invalid JWT audience claim array');
});

it('rejects an expired JWT when clockSkewInMs is explicitly 0', async () => {
vi.setSystemTime(new Date((mockJwtPayload.exp + 1) * 1000));
const inputVerifyJwtOptions = {
Expand Down
2 changes: 1 addition & 1 deletion packages/backend/src/jwt/verifyJwt.ts
Original file line number Diff line number Diff line change
Expand Up @@ -181,7 +181,7 @@ export async function verifyJwt(
const { azp, sub, aud, iat, exp, nbf } = payload;

assertSubClaim(sub);
assertAudienceClaim([aud], [audience]);
assertAudienceClaim(aud, audience);
assertAuthorizedPartiesClaim(azp, authorizedParties);
assertExpirationClaim(exp, clockSkew);
assertActivationClaim(nbf, clockSkew);
Expand Down
Loading